watching you watching us . .


{ in no particular order }

[Carrier2005] – Carrier, B.
File System Forensic Analysis
Addison-Wesley, 2005

[Carvey2005] – Carvey, H.
Windows Forensics and Incident Recovery
Addison-Wesley, 2005

[Casey2010] – Casey, E.
Handbook of Digital Forensics and Investigation
Academic Press, 2010

[Farmer2004] – Farmer, D., Venema, W.
Forensic Discovery
Addison-Wesley, 2004

[Marcella2008] – Marcella, A., Menendez, D. (2nd Ed)
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
Auerbach Publications, Taylor & Francis Group, 2008

[Jewkes2010] – Jewkes, Y., Yar, M.
Handbook of Internet crime
Willan Publishing, 1 September 2009

[Kanellis2006] – Kanellis, Panagiotis et al.
Digital Crime and Forensic Science in Cyberspace
IGI Publishing, 2006

[Piper2002] – Piper, F., Murphy, S.
Cryptography A Very Short Introduction
Oxoford University Press, 2002

[Kessler2001] – Kessler, G.
Steganography: Hiding Data Within Data
Gary Kessler Associates, created September 2001