References
[1]. Prosise, C., Mandia, K., and Pepe, M. (2003). Incident
Response & Computer Forensics. (p.11). McGraw-
Hill/Osborne.
[2]. Schneier, B., and Kelsey, J. (1999). “Secure audit logs
to support Computer Forensics”. ACM Transactions on
Information and System Security (TISSEC), Vol. 2, No. 2, pp.
159-176.
[3]. Vacca, J. R. (2005). Computer Forensics: Computer
Crime Scene Investigation (Networking Series). Charles
River Media, Inc.
[4]. Kruse II, W. G., and Heiser, J. G. (2001). Computer
Forensics: Incident Response Essentials. Pearson
Education.
[5]. Marcella Jr, A., and Greenfield, R. S. (Eds.), (2002).
Cyber Forensics: A Field Manual for Collecting,
Examining, and Preserving Evidence of Computer
Crimes. CRC Press.
[6]. Rogers, M. K., and Seigfried, K. (2004). “The Future of
Computer Forensics: a Needs Analysis Survey ”.
Computers & Security, Vol. 23, No. 1, pp. 12-16.
[7]. Yasinsac, A., Erbacher, R. F., Marks, D. G., Pollitt, M. M.,
and Sommer, P. M. (2003). “Computer Forensics
Education”. IEEE Security & Privacy, Vol. 4, pp. 15-23.
[8]. Rogers, M. K., Goldman, J., Mislan, R., Wedge, T., and
Debrota, S. (2006). “Computer Forensics Field Triage
Process Model”. In Proceedings of the Conference on
Digital Forensics, Security and Law (p. 27). Association of
Digital Forensics, Security and Law.
[9]. Nelson, B., Phillips, A., and Steuart, C. (2015). Guide to
Computer Forensics and Investigations. Cengage
Learning.
[10]. Caloyannides, M. A. (2001). Computer Forensics
and Privacy. Artech House Publishers.
[11]. Meyers, M., and Rogers, M. (2004). “Computer Forensics: The Need for Standardization and Certification”.
International Journal of Digital Evidence, Vol. 3, No. 2, pp. 1-
11.
[12]. Yasinsac, A., and Manzano, Y. (2001). “Policies to
Enhance Computer and Network Forensics”. In
Proceedings of the 2001 IEEE Workshop on Information
Assurance and Security, pp. 289-295.
[13]. Vacca, J. R. (2002). Computer Forensics: Computer Crime Scene Investigation. Charles River Media, Inc.
[14]. Rogers, M. (2003). The Role of Criminal Profiling in the
Computer Forensics Process. Computers & Security, Vol.
22, No. 4, pp. 292-298.
[15]. Fahey, A. L. (2008). Computer Forensics, E-Discovery
and Incident Response Methods and Systems. U.S. Patent
Application No. 12/318,083.