Forensik digital: Perbedaan antara revisi
Konten dihapus Konten ditambahkan
Rescuing 0 sources and tagging 1 as dead.) #IABot (v2.0.8.1 |
Add 3 books for Wikipedia:Pemastian (20231209)) #IABot (v2.0.9.5) (GreenC bot |
||
(4 revisi perantara oleh 3 pengguna tidak ditampilkan) | |||
Baris 1:
{{Ilmu forensik|digital|image=Hard disk.jpg}}
[[Berkas:FLETC Glynco-aerial.gif|jmpl|Foto udara FLETC, tempat di mana standar forensik digital AS dikembangkan pada 1980-an dan 90-an|al=|260x260px]]
'''Forensik digital''' ({{lang-en|Digital
Landasan forensik digital ialah praktik pengumpulan, analisis, dan pelaporan data digital. Investigasi forensik digital memiliki penerapan yang sangat beragam. Penggunaan paling umum adalah untuk mendukung atau menyanggah asumsi kriminal dalam pengadilan [[pidana]] atau [[hukum sipil (sistem hukum)|perdata]].
Baris 351:
== Pendidikan dan penelitian ==
Pusat akademis pendidikan dan
[[Amerika Utara]]: Penn State University menawarkan ''Security and Risk Analysis Major'', Master Studi Profesional dalam Ilmu Informasi, Master Studi Profesional di bidang ''Homeland Security'', dan Ph.D. dalam Ilmu Informasi dan Teknologi di bidang forensik digital.{{sfnp|PennState|2018}}
Baris 366:
* {{Cite book|title=Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions|year=2009 |publisher=McGraw-Hill Education|isbn=9780071626774|asin=B002R0JXF4|edition=2|url=|last=Aaron |first=Phillip |last2=David |first2=Cowen |last3=Chris |first3=Davis|last-author-amp=yes|language=en|ref=harv}}
* {{cite work |last=Adams |first=Richard Brian |title='The Advanced Data Acquisition Model (ADAM): A process model for digital forensic practice |publisher=Murdoch University |year=2012 |url=http://researchrepository.murdoch.edu.au/14422/2/02Whole.pdf |deadurl=no |archiveurl=https://web.archive.org/web/20141114204845/http://researchrepository.murdoch.edu.au/14422/2/02Whole.pdf |archivedate=2014-11-14 |language=en |ref=harv }}
* {{cite work|last=Adams|first=Richard|title=Cybercrime and cloud forensics: applications for investigation processes|editor-first=Keyun|editor-last=Ruan|chapter=The emergence of cloud storage and the need for a new digital forensic process model|publisher=Information Science Reference (IGI Global)|place=USA|year=2013|url=http://researchrepository.murdoch.edu.au/19431/1/emergence_of_cloud_storage.pdf|isbn=9781466626935|pages=79–104|doi=10.4018/978-1-4666-2662-1.ch004|doi-access=free|language=en|ref=harv|access-date=2018-08-14|archive-date=2016-04-05|archive-url=https://web.archive.org/web/20160405111143/http://researchrepository.murdoch.edu.au/19431/1/emergence_of_cloud_storage.pdf|dead-url=no}}
* {{cite work|first=Richard|last=Adams|first2=Graham|last2=Mann|first3=Valerie|last3=Hobbs|date=2017|last-author-amp=yes|editor-first=Craig|editor-last=Valli|title=ISEEK, a tool for high speed, concurrent, distributed forensic data acquisition|url=http://ro.ecu.edu.au/adf/171/|work=The Proceedings of 15th Australian Digital Forensics Conference 5-6 December 2017|publisher=Security Research Institute, Edith Cowan University|place=Australia|doi=10.4225/75/5a838d3b1d27f|isbn=9780648127093|language=en|ref=harv|access-date=2018-08-14|archive-date=2018-03-25|archive-url=https://web.archive.org/web/20180325184204/http://ro.ecu.edu.au/adf/171/|dead-url=no}}
