References


Burnette M. (2002) "Forensic Examination of a RIM (BlackBerry) Wireless Device" (Available online at http://www.rh-law.com/ediscovery/Blackberry.pdf).

Grand J. (2002) Proceedings of the 14th Annual Computer Security Incident Handling Conference, Waikoloa, Hawaii, June 24–28, Forum of Incident Response and Security Teams (Available online at http://www.mindspring.com/~jgrand/pdd/pdd-palm-forensics.pdfand http://www.atstake.com/research/reports/acrobat/pdd_palm_forensics.pdf).

Digital Discovery & e-Evidence, May 2001, "New Rules on Cell Phone Monitoring Systems Fuel Interest in Embedded Systems."

Palm OS Memory Architecture (Available online at http://oasis.palm.com/dev/kb/papers/1145.cfm).

Palm OS Memory and Database Management (Available online at http://oasis.palm.com/dev/kb/papers/2029.cfm).

van der Knijff R. (2001) Embedded System Analysis, Casey, E. (editor) Handbook of Computer Crime Investigation, London: Academic Press




Digital Evidence and Computer Crime
Digital Evidence and Computer Crime, Second Edition
ISBN: 0121631044
EAN: 2147483647
Year: 2003
Pages: 279

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net