References and Links
The following is a list of references and helpful links:
Autopsy at: http://www.sleuthkit.org/autopsy/
Denning, D. and W. Baugh. "Hiding Crimes in Cyberspace," at: http://cryptome.org/hidingdb.htm
Electronic Crimes Task Force and Helpful Links, at: http://www.ectaskforce.org/ and http://www.ectaskforce.org/Helpful_Links.htm
Farmer, D. and W. Venema. "Computer Forensic Analysis Class Handouts," at: http://www.fish.com/forensics
Farmer, D. W. Venema. "What are MAC times?" Dr. Dobbs Journal, October 2000.
Federal Bureau of Investigation. FBI Law Enforcement Bulletin, April 1970.
Grand, J. "pdd: memory Imaging and Forensic Analysis of Pal OS devices," Proceedings of the 14th Annual Computer Security Incident Handling Conference, June 2002.
Internet Engineering Task Force, Request for Comments (RFC 1321, RFC 1918, and RFC 2644), at: http://ftp.rfc-editor.org/in-notes/
Masurkar, Vijay. "Responding to a Customer's Security IncidentsPart 1: Establishing Teams and a Policy." Sun BluePrints OnLine, March 2003, at: http://www.sun.com/solutions/blueprints/
Masurkar, Vijay. "Responding to a Customer's Security IncidentsPart 2: Executing a Policy." Sun BluePrints OnLine, April 2003, at: http://www.sun.com/solutions/blueprints/
Masurkar, Vijay. "Responding to a Customer's Security IncidentsPart 3: Following Up After an Incident." Sun BluePrints OnLine, April 2003, at: http://www.sun.com/solutions/blueprints/
Noordergraaf, Alex. Enterprise Security: Solaris Operating Environment. Prentice Hall, 2002.
Osser, W. and A. Noordergraaf. "Auditing in the Solaris 8 Operating Environment," Sun BluePrints OnLine, February 2001, at: http://www.sun.com/solutions/blueprints/
Powell, B., "Forensics Lite," ;login, November 2001.
Rude, T. "DD and Computer Forensics: Examples of Using DD within UNIX to Create Physical Backups," at: http://www.crazytrain.com/dd.html
SANS Denial of Service web site at: http://www.sans.org/dosstep/index.php
Security Incident Response web site at: http://www.incidentresponse.org/
Sun BluePrints Scripts and Tools web site at: http://www.sun.com/blueprints/tools/
Sun Microsystems, Inc. Solaris Security Toolkit, at: http://www.sun.com/software/security/jass
The Sleuth Kit, at: http://www.sleuthkit.org/sleuthkit/
The Coroner's Toolkit, at: http://www.fish.com/tct/
U.S. Government Secure Hash Signature Standard at: http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf