References
[bib-01] An Introduction to Intrusion Detection Assessment. Herndon, VA: ICSA Labs, 2005.
.[bib-02] Hiding Data, Forensics and Anti-Forensics. Berghel.net, 2007.
.[bib-03] "Data Hiding Tactics for Windows and UNIX File Systems." Identity Theft and Financial Fraud Research and Operation Center, May 26, 2006. http://www.berghel.net/publications/data_hiding/data_hiding.php (accessed June 1, 2010).
, , and .[bib-04] CSO, June 8, 2007. http://www.csoonline.com/article/221208/The_Rise_of_Anti_Forensics (accessed May 20, 2010).
. "The Rise of Anti-Forensics."[bib-05] Government Computer ...
. "Forensics Tools Can Help Stop Threats to Ever-Expanding Networks."Get System Forensics, Investigation, and Response now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.