1. Password recovery toolkit (PRTK) user guide;AccessData,2008
2. A methodology for the repeatable forensic analysis of encrypted drives;Altheide,2008
3. AppleInc. Mac OS X has you coverd. Available: http://www.apple.com/macosx/security/; 2011 [accessed 20.01.11].
4. Practical approaches to recovering encrypted digital evidence;Casey;International Journal of Digital Evidence,2002
5. CBC. Quebec man sentenced in U.S. child porn case. CBC News. Available: http://www.cbc.ca/canada/montreal/story/2010/01/22/qe-child-porn-sentence.html?ref=rss; 2010 [accessed 20.01.11].