1. Accessdata inc. web portal, available at http://www.accessdata.com , last accessed in march 2010.
2. Adelstein, F.: Live forensics: diagnosing your system without killing it first. Communications of the ACM 49(2), 63-66 (2006). DOI http://doi.acm.org/10.1145/1113034.1113070 .
3. Amoroso, E.G.: Intrusion detection: an introduction to Internet surveillance, correlation, traps, trace back, and response, 1st ed edn. Intrusion.Net Books, Sparta, NJ (1999)
4. Bach, M.J.: The design of the UNIX operating system. Prentice-Hall, Inc., Upper Saddle River, NJ, USA (1986)
5. Bishop, M., Gollmann, D., Hunker, J., Probst, C.: Countering insider threats. In: Dagstuhl Seminar 08302, Dagstuhl Seminar Proceedings, p. 18 pp. Leibnitz Center for Informatics (2008)