12.3. NOTES

[]

[] Robert G. Bromley, "Data Recovery for Small Systems," Information Systems Audit & Control Journal (Volume 1, 1994): 45.

[]

[] Michael R. Anderson, "Electronic Fingerprints, Computer Evidence Comes of Age," (1996): 1.

[]

[] "A Stolen Computer As Star Witness," Law Enforcement Technology (May 1996): 58–59.

[]

[] Parts of this section adapted from Jack J. Champlain, "Computer Forensics Investigation," The Audit Report (Volume 9, Issue 3, 2000): 4–8.

[]

[] Channel 4000, "Two Face Felony Charges In Software Theft," www.channel4000.com (February 17, 2000).

[]

[] Greg Miller, "Impact of Internet Sex-Predator Stings Questioned," Seattle Times (September 26, 1999): A6.

[]

[] Peter Ruber, "State of Seige," IRM Magazine (Summer/Fall 1999): 10–11.

[]

[] Eric Lacitis, "Secrets on a Computer: Delete Key Doesn't Make Things Clear," Seattle Times (September 26, 1999): L1, L8.

[]

[] Id.

[]

[] Alan Brill, "Computer Forensics: Files from the Kroll Casebook," IRM Magazine (Summer/Fall 1999): 8–9.

[]

[] "Computer Forensics," SC Magazine (April 2000): 20–24.

[]

[] Id.

[]

[] "Computer Forensics," SC Magazine (October 1998): 16–21.

[]

[] Philip Jan Rothstein, "Incident Response: Now What?" Information Security (May 1999): 37–41.

[]

[] Mark Bigler, "Computer Forensics," Internal Auditor (February 2000): 53–55.

[]

[] Bill Betts, "Crime Seen," Information Security (March 2000): 33–39.

[]

[] "Computer Forensics," SC Magazine (April 2000): 20–24.

[]

[] Lacitis, "Secrets on a Computer."

[]

[] Rothstein, "Incident ...

Get Auditing Information Systems, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.