Casey E. (2003) "Cyberpatterns: Criminal Behavior on the Internet", Turvey, B. Criminal Profiling: An Introduction to Behavioral Evidence Analysis, 2nd Edition, London: Academic Press.
CSI/FBI (2003) Computer Crime and Security Survey, San Francisco: Computer Security Institute.
Gaudin S. (2000), "Case Study of Insider Sabotage: The Tim Lloyd/Omega Case", Number 3, 2000, Computer Security Journal, Volume XVI.
Mandia K.,Prosise C. and Pepe M. (2003) Incident Response and Computer Forensics, 2nd Ed., New York: Osborne.
O'Hara C. (1970), Fundamentals of Criminal Investigation, 2nd Ed., Springfield: Charles C. Thomas Publishers.
Phrack 59 (2002), "Defeating Forensic Analysis on Unix", July 2002 (http://www.phrack.org/show.php?p=59&a=6).
Phrack 58 (2001), "Armouring the ELF: Binary encryption on the UNIX platform", December, 2001 (http://www.phrack.org/show.php?p=58&a=5).