* {{cite web|title=Catching the ghost: how to discover ephemeral evidence with Live RAM analysis|first=Oleg|last=Afonin|first2=Yuri|last2=Gubanov|last-author-amp=yes|publisher=Belkasoft Research|year=2013|url=http://forensic.belkasoft.com/en/live-ram-forensics|language=en|ref=harv|access-date=2018-08-14|archive-date=2015-08-12|archive-url=https://web.archive.org/web/20150812054122/http://forensic.belkasoft.com/en/live-ram-forensics|dead-url=no}}
* {{cite journal |title=Mobile forensics: an overview, tools, future trends and challenges from law enforcement perspective |url=http://www.csi-sigegov.org/emerging_pdf/34_312-323.pdf |first=Rizwan |last=Ahmed |journal=6th International Conference on E-Governance |year=2008 |deadurl=no |archiveurl=https://web.archive.org/web/20160303222523/http://www.csi-sigegov.org/emerging_pdf/34_312-323.pdf |archivedate=2016-03-03 |language=en |ref=harv }}
* {{cite web |title=Validation of Forensic Tools and Software: A Quick Guide for the Digital Forensic Examiner |last=Brunty |first=Josh |publisher=Forensic Magazine |year=2011 |url=http://www.forensicmag.com/article/2011/03/validation-forensic-tools-and-software-quick-guide-digital-forensic-examiner |deadurl=no |archiveurl=https://web.archive.org/web/20170422033752/http://www.forensicmag.com/article/2011/03/validation-forensic-tools-and-software-quick-guide-digital-forensic-examiner |archivedate=2017-04-22 |language=en |ref=harv }}
Baris 374:
* {{cite web |title=Open Source Digital Forensic Tools: The Legal Argument |first=Brian |last=Carrier |publisher=@stake Research Report |year=2002 |url=http://www.digital-evidence.org/papers/opensrc_legal.pdf |deadurl=no |archiveurl=https://web.archive.org/web/20110726000427/http://www.digital-evidence.org/papers/opensrc_legal.pdf |archivedate=2011-07-26 |language=en |ref=harv }}
* {{cite web |last=Carrier |first=Brian |title=Basic Digital Forensic Investigation Concepts |url=http://www.digital-evidence.org/di_basics.html |year=2006 |deadurl=no |archiveurl=https://web.archive.org/web/20100226184652/http://www.digital-evidence.org/di_basics.html |archivedate=26 February 2010 |language=en |ref=harv }}
* {{cite book |last=Casey |first=Eoghan |title=Digital Evidence and Computer Crime |edition=2 |year=2004 |publisher=Academic Press |isbn=9780121631048 |asin=B001C4TECI |url=https://books.google.com/books?id=Xo8GMt_AbQsC |language=en |ref=harv |access-date=2018-08-14 |archive-date=2023-07-23 |archive-url=https://web.archive.org/web/20230723070653/https://books.google.com/books?id=Xo8GMt_AbQsC |dead-url=no }}
* {{cite book|editor-last=Casey|editor-first=Eoghan|title=Handbook of Digital Forensics and Investigation|year=2009|publisher=Academic Press|isbn=9780123742674|asin=B00486UK2K|url=https://books.google.com/books?id=xNjsDprqtUYC|language=en|ref=harv}}
* {{cite journal|last=Collier|first=P.A.|last2=Spaul|first2=B.J.|year=1992 |last-author-amp=yes|title=A forensic methodology for countering computer crime|journal=Computers and Law|publisher=Intellect Books|language=en|ref=harv}}
