Home > Articles > Security > Network Security

  • Print
  • + Share This
This chapter is from the book

References

Anson, S., and S. Bunting. 2007. Mastering Windows network forensics and investigation. Boca Raton: Sybex.

Casey, E. 2004. Digital evidence and computer crime. New York: Elsevier Academic Press.

Hargrove v. Commonwealth. 2009. Record No. 2410-07-2. Court of Appeals of Virginia Published Opinions. www.courts.state.va.us/wpcap.htm (accessed April 8, 2010).

Hargrove v. Commonwealth, 44 Va. App. 733, 607 S.E.2d 734 (2009). www.lexisone.com/lx1/caselaw/freecaselaw?action=OCLGetCaseDetail&format=FULL&sourceID=bdjcca&searchTerm=eGjb.diCa.aadj.eeWH&searchFlag=y&l1loc=FCLOW (accessed April 8, 2010).

Jeter v. Commonwealth, 44 Va. App. 733, 737, 607 S.E.2d 734 (2005).

Kruse, W., and J. Heiser. 2001. Computer forensics: Incident response essentials. Boston: Addison-Wesley.

Lebedoff, D. 1997. Cleaning up: The Exxon Valdez case—The story behind the biggest legal bonanza of our time. New York: Free Press.

Marcella, A., Jr., and D. Menendez. 2008. Cyber forensics: A field manual for collecting, examining, and preserving evidence of computer crimes, 2nd ed. Florida: Auerbach Publications.

Reyes, A. 2007. Cyber crime investigations. Rockland: Syngress Publishing

Wysocki, R. 2009. Effective project management: Traditional, agile, extreme. 5th ed. Indianapolis: John Wiley & Sons.

Zubulake v. UBS Warburg, 217 F.R.D. at 320 (2003).

  • + Share This
  • 🔖 Save To Your Account