Casey E.,Larson T. and Long, H. M. (2002) Network Analysis, Casey, E. (editor) Handbook of Computer Crime Investigation, pp. 225-228, London: Academic Press.
Larson T. (2002) "Evidence Acquisition Boot Disk" (Available online at http://www.disclosedigital.com/eabd.html).
Microsoft (1999) "Back Up the Recovery Agent Encrypting File System Private Key in Windows 2000", Microsoft KB Q241201 (Available online at http://support.microsoft.com/default.aspx?scid=kb;[LN];Q241201)
Microsoft (2000) "FAT32 File System Specification", (Available online at http://www.microsoft.com/hwdev/hardware/fatgen.asp)
Microsoft (2001) "Detailed Explanation of FAT Boot Sector", MS KB140418 (Available online at http://support.microsoft.com/default.aspx?scid=KB;en-us;q140418)
Microsoft (2001) "Maximum Partition Size Using FAT16 File System" (Available online at http://support.microsoft.com/default.aspx?scid=kb;EN-US;118335)
Microsoft (2001) "General Information about Microsoft Office XP Encryption", Microsoft KB Article Q290112 (Available online at http://support.microsoft.com/default.aspx?scid=kb;en-us;Q290112)
Microsoft (2002) "Description of the FAT32 File System" (Available online at http://support.microsoft.com/default.aspx?scid=kb;EN-US;154997).
Microsoft (2002) "Limitations of FAT32 File System" (Available online at http://support.microsoft.com/default.aspx?scid=KB;en-us;q184006).
Sammes T. and Jenkinson B. (2000) Forensic Computing: A Practitioner's Guide, London: Springer.
Scott M. (2003) "Independent Review of Common Forensic Imaging Tools", Memphis Technology Group Report (Available at http://mtgroup.com/papers/ForensicImagingTools.pdf)
Sheldon B. (2001) Forensic Analysis of Windows Systems, Casey, E. (editor) Handbook of Computer Crime Investigation, London: Academic Press
Usborne D. (2002) "Has an old computer revealed that Reid toured world searching out new targets for al-Qa'ida?", UK Independent (Available online at http://www.independent.co.uk/story.jsp?story=114885)