In the first edition of this book, we opened this chapter with these words: We have attempted, in this book, to offer a basic foundation for the professional practice of forensic computing. Our aim has been to put in place sufficient theory and good practice as to enable professionals to continue their development from a sound and confident starting point.
KeywordsHard Disk Plain Text Plain Text Message Strong Encryption Encrypt Version
Unable to display preview. Download preview PDF.
- Birch, P. (2006) An Investigation of the Novell Netware Storage Services (NSS) 6 File Storage System, with a View to Establishing A Method of Forensically Capturing Data From Netware 6 NSS Volumes, MSc Thesis, Cranfield University.Google Scholar
- Garfinkel, S. (1995) PGP - Pretty Good Privacy, O’Reilly & Associates Inc., San Francisco.Google Scholar
- Gutmann, P. (1996) Secure deletion of data from magnetic and solid-state memory, Sixth USENIX Security Symposium Proceedings, San Jose, CA, 22-25 July. See also www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html.
- Oechslin, P. (2005) Password Cracking: Rainbow Tables Explained, The International Infor-mation Systems Security Certification Consortium, Mar-Apr 2005 Newsletter. URL: https://www.isc2.org/cgi-bin/content.cgi?page=738.