1. Recognizing Potential Evidence, www.computerforensicsworld.com
2. Conducting a Search and/or Seizure, www.computerforensicsworld.com
3. Legal Perspective: Searching for and Seizing Information, www.computerforensicsworld.com
4. . Computer Forensics: Incident Response Essentials. Addison-Wesley Professional: Reading, MA, 2001.
5. File System Forensic Analysis. Addison-Wesley Professional: Reading, MA, 2005.