* {{cite web |title=Electronic Evidence Guide |author=Council of Europe |year=2013 |url=http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Documents/Electronic%20Evidence%20Guide/default_en.asp |deadurl=no |archiveurl=https://web.archive.org/web/20131227210748/http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Documents/Electronic%20Evidence%20Guide/default_en.asp |archivedate=2013-12-27 |language=en |ref=harv }}
* {{cite work |title=Digital Forensics Tools |author=DHS |year=2016 |url=https://www.dhs.gov/sites/default/files/publications/Digital-Forensics-Tools-TN_0716-508.pdf |work=System Assessment and Validation for Emergency Responders (SAVER): Tech Note |publisher=U.S. Department of Homeland Security |language=en |ref=harv |access-date=2018-08-18 |archive-date=2023-03-28 |archive-url=https://web.archive.org/web/20230328051744/https://www.dhs.gov/sites/default/files/publications/Digital-Forensics-Tools-TN_0716-508.pdf |dead-url=no }}
* {{cite work|last=Du|first=Xiaoyu|last2=Le-Khac|first2=Nhien-An|last3=Scanlon|first3=Mark|year=2017 |last-author-amp=yes|title=Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service|work=16th European Conference on Cyber Warfare and Security|arxiv=1708.01730 |publisher=University College Dublin|language=en|ref=harv}}
* {{cite work|title=Digital Forensic Pada Cyber Crime Dan Bagaimana Universitas Udayana Ikut Berperan Di Dalamnya|url=https://www.researchgate.net/profile/I_Putu_Agus_Eka_Pratama/publication/316018362_Digital_Forensic_Pada_Cyber_Crime_Dan_Bagaimana_Universitas_Udayana_Ikut_Berperan_Di_Dalamnya/links/58edacbfa6fdcc61cc1094ca/Digital-Forensic-Pada-Cyber-Crime-Dan-Bagaimana-Universitas-Udayana-Ikut-Berperan-Di-Dalamnya.pdf?origin=publication_detail|last=Eka Pratama|first=I Putu Agus|year=2017|work=Scientific News Magazine Udayana|place=Bali|publisher=Universitas Udayana|eissn=2528-3049|language=id|ref=harv|access-date=2018-08-14|archive-date=2018-08-14|archive-url=https://web.archive.org/web/20180814200947/https://www.researchgate.net/profile/I_Putu_Agus_Eka_Pratama/publication/316018362_Digital_Forensic_Pada_Cyber_Crime_Dan_Bagaimana_Universitas_Udayana_Ikut_Berperan_Di_Dalamnya/links/58edacbfa6fdcc61cc1094ca/Digital-Forensic-Pada-Cyber-Crime-Dan-Bagaimana-Universitas-Udayana-Ikut-Berperan-Di-Dalamnya.pdf?origin=publication_detail|dead-url=no}}
* {{cite web |title=Federal Rules of Evidence: Rule 702. Testimony by Expert Witnesses |url=http://federalevidence.com/rules-of-evidence#Rule702 |author=Federal Evidence Review |year=2015 |accessdate=14 Agustus 2018 |language=en |ref=harv |archive-date=2010-08-19 |archive-url=https://web.archive.org/web/20100819114909/http://federalevidence.com/rules-of-evidence#Rule702 |dead-url=yes }}
* {{cite journal|first=Simson L.|last=Garfinkel|title=Digital forensics research: The next 10 years|journal=Digital Investigation|volume=7|year=2010| language=en|ref=harv |issn=1742-2876|doi=10.1016/j.diin.2010.05.009}}
Baris 387:
* {{cite web|title=Technology Crime Investigation|url=http://www.daemon.be/maarten/forensics.html#dr|accessdate=17 August 2010|first=Maarten Van|last=Horenbeeck|year=2006a|archiveurl=https://web.archive.org/web/20080517022757/http://www.daemon.be/maarten/forensics.html#dr|archivedate=17 May 2008|language=en|ref=harv}}
