Bibliography
Total Page:16
File Type:pdf, Size:1020Kb
Bibliography ACPO (2003) Good Practice Guide for Computer Based Electronic Evidence V3, Association of Chief Police Officers (ACPO), National Hi-Tech Crime Unit (NHTCU). Adams, C. K. (1981) Master Handbook of Microprocessor Chips, Tab Books Inc, Pennsylvania. Aikenhead, M. (1995) Legal knowledge based systems: some observations for the future, Web Journal of Current Legal Issues, [1995] 2 Web JCLI, 19 May. URL: http://webjcli. ncl.ac.uk/articles2/aiken2.html. Akdeniz, Y. (1996) Section 3 of the Computer Misuse Act 1990: an antidote for computer viruses!, Web Journal of Current Legal Issues, [1996] 3 Web JCLI, 24 May. URL: http:// webjcli.ncl.ac.uk/1996/issue3/akdeniz3.html. Akdeniz, Y.(1997) UK government policy on encryption, Web Journal of Current Legal Issues, [1997] 1 Web JCLI, 28 February. URL: http://webjcli.ncl.ac.uk/1997/issue1/ akdeniz1.html. Anderson,M.R.(1996) Erased files often aren’t,Government Technology Magazine,November. URL: http://www.govtech.net/magazine/story.php?id=95238. No longer available. ANSI (1996) ANSI X3.279-1996 – AT Attachment Interface with Extensions (ATA-2), ANSI, 11 West 42nd Street, New York, URL: http://alpha1.dyns.net/files/Drive/d0948r4c. pdf. Apple Computer Inc. (1999) More About IEEE 1394 and FireWire. URL: http://developer. apple.com/hardware/FireWire/More_about_Firewire.htm. No longer available. Apple Computer Inc. (2006) Device Drivers FireWire. URL: http://developer.apple.com/ hardwaredrivers/fireWire/Index.html. ASUS (2005) ASUS Motherboard A8N32-SLI, E2280, Second Edition V2, October 2005, ASUSTeK Computer Inc. Atzberger, P. and Zolli, A. (1996) Portable Network Graphics, Trincoll Journal. URL: http:// www.webtechniques.com/archives/1996/12/zolli/. Avanstar Inc. (undated) QuickView Plus from Stellent Corporation, republished under licence by Avantstar,Inc.,Corporate Headquarters,18986 Lake Drive East,Chanhassen,MN 55317, USA. URL: http://www.avantstar.com/. Barrett, N. (1997) Digital Crime – Policing the Cybernation, Kogan Page, London. Binary Research (1997) Ghost URL: http://www.ghostsoft.com/. Birch, P. (2006) An Investigation of the Novell Netware Storage Services (NSS) 6 File Storage System, with a View to Establishing A Method of Forensically Capturing Data From Netware 6 NSS Volumes, MSc Thesis, Cranfield University. Blackstock, S. (undated) LZW and GIF explained. URL: http://www.cis.udel.edu/~amer/ CISC651/lzw.and.gif.explained.html. Borland (1994) Borland C++ User’s Guide, Version 4.5,Borland International,Inc.,100 Borland Way, PO Box 660001, Scotts Valley, CA 95067-0001. Born, G. (1997) The File Formats Handbook. International Thompson Publishing, London. Bowker, A. L. and Drinkard, L. N. (1996) Downloading: using computer software as an investi- gative tool, Law Enforcement Bulletin,Federal Bureau of Investigation,June.URL: http:// www.fbi.gov/publications/leb/1996/june961.txt. Brouwer, A. E. (2004) Partition Types: List of Partition Identifiers for PCs. URL: http:// www.win.tue.nl/~aeb/linux/partitions/partition_types-1.html. 341 342 Forensic Computing Brown, C. L. T. (2004) Exchangeable Image file Format (ExIF), Technical White Paper, Technology Pathways LLC, 12 October. URL: http://www.TechPathways.com/uploads/ Exif.pdf. Brown, S. (1998) Hard Disk Partitioning, Why and How (for MS-DOS/Windows PCs), 18 November. URL: http://members.tripod.com/~diligent/hd-partn.htm. Chandler, D. (1994) Semiotics for Beginners, University of Wales,Aberystwyth. URL: http:// www.aber.ac.uk/media/Documents/S4B/semiotic.html. Choo, A. L.-T. and Mellors, M. (1995) Undercover police operations and what the suspect said (or didn’t say),Web Journal of Current Legal Issues,[1995] 2 WebJCLI,19 May,URL: http:/ /webjcli.ncl.ac.uk/articles2/choo2.html. Clarke, A. R. M. and Powys-Lybbe, D. (1986) The Amstrad CP/M Plus, MML Systems Ltd, London. Clede, B. (1993) Investigating computer crime is every department’s concern, Law and Order, July, URL: http://ourworld.Compuserve.com/homepages/BillC/compcrim.htm.No longer available. Collins,R.(2003) Dr Dobbs Microprocessor Resources, Protected Mode Basics,Copyright © 2003 Dr. Dobb’s Journal. URL: http://www.x86.org/articles/pmbasics/. CompactFlash Association (1999), CF+ and CompactFlash Specification Revision 1.4, 7/99, CompactFlash Association, P.O. Box 51537, Palo Alto, CA. URL: http://www. compactflash.org/. CompactFlash Association (2004),CF+ and CompactFlash Specification Revision 3.0,12/23/04, CompactFlash Association, P.O. Box 51537, Palo Alto, CA. URL: http://www. compactflash.org/. Computers & Law (1996) Discovery of computer data,Computers&Law,Spring.URL: http:/ /wings.buffalo.edu/law/Complaw/CompLawPapers/printup.htm.No longer available. Corel (1997) WordPerfect Document File Format, Corel WordPerfect Suite 8 Software