Baker R. (2000) "Harold Shipman's Medical Practice 1974–1998", Department of Health Audit Report, (Available online at http://www.doh.gov.uk/hshipmanpractice/shipman.pdf)
Bates J. (1999) "Judicial Review relating to Search Warrants - Discussion Paper", International Journal of Forensic Computing (Available online at http://www.forensiccomputing.com/archives/judicial.html)
Flusche K. J. (2001) "Computer Forensic Case Study: Espionage, Part 1 Just Finding the File is Not Enough!", Information Systems Security, March/April 2001, Auerbach
Mattei M.,Blawie J. F. and Russell A. (2000) Connecticut Law Enforcement Guidelines for Computer Systems and Data Search and Seizure, State of Connecticut Department of Public Safety and Division of Criminal Justice.
Meighan C. W. (1966) Archaeology: an Introduction, p. 18, San Francisco: Chandler Publishing Company.
Thornton J. I. (1997) "The General Assumptions and Rationale of Forensic Identification", for David L. Faigman, David H. Kaye, Michael J. Saks, & Joseph Sanders, Editors, Modern Scientific Evidence: The Law and Science of Expert Testimony, Volume 2, St. Paul, MN: West Publishing Company.
United States Department of Justice (2001) "Electronic Crime Scene Investigation: A Guide for First Responders", National Institute of Justice, NCJ 187736 (Available online at http://www.ncjrs.org/pdffiles1/nij/187736.pdf).