共 10 条
- [1] Armouring theELF:Binary encryption on theUNIX platform.Phrack#58 article5. grugq,scut. http://www.phrack.org/show. php?p=58&a=5 . 2001
- [2] Computer Forensics. Parra M. http://www.giac.org/practical/Moroni_Parra_GSEC.doc . 2002
- [3] Computer Forensics:The Key to Solving the Crime. Oseles L. http://faculty.ed.umuc.edu/meinkej/inss690/oseles2.pdf . 2001
- [4] Computer forensics:An introduction. SommerP. Proceedings of theCompsec?2—the9thWorldConference onComputerSecurityAudit andControl . 1992
- [5] Basic steps in forensic analysis ofUnix systems. DittrichD. http://staff.washington.edu/dittrich/misc/forensics/ . 2000
- [6] Defeating forensic analysis onUnix.Phrack#59 article6. grugq. http://www.phrack.org/show.php?p=59&a=6 . 2002
- [7] The coroner‘s toolkit(TCT). Farmer D,Venema W. http://www.fish.com/tct/ . 2002
- [8] pdd: memory imaging and forensic analysis of palmOS devices. GrandJ. Proceedings of the14thAnnualComputerSecurityIncidentHandlingConference . 2002
- [9] What are MACtimes?. Farmer D. Dr.Dobb’s Journal . 2000
- [10] Secure deletion of data from magnetic and solid-state memory. GutmannP. Proceedings of the6thUSENIX SecuritySymposium . 1996