1. Rubin R (1996) More distancing and the use of information: the seven temptations. In: Kizza JM (ed) Social and ethical effects of the computer revolution. McFarland & Company, Jefferson
2. Intrusion analysis. SANS.
https://www.sans.org/curricula/intrusion-analysis
3. Nelson B, Amelia P, Frank E, Chris S (2004) Guide to computer forensics and investigations. Course Technologies, Boston
4. Berghel H (2003) The discipline of internet forensics. Commun ACM 46(8):15
5. Kruse WII, Jay GH (2002) Computer forensics: incident response essentials. Addison-Wesley, Reading