References


Cisco (2002) "Creating Core Dumps", Internetworking Troubleshooting Handbook, 2nd Edition (Available online at www.cisco.com/univercd/cc/td/doc/cisintwk/itg_v1/tr19aa.htm)

Comer, D. E. (1995) Internetworking with TCP/IP Volume I: Principles, Protocols, and Architecture, 3rd edn. Upper Saddle River, NJ: Prentice Hall.

Henry P.,De Libero G. (1996) "Strategic Networking: From LAN and WAN to Information Superhighways", Massachusetts: International Thomson Publishing Company.

Microsoft (2000) "Interpreting IAS-formatted log files", Microsoft Windows 2000 Server Documentation (Available online at http://www.microsoft.com/windows2000/en/server/help/sag_ias_log1a.htm)

Morris R. T. (1995) "A Weakness in the 4.2BSD UNIX TCP/IP Software," Bell Labs Computer Science Technical Report 117 (February 25, 1985) (Available online at http://www.eecs.harvard.edu/~rtm/papers.html)

Route, Daemon (1997) "Juggernaut," Phrack 50 (Available online at http://www.phrack.com/show.php?p=50&a=6).

Shinkle P. (2002) "Serial Killer Caught By His Own Internet Footprint", St. Louis Post-Dispatch, 6-17-2002.

Shimomura T. and Markoff J. (1996) "Takedown: The Pursuit of Kevin Mitnick, America's Most Wanted Computer Outlaw - by the man who did it". New York: Hyperion.

Stevens W. R. (1994) TCP/IP Illustrated, Volume 1 Boston: Addison Wesley.

Tribune News Services (2000) "Black student charged with racist e-mail threats at college", April 21, 2000.




Digital Evidence and Computer Crime
Digital Evidence and Computer Crime, Second Edition
ISBN: 0121631044
EAN: 2147483647
Year: 2003
Pages: 279

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net