1Wolfe H.Evidence Analysis,Computers and Security Vol 22 (4),May 2003.
2ENFSI; Guidelines for Best Practice in the Forensic Examination of Digital Technology,European Network of Forensic Science Institutes,October 2003.
3Matthew Meyers and Marc Rogers,Computer Forensics:The Need for Standardization and Certification,International Journal of Digital Evidence,Fall 2004,Volume 3,Issue 2.
4P.Stephenson,Modeling of Post-Incident Root Cause Analysis,International Journal of Digital Evidence,Vol.2 Issue 2,Fall 2003.
5B.Grundy,The Law Enforcement and Forensic Examiner Introduction to Linux:A Beginner's Guide,January 2004.Available:http://www.linux-forensics.com/linuxintro-LEFE-2.0.5.pdf.
6Robert Rowlingson Ph.D,A Ten Step Process for Forensic Readiness,International Journal of Digital Evidence,Winter 2004,Volume 2,Issue 3.
7Pollitt,Mark.A framework for digital forensic science.In Digital Forensics Research Workshop (DFRWS),Baltimore,Maryland,August 2004.