Computer Forensic References

From: Jeimy Jose Cano Martinez (jcanoat_private)
Date: Wed Apr 18 2001 - 05:02:41 PDT

  • Next message: H Carvey: "windows artifacts"

    Dear Colleagues,
    During last three months some of my students and i, have been looking for
    bibliography references in computer forensic in order to establish a
    general or base books or articles in this area. In this sense, an knowing
    your experience in this interesting area, i send you some of our findings.
    If you have another links or books related with forensic area, please let
    me know. I´ll send all responses to the list.
    NOTE: This not an exhaustive list.
    Books and articles.
    - CASEY, E (2000) Digital Evidence. Academic Press.
    - STEPHENSON, P (1999) Investigating Computer-related crime. CRC Press.
    - PFLEEGER, C. (1996) Security in computing. Englewood Cliffs, NJ: Prentice
    Hall. Second Edition.
    - KOVACICH, G. y BONI, W (2000) High technology crime. Investigator´s
    handbook. Butterworth Heinemman.
    - KRAUSE, M. y TRIPTON, H. (1999) Handbook of Information Security
    Management 1999. CRC Press
    - NORTHCUTT, S (1999) Network intrusion detection. An analyst´s handbook.
    News Riders.
    - NORTHCUTT, S. et al (2001) Intrusion Signatures and Analysis. News
    Riders.
    - SAMMES, J. y JENKINSON, J, A. (2000) Forensic Computing. A practitioner
    guide. Springer Verlag.
    - POWER, R. (2000) Tangled Web. Tales of digital crime from the shadows of
    cyberspace. QUE Corporation.
    - PARKER, D (1998) Fighting Computer Crime. John Wiley & Son.
    - SHAW, P. (1998) Legal and Security Risks in Computing and Communications.
    Butterworth Heinemann.
    - BOLOGNA, J y SHAW, P. (2000) Avoiding cyberfraud in small business. Wiley
    & Son.
    - WRIGHT, M. (1998) The need for information security education. Computer
    Fraud & Security.
    - BOHM, N. (2000) How strong do plataforms need to be from legal
    perspective?. Information Security Technical Report. Vol.5. No.1
    - JOHNSON, J. (2000) The joy of incident handling response process.
    Securityportal.com. May 15.
    - Scientific Working Group on Digital Evidence -SWGDE. (2000) Digital
    evidence: Standards and Principles. Forensic Science Communications. April.
    Vol2. No.2
    - ARMSTRONG, I. (2000) Computer Forensic. Secure Computing Magazine. April.
    - SIGFRIED, K. (2000) Electronic Forensic. Securityportal.com. May 8.
    - SCHNEIER, B. (2000) Secure Logs.
    http://www.counterpane.com/secure-logs.html
    Internet Sites:
    -
    ftp://ftp.net.ohio-state.edu/users/romig/other-papers/intrusion%20investiga
    tion.doc - Byron Collie’s paper about intrusion investigation.
    - http://www.forensic-computing.com - International Journal of Forensic
    Computing
    - http://www.fbi.gov/programs/lab/fsc/current/index.htm – Forensic Science
    Communications
    - http://www.sans.org/y2k/finding.htm – Finding listening processes under
    NT with Inzider.
    - http://www.washington.edu/People/dad David Dittrich’s page.
    - http://www.forensic.to/forensic.html – Zeno’s Forensics Site
    - http://haven.ios.com/~nyrc/homepage.html – Reddy’s Forensics Home Page
    - http://www.fsu.edu/~crimdo/misc.html – FSU Criminology Page
    - www.incident-response.org - Incident Respond
    International Associations
    http://www.gocsi.com - Computer Security Institute
    http://www.acfe.org - Assoc. Certified Fraud Examiners
    http://www.icsa.com - International Information Systems Security Assoc.
    http://www.htcia.org - High Technology crime investigation Assoc.
    http://www.cops.org - International Assoc. of Computer Investigative
    Specialist (IACIS)
    http://www.isaca.org - CISA
    http://www.isc2.org - CISSP
    http://www.sans.org
    http://www.cert.org
    Cordially,
    Jeimy J. Cano, Ph.D
    Universidad de los Andes
    Bogota, D.C
    COLOMBIA
    



    This archive was generated by hypermail 2b30 : Wed Apr 18 2001 - 08:57:29 PDT