Dear Colleagues, During last three months some of my students and i, have been looking for bibliography references in computer forensic in order to establish a general or base books or articles in this area. In this sense, an knowing your experience in this interesting area, i send you some of our findings. If you have another links or books related with forensic area, please let me know. I´ll send all responses to the list. NOTE: This not an exhaustive list. Books and articles. - CASEY, E (2000) Digital Evidence. Academic Press. - STEPHENSON, P (1999) Investigating Computer-related crime. CRC Press. - PFLEEGER, C. (1996) Security in computing. Englewood Cliffs, NJ: Prentice Hall. Second Edition. - KOVACICH, G. y BONI, W (2000) High technology crime. Investigator´s handbook. Butterworth Heinemman. - KRAUSE, M. y TRIPTON, H. (1999) Handbook of Information Security Management 1999. CRC Press - NORTHCUTT, S (1999) Network intrusion detection. An analyst´s handbook. News Riders. - NORTHCUTT, S. et al (2001) Intrusion Signatures and Analysis. News Riders. - SAMMES, J. y JENKINSON, J, A. (2000) Forensic Computing. A practitioner guide. Springer Verlag. - POWER, R. (2000) Tangled Web. Tales of digital crime from the shadows of cyberspace. QUE Corporation. - PARKER, D (1998) Fighting Computer Crime. John Wiley & Son. - SHAW, P. (1998) Legal and Security Risks in Computing and Communications. Butterworth Heinemann. - BOLOGNA, J y SHAW, P. (2000) Avoiding cyberfraud in small business. Wiley & Son. - WRIGHT, M. (1998) The need for information security education. Computer Fraud & Security. - BOHM, N. (2000) How strong do plataforms need to be from legal perspective?. Information Security Technical Report. Vol.5. No.1 - JOHNSON, J. (2000) The joy of incident handling response process. Securityportal.com. May 15. - Scientific Working Group on Digital Evidence -SWGDE. (2000) Digital evidence: Standards and Principles. Forensic Science Communications. April. Vol2. No.2 - ARMSTRONG, I. (2000) Computer Forensic. Secure Computing Magazine. April. - SIGFRIED, K. (2000) Electronic Forensic. Securityportal.com. May 8. - SCHNEIER, B. (2000) Secure Logs. http://www.counterpane.com/secure-logs.html Internet Sites: - ftp://ftp.net.ohio-state.edu/users/romig/other-papers/intrusion%20investiga tion.doc - Byron Collie’s paper about intrusion investigation. - http://www.forensic-computing.com - International Journal of Forensic Computing - http://www.fbi.gov/programs/lab/fsc/current/index.htm – Forensic Science Communications - http://www.sans.org/y2k/finding.htm – Finding listening processes under NT with Inzider. - http://www.washington.edu/People/dad David Dittrich’s page. - http://www.forensic.to/forensic.html – Zeno’s Forensics Site - http://haven.ios.com/~nyrc/homepage.html – Reddy’s Forensics Home Page - http://www.fsu.edu/~crimdo/misc.html – FSU Criminology Page - www.incident-response.org - Incident Respond International Associations http://www.gocsi.com - Computer Security Institute http://www.acfe.org - Assoc. Certified Fraud Examiners http://www.icsa.com - International Information Systems Security Assoc. http://www.htcia.org - High Technology crime investigation Assoc. http://www.cops.org - International Assoc. of Computer Investigative Specialist (IACIS) http://www.isaca.org - CISA http://www.isc2.org - CISSP http://www.sans.org http://www.cert.org Cordially, Jeimy J. Cano, Ph.D Universidad de los Andes Bogota, D.C COLOMBIA
This archive was generated by hypermail 2b30 : Wed Apr 18 2001 - 08:57:29 PDT