Forensic Computing References
Forensic Computing References
Anson, S., & Bunting, S. (2007). Mastering Windows network forensics and
investigation. Hoboken, NJ: Sybex.
Corey, V., Peterman, C., Shearin, S., Greenburg, M., & Bokkelen, J. (2002,
November-December). Network forensics analysis. IEEE Internet Computing.
Krasser, S., Conti, G., Grizzard, J., Gribschaw, J., & Owen, H. (2005, June 15-
17). Real-time and forensic network data analysis using animated and
coordinated visualization. Paper presented at the Sixth Annual IEEE
Information Assurance Workshop (IAW '05).
Mueller, P. (2007, June 25). How's your forensics strategy? Network Computing,
18, 18-18.
Mukkamala, S., & Sung, A. (2003). Identifying significant features for network
forensics analysis using artificial intelligent techniques. International Journal of
Digital Evidence, 1(4).
Perry, S. (2006, December). Network forensics and the inside job. Network
Security, 2006, 11-13.
.
Sandstorm Inc. (2007). Addressing data breeches with NetIntercept, from
http://www.knowledgestorm.com
Schiffman, M., Pennington, B., Pollino, D., & O'Donnell, A. (2002). Hacker's
Challenge 2: test your network security & forensics skills (2nd ed.). New York,
NY: McGraw Hill/Osborne.
This document is distributed for non-profit research and educational purposes. The reference material contained in this
document does not constitute an endorsement of any referenced viewpoint, entity or individual, product, or service and no
representation is made as to the accuracy or completeness of any of the referenced information sources or content.
Page 1 of 4
[Revised: 09/14/2007]
Schneier, B., & Kelsey, J. (1999). Secure audit logs to support computer
forensics. ACM Transactions on Information and System Security (TISSEC),
2(2), 159-176.
Siles, R. (2007, January 2). Wireless forensics: tapping the air. Retrieved
September 14, 2007, from http://www.securityfocus.com/infocus/1884
Wyler, N., Potter, B., & Hurley, C. (2005). Aggressive network self-defense.
Rockland, MA: Syngress.
Anti-Forensic Technology
Bunting, S., & Wei, W. (2006). EnCase computer forensics: the official EnCE
study guide. Edison, NJ: Sybex.
Casey, E. (2004). Digital evidence and computer crime (Second Edition ed.):
Elsevier.
Guillermo, F., Trifas, M., Brown, D., Francia, R., & Scott, C. (2006). Visualization
and management of digital forensics data. Paper presented at the 3rd Annual
Conference on Information Security Curriculum Development.
Kruse, W., & Heise, J. (2001). Computer forensics: incident response essentials.
Boston: Addison-Wesley Professional.
Liebrock, L., Marreno, N., Burton, D., Prine, R., Cornelius, E., Shakamuri, M., et
al. (2007). A preliminary design for digital forensics analysis of terabyte size
data sets. Paper presented at the ACM Symposium on Applied Computing.
This document is distributed for non-profit research and educational purposes. The reference material contained in this
document does not constitute an endorsement of any referenced viewpoint, entity or individual, product, or service and no
representation is made as to the accuracy or completeness of any of the referenced information sources or content.
Page 2 of 4
[Revised: 09/14/2007]
Steel, C. (2006). Windows forensics: the field guide for corporate computer
investigations. Edison, NJ: Wiley.
Chen, P., Laih, C., Pouget, F., & Dacier, M. (2005). Comparative survey of local
honeypot sensors to assist network forensics. IEEE.
Howell, B., & Rubin, S. (2007, May). What every lawyer should know about
digital forensics (but may not know to ask). Computer & Internet Lawyer, 24,
12-15.
Kent, K., Chevalier, S., Grance, T., & Dang, H. (2006). Guide to Integrating
Forensic Techniques into Incident Response (No. NIST 800-86): National
Institute of Standards and Technology (NIST).
Nolan, R., Baker, M., Branson, J., Hammerstein, J., Rush, K., Waits, C., et al.
(2005). First responders guide to computer forensics: advanced topics. CERT.
This document is distributed for non-profit research and educational purposes. The reference material contained in this
document does not constitute an endorsement of any referenced viewpoint, entity or individual, product, or service and no
representation is made as to the accuracy or completeness of any of the referenced information sources or content.
Page 3 of 4
[Revised: 09/14/2007]
Information Security
Allen, J. (2001). CERT(R) guide to system and network security practices (SEI
Series in Software Engineering). Boston: Addison-Wesley Professional.
Landoll, D. (2005). The security risk assessment handbook: a complete guide for
performing security risk assessments. London: CRC Press.
Locasto, M., Wang, K., Keromytis, A., & Stolfo, S. (2005). FLIPS: hybrid adaptive
intrusion prevention: Columbia University.
Northcutt, S., & Novak, J. (2002). Network intrusion detection. Indianapolis: New
Riders Publishing.
Pollino, D., Pennington, B., Bradley, T., & Dwivedi, H. (2006). Hacker's challenge
3 (hacking exposed): McGraw Hill.
This document is distributed for non-profit research and educational purposes. The reference material contained in this
document does not constitute an endorsement of any referenced viewpoint, entity or individual, product, or service and no
representation is made as to the accuracy or completeness of any of the referenced information sources or content.
Page 4 of 4