Part 1. Onttrek Sep. 26, 2015 uit opensourceforu: http://opensourceforu.efytimes.com/2011/03/digital-forensic- analysis-using-backtrack-part-1/ available under Creative Commons Attribution- NonCommercial 3.0 Unported License.
Hacker (computer security). (Nov.). Onttrek Dec. 20, 2015 uit 2015: http://en.wikipedia.org/wiki/Hacker_(computer_security) available under the Creative Commons Attribution-ShareAlike License.
Havercan, P. (2015, July 17). A plain person's guide to Secure Sockets Layer. Onttrek Sep. 26, 2015 uit http://peter.havercan.net/computing/plain-persons-guide-to-secure-sockets- layer.html available under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Hazen, S. (2014). Hackers Used Police Tool to Steal Celeb Photos. NEWSER.
How do I know if a website is secure? (2015, Oct.). Onttrek Oct. 29, 2015 uit ccm.net: http://ccm.net/faq/2-how-do-i-know-if-a-website-is-secure available under the Creative Commons Attribution - NonCommercial - ShareAlike 3.0 France license.
How it works. (2010, Jan. 17). Onttrek Sep. 26, 2015 uit Wikidot: http://pychatter.wikidot.com/how-it-works available under Creative Commons Attribution- NonCommercial-ShareAlike 3.0 License.
How to Choose an Internet Browser. (s.j.). Onttrek Oct. 29, 2015 uit WikiHow: http://www.wikihow.com/Choose-an-Internet-Browser available under an Attribution- Noncommercial-Share Alike 3.0 Creative Commons License
How to Clear Your Browser's Cache. (s.j.). Onttrek Oct. 29, 2015 uit WikiHow: http://www.wikihow.com/Clear-Your-Browser%27s-Cache available under an Attribution- Noncommercial-Share Alike 3.0 Creative Commons License
How to Reveal a Fake Facebook Account. (s.j.). Onttrek Sep. 27, 2015 uit www.wikihow.com: http://www.wikihow.com/Reveal-a-Fake-Facebook-Account available under an Attribution-Noncommercial-Share Alike 3.0 Creative Commons License
How to Set up 2 Step Verification in Gmail. (s.j.). Onttrek Oct. 24, 2015 uit WikiHow: http://www.wikihow.com/Set-up-2-Step-Verification-in-Gmail available under an Attribution-Noncommercial-Share Alike 3.0 Creative Commons License
How to Set up 2 Step Verification in Gmail. (s.j.). Onttrek Oct. 29, 2015 uit http://www.wikihow.com/Set-up-2-Step-Verification-in-Gmail available under an Attribution-Noncommercial-Share Alike 3.0 Creative Commons License.
Introduction to Digital Forensics. (2011, Nov. 16). Onttrek Sep. 28, 2015 uit Wikibooks: https://en.wikibooks.org/wiki/Introduction_to_Digital_Forensics available under the Creative Commons Attribution-ShareAlike License
ISFS. (2004, April). Computer Forensics. Onttrek Dec. 20, 2015 uit http://www.isfs.org.hk/publications/ComputerForensics_part1.pdf
Kaur, R. P. (2013). Statistics of Cyber Crime in India: An Overview. International Journal Of Engineering And Computer Science , 2 (8).
Kerberos Authentication. (s.j.). Onttrek Sep. 26, 2015 uit Interactiva: http://computers.interactiva.org/Security/Authentication/Kerberos/ available under a Creative Commons Attribution-ShareAlike 3.0 Unported License
Kessler, G. C. (2001, Sep.). Steganography: Hiding Data Within Data. Onttrek Dec. 20, 2015 uit http://www.garykessler.net/library/steganography.html
Kessler, G. C. (2005, Dec.). The Role of Computer Forensics in Law Enforcement . Onttrek Dec. 20, 2015 uit http://www.garykessler.net/library/role_of_computer_forensics.html
Kumar, M. (2014). Xiaomi Phones Secretly Sending Users' Sensetive data to Chinese Servers.
The Hacker News.
Leung, C. (s.j.). Binding a Corporate Information Protection Strategy. Onttrek Dec. 20, 2015 uit http://www.isfs.org.hk/publications/011009/Collins-CIO&CeO.pdf
Lucas, I. (2009, July 10). Password Guidelines. Onttrek Oct. 24, 2015 uit Lockdown.co.uk: http://www.lockdown.co.uk/?pg=password_guide available under a Creative Commons Attribution-ShareAlike 2.0 License
Madhya Pradesh State Cyber Police. (2013). Recent Examples of Cyber Crime & E- Commerce Fraud Related Investigations in India.
Mcafee. (2014). Net Losses: Estimating the Global Cost of Cybercrime. Santa Clara.
Mehnle, J. (2010, April 17). Sender Policy Framework. Onttrek Sep. 28, 2015 uit Openspf: http://www.openspf.org/Introduction available under Creative Commons CC BY-SA 2.5
Mrunal. (2012). National Counter Terrorism Center (NCTC): Meaning, functions, Controversy.
Nair, S. (2009). Selected Case Studies on Cyber Crime.
Nandanwar, R. (2013). Case Study of Recent Examples of Cyber Crime and E-Commerce Fraud related Investigations involving IPR and Copyright Act.
Narayan, V. (2013). Mumbai bank hacked, Rs 2.4 crore siphoned off in 3 hours. Mumbai: The Economic Times.
Nelson, B., Phillips, A., & Steuart, C. (2009). Guide to Computer Forensics and Investigations. Cengage Learning.
Dostları ilə paylaş: |