References

[bib-01] Rebecca Bace,. An Introduction to Intrusion Detection Assessment. Herndon, VA: ICSA Labs, 2005.

[bib-02] Hal Berghel,. Hiding Data, Forensics and Anti-Forensics. Berghel.net, 2007.

[bib-03] Hal Berghel,, David Hoelzer, and Michael Sthultz. "Data Hiding Tactics for Windows and UNIX File Systems." Identity Theft and Financial Fraud Research and Operation Center, May 26, 2006. http://www.berghel.net/publications/data_hiding/data_hiding.php (accessed June 1, 2010).

[bib-04] Scott Berinato,. "The Rise of Anti-Forensics." CSO, June 8, 2007. http://www.csoonline.com/article/221208/The_Rise_of_Anti_Forensics (accessed May 20, 2010).

[bib-05] Maggie Biggs,. "Forensics Tools Can Help Stop Threats to Ever-Expanding Networks." Government Computer ...

Get System Forensics, Investigation, and Response now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.