Recuperacion de datos.pdf


Vista previa del archivo PDF recuperacion-de-datos.pdf


Página 1...56 57 5859

Vista previa de texto


Bibliografía:

*Casey, E. (2000). Digital Evidence and Computer Crime: Forensic Science,
Computers and the
Internet. San Diego, CA: Academic Press.
*Icove, D., Seger, K., & VonStorch, W. (1995). Computer Crime. O'Reilly &
Associates.
*Kruse, W. G., & Heiser, J. G. (2001). Computer Forensics: Incident Response
Essentials .
Addison Wesley.
*Masters, G., & Turner, P. (2007). Forensic Data Recovery aand Examination of
Magnetic
Swipe Cloning Devices. Digital Investigation , 4 (1), 16-22.
Robbins, J. (2008). An Explanation of Computer Forensics. Retrieved April 9, 2008,
from
http://computerforensics.net/forensics.htm
*Stallings, W. (2003). Cryptography and Network Security 3/e. Prentice Hall.
*Turner, P. (2007). Applying a Forensic Approach to Incident Response, Network
Investigation
and System Administration using Digital Evidence Bags. Digital Investigation , 4
(1), 30-35.
*Turner, P. (2006). Selective and Intelligent Imaging Using Digital Evidence Bags.
Digital
Investigation , 3 (1), 59-64.
US-CERT. (2005). Computer Forensics. US-CERT , 1 (2).
*Wang, S.-J. (2007). Measures of Retaining Digital Evidence to Prosecute
Computer-Based
Cyber-Crimes. Computer Standards & Interfaces , 29 (2), 8.
[1] Computer Forensics: Computer Crime Scene Investigation, John R. Vacca,
Charles River Media © 2002 (731 paginas) ISBN:1584500182