* {{cite web|title=Technology Crime Investigation :: Mobile forensics|last=Horenbeeck|first=Maarten Van|url=http://www.daemon.be/maarten/forensics.html#mob|year=2006b|accessdate=14 Agustus 2018|archiveurl=https://web.archive.org/web/20080517022757/http://www.daemon.be/maarten/forensics.html#mob|archivedate=17 May 2008|language=en|ref=harv}}
* {{cite news|url=https://resources.infosecinstitute.com/computer-forensics-tools/|title=22 Popular Computer Forensics Tools [Updated for 2018]|last=InfoSec|first=|date=2018|work=|publisher=InfoSec Institute, Inc|newspaper=InfoSec Resources|publication-place=Chicago|language=en|access-date=15 Agustus 2018|ref=harv|archive-date=2020-03-26|archive-url=https://web.archive.org/web/20200326171720/https://resources.infosecinstitute.com/computer-forensics-tools/|dead-url=no}}
* {{cite web |title=ISO/IEC 17025:2005 |author=ISO |year=2005 |url=http://www.iso.org/iso/catalogue_detail.htm?csnumber=39883 |publisher=International Organization for Standardization |accessdate=14 Agustus 2018 |deadurl=no |archiveurl=https://web.archive.org/web/20110805204943/http://www.iso.org/iso/catalogue_detail.htm?csnumber=39883 |archivedate=5 August 2011 |language=en |ref=harv }}
* {{cite work|url=http://csrc.nist.gov/publications/nistpubs/800-72/sp800-72.pdf|title=Guidelines on PDA Forensics|last1=Jansen|first1=Wayne|last2=Ayers|first2=Richard|year=2004|last-author-amp=yes|publisher=NIST|work=NIST Special Publication (SP 800-72)|archiveurl=https://web.archive.org/web/20060212052654/http://csrc.nist.gov/publications/nistpubs/800-72/sp800-72.pdf|archivedate=12 February 2006|deadurl=no|accessdate=14 Agustus 2018|language=en|ref=harv}}
Baris 396:
* {{cite journal|first=Ruci|last=Meiyanti|first2=|last2=Ismaniah|title=Perkembangan Digital Forensik Saat Ini dan Mendatang|journal=Jurnal Kajian Ilmial UBJ |volume=15|issue=2|year=2015|pages=|eissn=2597-792X|place=Jawa Barat|publisher=Universitas Bhayangkara Jakarta Raya|language=id|ref=harv}}
* {{cite journal|first=Sarah |last=Mocas|title=Building theoretical underpinnings for digital forensics research|journal=Digital Investigation|volume=1|issue=1|year=2004|pages=|issn=1742-2876|doi=10.1016/j.diin.2003.12.004|language=en|ref=harv}}
* {{cite book|last=Mohay|first=George M.|title=Computer and intrusion forensics|url=https://archive.org/details/computerintrusio0000unse|year=2003|publisher=Artechhouse|isbn=1-58053-369-8| language=en|ref=harv}}
* {{cite web |title=2 Russians Face Hacking Charges |url=http://www.themoscowtimes.com/news/article/2-russians-face-hacking-charges/253844.html |author=Moscow Times |accessdate=3 September 2010 |year=2001 |deadurl=no |archiveurl=https://web.archive.org/web/20110622115054/http://www.themoscowtimes.com/news/article/2-russians-face-hacking-charges/253844.html |archivedate=22 June 2011 |language=en |ref=harv }}
* {{cite web |title=Electronic Crime Scene Investigation Guide: A Guide for First Responders |author=NIJ |publisher=National Institute of Justice |year=2001 |url=http://www.ncjrs.gov/pdffiles1/nij/187736.pdf |language=en |ref=harv |access-date=2018-08-14 |archive-date=2010-02-15 |archive-url=https://web.archive.org/web/20100215040703/http://www.ncjrs.gov/pdffiles1/nij/187736.pdf |dead-url=no }}
