File: bibliography

package info (click to toggle)
sleuthkit 2.06-3etch1
  • links: PTS
  • area: main
  • in suites: etch
  • size: 7,128 kB
  • ctags: 5,133
  • sloc: ansic: 41,406; sh: 14,123; perl: 4,745; cpp: 4,297; makefile: 925; python: 29
file content (58 lines) | stat: -rw-r--r-- 1,742 bytes parent folder | download | duplicates (7)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58

Online
-------

Ullman, Ellen, The Dumbing-down of Programming, Salon Magazine, May 12, 1998.
	http://www.salon.com/21st/feature/1998/05/cov_12feature.html

Slides of our forensics class & the latest version of the TCT toolkit:

        http://www.fish.com/forensics/
        http://www.porcupine.org/forensics/

CERT's (Computer Emergency Response Team) home page, chock-full of
information about how to report & respond to incidents:

        http://www.cert.org/

AUSCERT's (Australian CERT) nice Unix checklist about removing common 
security vulnerabilities:

	ftp://ftp.auscert.org.au/pub/auscert/papers/unix_security_checklist


Papers
-------

McKemmish, Rodney, Forensic Computing, 1998 Donald MacKay Churchill 
	Fellowship Report. (http://www.aic.gov.au/publications/)

McVoy, L.W. & Kleiman, S.R., Extent-like Performance from a UNIX File System, 
	Winter '91 USENIX.


Books
------

Jon Bentley, Programming Pearls, Addison-Wesley Pub Co., October, 1999
        (first edition December 1985; a better book, but out of date.)

Drake, Chris & Brown, Kimberley, Panic!  Unix System Crash Dump Analysis, 
	1995, SunSoft Press, Prentice Hall.

Garfinkle, Simson & Spafford, Gene, Practical Unix & Internet Security, 
	O'Reilly & Associates, Inc., 1996

Goff, M. Lee, A Fly for the Prosecution : How Insect Evidence Helps Solve
	Crimes, Harvard University Press, 2000.

Roueche', Berton, The Medical Detectives, Truman Talley Books, 1947/1991.

Saferstein, Richard, Criminalistics, An Introduction to Forensic Science,
	Prentice-Hall, 1998.

Stevens, W. Richard, TCP/IP Illustrated, Volume 1, Addison-Wesley, 1994.

Stoll, Cliff, The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer
	Espionage, Pocket Books, New York, 1990.