Devel- opment Kit, in Corel/SDKs/Suite8/DOCS/B_1DOCIN.HTM. Committee of Ministers (1995) Concerning Problems of Criminal Procedure Law Connected with Information Technology, Recommendation No. R (95) 13 of the Committee of Ministers to Member States, Council of Europe, 11 September. URL: http://www. privacy.org/pi/intl_orgs/coe/info_tech_1995.html. Compaq (1997a) Power-on Self-Test (POST), 17 March. URL: http://172.18.229.243/ support/techzone/solutions/post.html. No longer available. Compaq (1997b) Power-on Self-Test Messages, 17 March. URL: http://www.cnunix.com/ ftp/Compaq/post_msgs.htm. Cramer, J. (1997) Legal research on the Internet, Computers&Law, 28 April. URL: http:// wings.buffalo.edu/Complaw/CompLawPapers/cramer.htm. No longer available. Darwin, I. F. (1992) file(0) synopsis. URL: http://unixhelp.ed.ac.uk/CGI/man-cgi?file. Davis, M. (1999) Forms of Unicode, President of the Unicode Consortium, IBM, 1 September. Downloaded from: http://icu.sourceforge.net/docs/papers/forms_of_unicode/. Dees, T. M. (1994) Dealing with computer evidence, Originally published in Law Enforcement Technolog y, 21(8), 48. URL: http://www.rrinvestigations.com/articles/computer- evidence.htm. No longer available online. Department of Justice (1994) Federal Guidelines for Searching and Seizing Computers,US Department of Justice, Criminal Division, Office of Professional Development and Training, July. URL: http://www.epic.org/security/computer_search_guidelines. txt. Deutsch, P. (1996) RFC 1952, GZIPfile format specification version 4.3, Network Working Group, May. Deyring, K.-P.(ed.) (2003) Serial ATA: High Speed Serialized AT Attachment, Revision 1.0a,7 January. Digital Research Inc.(1987) Operator’s and Programmer’s Guide for the Amstrad CPC6128 and PCW8256, William Heinemann Ltd, London. Dockery, M. (1995) Digital Discovery and Recovery: a New Kind of Evidence Gathering, Dockery Associates, Indianapolis. URL: http://www.pimall.com/nais/n.digit. discer.html. Bibliography 343 Downing, R. (1995) Magill and the Software Directive: are they interoperable?, Web Journal of Current Legal Issues, [1995] 4 Web JCLI, 28 September 1995, URL: http:// webjcli.ncl.ac.uk/articles4/downing4.html. Duncan, R. (1988) Advanced MS-DOS Programming, Microsoft Press, Redmond, WA. Elonex (1995) Elonex MT-500/I System Board Configuration Guide, August, Elonex plc, 2 Apsley Way, London NW2 7LF. Elonex (1997) MS-5156 User’s Manual, Rev 1.21,September. EMS (1987), LOTUS(R)/INTEL(R)/MICROSOFT(R), EXPANDED MEMORY SPECIFICATION [1], Version 4.0, 300275-005, October. Copyright © 1987, Lotus Development Corporation, Intel Corporation, Microsoft Corporation. EPIC (1994) EPIC analysis of new Justice department guidelines on searching and seizing computers, Criminal Law Reporter, 56(12) (21 December). URL: http://cpsr.org/ prevsite/cpsr/privacy/epic/guidelines_analysis.txt. Falbo, F. R. (1997) The Ref – Hardware Specs at Your Fingertips, 1 September. URL: http:// www.boutell.com/lsm/lsmbyid.cgi/001627. Feldman, M. (ed.) (undated) Graphics File Formats, URL: http://www.sjhf.net/Article/ fileformat/graphics/200608/180.html. Finch, S. G. (ed.) (1995) Information Technology – AT Attachment Interface with Extensions (ATA-2),Working Draft,Proposed American National Standard,X3T10 948D,Revision 3,17 January. URL: http://alpha1.dyns.net/files/Drive/d0948r4c.pdf. Free Software Foundation (2006) Why There Are No GIF files on GNU Web Pages,28February. http://www.gnu.org/philosophy/gif.html. Freer, J. (1987) Systems Design with Advanced Microprocessors, Pitman, Computer Systems Series, London. Garfinkel, S. (1995) PGP – Pretty Good Privacy, O’Reilly & Associates Inc., San Francisco. Gilbert, H. (1996) Surviving the Next Operating System. URL: http://pclt.cis.yale.edu/ pclt/OPSYS/Default.htm. Grand, J. (2002) Memory Imaging and Forensic Analysis of Palm OS Devices, @stake, Inc., 196 Broadway, Cambridge, MA. Gutmann, P. (1996) Secure deletion of data from magnetic and solid-state memory, Sixth USENIX Security Symposium Proceedings, San Jose, CA, 22–25 July. See also http:// www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html. Hamilton, E. (1992) JPEG File Interchange Fomat Version 1.02, C-Cube Microsystems, 1778 McCarthy Boulevard, Milpitas, CA. Hinckley, K. (1995) The GIF Format as Intellectual Property. URL: http://www.utopia.com/. No longer available. HMSO (1989) The Electricity at Work Regulations 1989,Statutory Instrument 1989 635,HMSO, London. Hoey,A. (1996) Analysis of The Police and Criminal Evidence Act,s.69 – Computer Generated Evidence,Web Journal of Current Legal Issues,[1996] 1 WebJCLI,25 January.URL: http:// webjcli.ncl.ac.uk/1996/issue1/hoey1.html. Hoffman, G. (1995) Computer Crime – Legal Enforcement in the Age of the Internet. URL: http://www.privnet.com/~hoffmang/jomc191/paper.html.No