1 |
Peter Gutmann, 'Secure Deletion of Data from Magnetic and Solid-State Memory', the Sixth USENIX Security Symposium Proceedings, July 22-25, 1996
|
2 |
Eoghan Casey, 'Digital Evidence and Computer Crime', p. 62-p.63, ACADEMIC PRESS 2003
|
3 |
Seokhee Lee, A. Savoldi, Sangjin Lee, and Jongin Lim, 'Password recovery using an evidence collection tool and countermeasures', Intelligent Information Hiding and Multimedia Signal Processing, Proc. IEEE, 2007
|
4 |
Department of Defense 5220-22-M Standards
|
5 |
NSRL, http://www.nsrl.nist.gov
|
6 |
Ryan Harris, 'Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem', Digital Forensic Reserach Workshop, Digital Investigation, Elsevier, 2006
|
7 |
C. Kevin. Incident Response and Computer Forensics. McGraw-Hill, 2003
|
8 |
Kyle Rankin, 'KNOPPIX HACKS', O'RELLY, 2005
|
9 |
Brian Carrier. 'File System Forensic Analysis', Addison Wesley, 2005
|
10 |
이형우, 이상진, 임종인, '컴퓨터 포렌식스 기술', 한국정보보호학회지, 2002년 10월
|
11 |
File wipe Definition: TechEncyclopedia from TechWebhttp://www.techweb.com/encyclopedia/defineterm.jhtml?term=Filewipe
|
12 |
Kyle Rankin, 'KNOPPIX HACKS', O'RELLY, 2005 '실행 파일 압축', 위키백과, http://ko.wikipedia.org/wiki
|
13 |
Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu, 'Data Hiding Fundamentals and Applications', Elsevier Academy press, 2004
|
14 |
김현상, 박상헌, 이상진, 임종인, '디지털 포렌식을 위한 최적화된 슬랙 공간 검색 기법', 한국정보보호학회 동계학술대회, 2005
|
15 |
Richard P. Salgado, 'FOURTH AMENDMENT SEARCH AND THE POWER OF THE HASH', Searches and Seizures in a Digital World, 119 HARV. L. REV. 531, 2005
|
16 |
이홍재, '하드 디스크 이해', 전자신문사 , 2003
|