Looking Ahead (Just a Little Bit More)


In the first edition of this book, we opened this chapter with these words: We have attempted, in this book, to offer a basic foundation for the professional practice of forensic computing. Our aim has been to put in place sufficient theory and good practice as to enable professionals to continue their development from a sound and confident starting point.


Hard Disk Plain Text Plain Text Message Strong Encryption Encrypt Version 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Birch, P. (2006) An Investigation of the Novell Netware Storage Services (NSS) 6 File Storage System, with a View to Establishing A Method of Forensically Capturing Data From Netware 6 NSS Volumes, MSc Thesis, Cranfield University.Google Scholar
  2. Garfinkel, S. (1995) PGP - Pretty Good Privacy, O’Reilly & Associates Inc., San Francisco.Google Scholar
  3. Gutmann, P. (1996) Secure deletion of data from magnetic and solid-state memory, Sixth USENIX Security Symposium Proceedings, San Jose, CA, 22-25 July. See also
  4. Oechslin, P. (2005) Password Cracking: Rainbow Tables Explained, The International Infor-mation Systems Security Certification Consortium, Mar-Apr 2005 Newsletter. URL:
  5. Schneier, B. (1996) Applied Cryptography, Protocols, Algorithms and Source Code in C, John Wiley & Sons, New York.zbMATHGoogle Scholar

Copyright information

© Springer-Verlag London Limited 2007

Personalised recommendations