1 |
Kevin Mandia, Chris Prosise, Matt Pepe, “Incident response and computer forensic, Second Edition,” McGraw-Hill, 2003.
|
2 |
Warren G, Kruse II, Jay G.Heiser, “COMPUTER forensic: Incident Response Essentials,” Addison Wesley, 2001.
|
3 |
Qiong Liu, Reihaneh Safavi-Naini and Nicholas Paul Sheppard, “Digital rights management for content distribution,” AISW2003, 2003.
|
4 |
OMA, “OMA DRM Requirements Version 2.0,” 2004.
|
5 |
MPEG-21 Overview v.5, ISO/IEC JTC1/SC29/WG11 N5231, Shanghai, 2002.
|
6 |
DMP, “TIRAMISU(IST-2003-506983) DRM Requirements,” 2004.
|
7 |
RFC 3227, “Guidelines for Evidence Collecting and Archiving,” http://www.faqs.org/rfcs/rfc3227-.html. 2002.
|
8 |
Mariusz Burdach, “Forensic Analysis of a Live Linux System I,” http://www.securityfocus.com/infocus/1769. 2004.
|
9 |
Mariusz Burdach, “Forensic Analysis of a Live Linux System II,” http://www.securityfocus.com/infocus/1773 , 2004.
|
10 |
Seok-Hee Lee, “A Study of Memory Information Collection and Analysis in a view of Digital forensic in Window System,” Center for Information Technologies, Korea University, 2006. 2.
|