* {{cite web|author=NTNU|year=2018|title=Research Group: NTNU Digital Forensics|url=https://www.ntnu.edu/iik/digital_forensics#/view/about|website=NTNU|publisher=Norwegian University of Science and Technology|place=Norway|language=en|ref=harv|accessdate=14 Agustus 2018|archive-date=2023-06-02|archive-url=https://web.archive.org/web/20230602220737/https://www.ntnu.edu/iik/digital_forensics#/view/about|dead-url=no}}
* {{cite journal|last=Olivier|first=Martin S.|title=On metadata context in Database Forensics|url=http://www.sciencedirect.com/science/article/B7CW4-4TSD9G6-1/2/a5031117d753054d92f2afba332eadf8|accessdate=2 August 2010|doi=10.1016/j.diin.2008.10.001|year=2009|volume=5|issue=3–4|journal=Digital Investigation|pages=115–123|language=en|ref=harv
* {{cite work|title=A Road Map for Digital Forensic Research|url=https://www.dfrws.org/sites/default/files/session-files/a_road_map_for_digital_forensic_research.pdf|work=Report From the First Digital Forensic Research Workshop (DFRWS) August 7-8, 2001|place=Utica, New York|accessdate=14 Agustus 2018|editor-last=Palmer|editor-first=Gary|year=2001|publisher=Mitre Corporation|language=en|ref=harv|archive-date=2018-10-09|archive-url=https://web.archive.org/web/20181009050615/http://www.dfrws.org/sites/default/files/session-files/a_road_map_for_digital_forensic_research.pdf|dead-url=yes}}
* {{cite work|title=Forensic analysis in the digital world|url=https://utica.edu/academic/institutes/ecii/publications/articles/9C4E938F-E3BE-8D16-45D0BAD68CDBE77.doc|work=International Journal of Digital Evidence|accessdate=14 Agustus 2018|last=Palmer|first=Gary|year=2002|publisher=Mitre Corporation|language=en|ref=harv|archive-date=2023-01-09|archive-url=https://web.archive.org/web/20230109074947/https://www.utica.edu/academic/institutes/ecii/publications/articles/9C4E938F-E3BE-8D16-45D0BAD68CDBE77.doc|dead-url=no}}
* {{cite web|author=PennState|year=2018|title=Security and Risk Analysis (SRA)|url=https://ist.psu.edu/students/undergrad/majors/sra|website=Penn State's College of Information Sciences and Technology|publisher=Pennsylvania State University|place=|language=en|ref=harv|accessdate=14 Agustus 2018|archive-date=2019-11-02|archive-url=https://web.archive.org/web/20191102004101/https://ist.psu.edu/students/undergrad/majors/sra|dead-url=no}}
* {{cite journal|last=Peterson|first=Gilbert|last2=Shenoi|first2=Sujeet |last-author-amp=yes|title=Digital Forensic Research: The Good, the Bad and the Unaddressed|journal=Advances in Digital Forensics V|year=2009|publisher=Springer Boston|pages=|volume=306|doi=10.1007/978-3-642-04155-6_2|series=IFIP Advances in Information and Communication Technology|bibcode=2009adf5.conf...17B |language=en|ref=harv}}
* {{cite journal|title=Mobile device analysis|url=http://www.ssddfj.org/papers/SSDDFJ_V2_1_Punja_Mislan.pdf|first=SG|last=Punja|journal=Small Scale Digital Device Forensics Journal|year=2008|deadurl=yes|archiveurl=https://web.archive.org/web/20110728051616/http://www.ssddfj.org/papers/SSDDFJ_V2_1_Punja_Mislan.pdf|archivedate=2011-07-28|language=en|ref=harv}}
