Information Technology Reference
In-Depth Information
[20] Forte D., et al., in: Th.A. Johnson (Ed.), Forensic Computer Crime Investigation , Fo re n s i c
Science , CRC Press, November 2005.
[21] Forte D., et al., “Forensic analysis of UNIX systems”, in: H. Bidgoli (Ed.), Handbook of
Information Security , Wiley, New York, November 2005.
[22] Forte D., Zambelli M., Vetturi M., Maruti C., “SecSyslog: an alternative approach based
on covert channels”, in: Proceedings of the First International Workshop on Systematic
Approaches to Digital Forensic Engineering (SADFE 2005) .
[23] Chuvakin A., “Advanced log processing”, http://www.securityfocus.com .
[24] Wang W., Daniels Th.E., “Network forensics analysis with evidence graphs (demo pro-
posal)”, Department of Electrical and Computer Engineering, Iowa State University,
DFRWS Proceedings , 2005, New Orleans.
We suggest to read also the chapter “Wireless insecurities” by Michael Sthultz, Jacob
Uecker and Hal Berghel in this volume of the “Advances.” That chapter describes ways
to break into wireless networks.
Search WWH ::




Custom Search