1. Kruse W II, Heiser JG (2002) Computer forensics: incident response essentials. Addison-Wesley, Boston
2. Nelson B, Phillips A, Enfinger F, Steuart C (2006) Guide to computer forensics and investigations, 2nd edn. Course Technology, Boston
3. Sammes T, Jenkinson B (2000) Forensic computing: a practitioner’s guide. Springer, London
4. Volonino L, Anzaldua R, Godwin J (2007) Computer forensics: principles and practices. Prentice Hall, Upper Saddle River, p 13
5. Vijayan V, Android forensic capability and evaluation of extraction tools. https://www.semanticscholar.org/paper/Android-Forensic-Capability-and-Evaluation-of-Tools-Vijayan/f206b30f4c8ff9c3ffc3a273e2a881136c09f96c