[1]
Craiger, Philip, Shenoi, Sujeet, and IFIP International Conference on Digital Forensics, Advances in digital forensics III: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 28-January 31, 2007, vol. International Federation for Information Processing. New York: Springer, 2007.
[2]
M. Cross, Developer’s guide to web application security. Rockland, MA: Syngress Pub, 2007 [Online]. Available: https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=289735
[3]
C. Davis, D. Cowen, and A. Philipp, Hacking exposed computer forensics: secrets & solutions, 2nd ed. London: McGraw-Hill, 2009 [Online]. Available: https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=4657693
[4]
Grimes, Roger A. and Johansson, Jesper M., Windows Vista security: securing Vista against malicious attacks. Hoboken, N.J.: Wiley, 2007.
[5]
D. Hook, Beginning cryptography with Java. Indianapolis, IN: Wiley Pub, 2005 [Online]. Available: https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=290512
[6]
Jones, Keith J., Bejtlich, Richard, and Rose, Curtis W., Real digital forensics: computer security and incident response. Boston, Mass: Addison-Wesley, 2005.
[7]
Lambrinoudakis, Costas, Pernul, G., Tjoa, A Min, and TrustBus 2007, Trust, privacy and security in digital business: 4th international conference, TrustBus 2007, Regensburg, Germany, September 4-6, 2007 ; proceedings, vol. Lecture notes in computer science. Berlin: Springer, 2007.
[8]
Marshall, Angus M., Digital forensics: digital evidence in criminal investigation. Chichester: Wiley, 2008.
[9]
Marshall, Angus M., Digital forensics: digital evidence in criminal investigation. Chichester, West Sussex, U.K.: Wiley-Blackwell, 2008 [Online]. Available: https://ebookcentral.proquest.com/lib/bournemouth-ebooks/detail.action?docID=454424
[10]
Mayer, Frank, MacMillan, Karl, and Caplan, David, SELinux by example: using security enhanced Linux, vol. Prentice Hall open source software development series. Harlow: Prentice Hall, 2006.
[11]
Skoudis, Ed, Malware: fighting malicious code, vol. Prentice Hall series in computer networking and distributed. Upper Saddle River, N.J.: Prentice Hall PTR, 2003.
[12]
Slade, Robert, Software forensics: collecting evidence from the scene of a digital crime. London: McGraw-Hill, 2004.