* {{cite journal|title=Sekilas Mengenai Forensik Digital|url=|first=Budi|last=Raharjo|journal=Jurnal Sosioteknologi|year=2013|volume=12|issue=29|pages=284-387|place=Bandung|publisher=Institut Teknologi Bandung|doi=10.5614/sostek.itbj.2013.12.29.3|doi-access=free|issn=1858-3474|eissn=2443-258X |language=id|ref=harv}}
* {{cite journal|title=Implementasi dan Analisis Forensika Digital pada Fitur TRIM Solid State Drive|url=https://www.researchgate.net/profile/Yudi_Prayudi/publication/321860707_IMPLEMENTASI_DAN_ANALISIS_FORENSIKA_DIGITAL_PADA_FITUR_TRIM_SOLID_STATE_DRIVE/links/5a35b30945851532e82f2942/IMPLEMENTASI-DAN-ANALISIS-FORENSIKA-DIGITAL-PADA-FITUR-TRIM-SOLID-STATE-DRIVE.pdf?origin=publication_detail|first=Rizdqi Akbar|last=Ramadhan|last2=Prayudi|first2=Yudi|last3=Sugiantoro|first3=Bambang|last-author-amp=yes|journal=Teknomatika|volume=9|issue=2|pages=1-13|year=2017|language=id|ref=harv|access-date=2018-08-19|archive-date=2018-08-20|archive-url=https://web.archive.org/web/20180820005905/https://www.researchgate.net/profile/Yudi_Prayudi/publication/321860707_IMPLEMENTASI_DAN_ANALISIS_FORENSIKA_DIGITAL_PADA_FITUR_TRIM_SOLID_STATE_DRIVE/links/5a35b30945851532e82f2942/IMPLEMENTASI-DAN-ANALISIS-FORENSIKA-DIGITAL-PADA-FITUR-TRIM-SOLID-STATE-DRIVE.pdf?origin=publication_detail|dead-url=no}}
* {{cite journal |title=An examination of digital forensic models |url=http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.9683 |journal=International Journal of Digital Evidence |accessdate=2 August 2010 |last=Reith |first=Mark |last2=Carr |first2=Clint |last3=Gunsch |first3=Gregg |year=2002 |last-author-amp=yes |deadurl=no |archiveurl=https://web.archive.org/web/20121015132426/http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.9683 |archivedate=15 October 2012 |language=en |ref=harv }}
* {{Cite book |title=High-Technology Crime: Investigating Cases Involving Computers |year=1995 |publisher=KSK Publications |isbn=0-9648171-0-1 |url=http://www.ncjrs.gov/App/abstractdb/AbstractDBDetails.aspx?id=175264 |first=K.S. |last=Rosenblatt |accessdate=4 August 2010 |deadurl=no |archiveurl=https://web.archive.org/web/20160307094418/https://www.ncjrs.gov/App/abstractdb/AbstractDBDetails.aspx?id=175264 |archivedate=7 March 2016 |language=en |ref=harv }}
* {{cite work|title=Legal Aspects of Digital Forensics|url=http://euro.ecom.cmu.edu/program/law/08-732/Evidence/RyanShpantzer.pdf|accessdate=14 Agustus 2018|first=Daniel J.|last=Ryan|first2=Gal|last2=Shpantzer|year=2006|last-author-amp=yes|deadurl=no|archiveurl=https://web.archive.org/web/20110815212937/http://euro.ecom.cmu.edu/program/law/08-732/Evidence/RyanShpantzer.pdf|archivedate=15 August 2011|language=en|ref=harv}}
* {{cite journal|first=Peter |last=Sommer|title=The future for the policing of cybercrime|journal=Computer Fraud & Security|volume=2004|issue=1|year=2004| language=en|ref=harv|issn=1361-3723|doi=10.1016/S1361-3723(04)00017-X}}
* {{cite work|year=2009|first=Elliot|last=Spencer|first2=Samuel J.|last2=Baker|first3=Erik|last3=Andersen|first4=Perlustro|last4=LP|title=Method and system for searching for, and collecting, electronically-stored information|last-author-amp=yes|url=https://patents.google.com/patent/US8392706|language=en|ref=harv|access-date=2018-08-14|archive-date=2023-03-06|archive-url=https://web.archive.org/web/20230306051009/https://patents.google.com/patent/US8392706|dead-url=no}}
