Brenner, Susan, Brian Carrier, and Jef Henninger. "The Trojan Defense in Cybercrime Cases." Santa Clara Computer and High Technology Law Journal, 21(1), 2004.
Bejtlich, Richard. The Tao of Network Security Monitoring: Beyond Intrusion Detection. Boston: Addison Wesley, 2005.
Carrier, Brian. "Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers." International Journal of Digital Evidence, Winter 2003a. http://www.ijde.org.
Carrier, Brian. "Open Source Digital Forensic Tools: The Legal Argument." Fall 2003b. http://www.digital-evidence.org.
Carrier, Brian, and Eugene H. Spafford. "Getting Physical with the Digital Investigation Process." International Journal of Digital Evidence, Fall 2003. http://www.ijde.org.
Casey, Eoghan. Digital Evidence and Computer Crime. 2nd ed. London: Academic Press, 2004.
Clifford, Ralph, ed. Cybercrime: The Investigation, Prosecution, and Defense of a Computer-Related Crime. Durham: Carolina Academic Press, 2001.
George, Esther. "UK Computer Misuse ActThe Trojan Virus Defense." Journal of Digital Investigation, 1(2), 2004.
The Honeynet Project. Know Your Enemy. 2nd ed. Boston: Addison-Wesley, 2004.
Houghton Mifflin Company. The American Heritage Dictionary. 4th ed. Boston: Houghton Mifflin, 2000.
Mandia, Kevin, Chris Prosise, and Matt Pepe. Incident Response and Computer Forensics. 2nd ed. Emeryville: McGraw Hill/Osborne, 2003.
Schneier, Bruce. Applied Cryptography. 2nd ed. New York: Wiley Publishing, 1995.
Part I: Foundations
Digital Investigation Foundations
Computer Foundations
Hard Disk Data Acquisition
Part II: Volume Analysis
Volume Analysis
PC-based Partitions
Server-based Partitions
Multiple Disk Volumes
Part III: File System Analysis
File System Analysis
FAT Concepts and Analysis
FAT Data Structures
NTFS Concepts
NTFS Analysis
NTFS Data Structures
Ext2 and Ext3 Concepts and Analysis
Ext2 and Ext3 Data Structures
UFS1 and UFS2 Concepts and Analysis
UFS1 and UFS2 Data Structures
Summary
Bibliography
Bibliography