1. Rubin R (1996) More distancing and the use of information: the seven temptations. In: Social and ethical effects of the computer revolution. McFarland & Company, Jefferson
2. Intrusion analysis.
http://www.crucialsecurity.com/intrusionanalysis.html
3. Nelson B, Amelia P, Frank E, Chris S (2004) Guide to computer forensics and investigations. Course Technologies, Boston
4. Berghel H (2003) The discipline of internet forensics. Commun ACM 46(8):15–20
5. Kruse W II, Jay GH (2002) Computer forensics: incident response essentials. Addison-Wesley, Reading