References
- Ryan Harris, 'Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem', Digital Forensic Reserach Workshop, Digital Investigation, Elsevier, 2006
- Brian Carrier. 'File System Forensic Analysis', Addison Wesley, 2005
- File wipe Definition: TechEncyclopedia from TechWebhttp://www.techweb.com/encyclopedia/defineterm.jhtml?term=Filewipe
- Peter Gutmann, 'Secure Deletion of Data from Magnetic and Solid-State Memory', the Sixth USENIX Security Symposium Proceedings, July 22-25, 1996
- Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu, 'Data Hiding Fundamentals and Applications', Elsevier Academy press, 2004
- NSRL, http://www.nsrl.nist.gov
- Eoghan Casey, 'Digital Evidence and Computer Crime', p. 62-p.63, ACADEMIC PRESS 2003
- 김현상, 박상헌, 이상진, 임종인, '디지털 포렌식을 위한 최적화된 슬랙 공간 검색 기법', 한국정보보호학회 동계학술대회, 2005
- Richard P. Salgado, 'FOURTH AMENDMENT SEARCH AND THE POWER OF THE HASH', Searches and Seizures in a Digital World, 119 HARV. L. REV. 531, 2005
- C. Kevin. Incident Response and Computer Forensics. McGraw-Hill, 2003
- Seokhee Lee, A. Savoldi, Sangjin Lee, and Jongin Lim, 'Password recovery using an evidence collection tool and countermeasures', Intelligent Information Hiding and Multimedia Signal Processing, Proc. IEEE, 2007
- 이형우, 이상진, 임종인, '컴퓨터 포렌식스 기술', 한국정보보호학회지, 2002년 10월
- Department of Defense 5220-22-M Standards
- 이홍재, '하드 디스크 이해', 전자신문사 , 2003
- Kyle Rankin, 'KNOPPIX HACKS', O'RELLY, 2005
- Kyle Rankin, 'KNOPPIX HACKS', O'RELLY, 2005 '실행 파일 압축', 위키백과, http://ko.wikipedia.org/wiki