* {{cite work |author=SWGDE |title=Best practices for Computer Forensics |year=2005 |url=http://swgde.org/documents/swgde2005/SWGDE%20Best%20Practices%20_Rev%20Sept%202004_.pdf |publisher=Scientific Working Group on Digital Evidence |accessdate=4 August 2010 |archiveurl=https://web.archive.org/web/20081227060158/http://www.swgde.org/documents/swgde2005/SWGDE%20Best%20Practices%20_Rev%20Sept%202004_.pdf |archivedate=27 December 2008 |deadurl=yes |language=en |ref=harv }}
* {{cite work|author=UK Government|title=Computer Misuse Act 1990|url=https://www.legislation.gov.uk/ukpga/1990/18/pdfs/ukpga_19900018_en.pdf|year=1990|publisher=The National Archives|place=UK|language=en|ref=harv|access-date=2018-08-14|archive-date=2023-05-21|archive-url=https://web.archive.org/web/20230521025141/https://www.legislation.gov.uk/ukpga/1990/18/pdfs/ukpga_19900018_en.pdf|dead-url=no}}
* {{cite web |author=University of Florida |title=Florida Computer Crimes Act |url=http://www.clas.ufl.edu/docs/flcrimes/chapter2_1.html |year=n.d. |accessdate=14 Agustus 2018 |deadurl=no |archiveurl=https://web.archive.org/web/20100612064428/http://www.clas.ufl.edu/docs/flcrimes/chapter2_1.html |archivedate=12 June 2010 |language=en |ref=harv }}
* {{cite work|url=http://www.jfcom.mil/newslink/storyarchive/2010/JOE_2010_o.pdf|title=The Joint Operating Environment|author=USJFCOM|year=2010|archiveurl=https://web.archive.org/web/20130810043238/http://www.jfcom.mil/newslink/storyarchive/2010/JOE_2010_o.pdf|archivedate=2013-08-10|language=en|ref=harv}}
* {{cite book|title=Computer forensics for dummies|url=https://archive.org/details/computerforensic0000volo|year=2008|publisher=For Dummies|isbn=9780470371916 | language=en|ref=harv |first=Linda |last=Volonino |first2=Reynaldo |last2=Anzaldua | last-author-amp=yes |asin=B001FA0WSE}}
* {{cite book|last=Wilding|first=
* {{cite journal|url=http://ieeexplore.ieee.org/iel5/8013/27399/01219052.pdf?arnumber=1219052|title=Computer forensics education|first=A.|last=Yasinsac|first2=R. F.|last2=Erbacher|first3=D. G.|last3=Marks|first4=M. M.|last4=Pollitt|first5=P. M.|last5=Sommer|last-author-amp=yes|year=2003|journal=IEEE Security & Privacy|issue=4|volume=99|accessdate=14 Agustus 2018|doi=10.1109/MSECP.2003.1219052|publisher=IEEE|place=US & Canada|language=en|ref=harv}}
{{refend}}
Baris 428:
* {{cite book|last=Jones|first=Andrew|title=Building a Digital Forensic Laboratory|year=2008|publisher=Butterworth-Heinemann|isbn=1-85617-510-3|page=312|url=https://books.google.com/books?id=F5IU7XXKwCQC}}
* {{cite book|last=Marshell|first=Angus M.|title=Digital forensics: digital evidence in criminal investigation|year=2008|publisher=Wiley-Blackwell|isbn=0-470-51775-1|page=148|url=https://books.google.com/books?id=MC0FPQAACAAJ}}
* {{cite book|last=Sammons|first=John|title=The basics of digital forensics: the primer for getting started in digital forensics|url=https://archive.org/details/basicsofdigitalf0000samm|year=2012|publisher=Syngress|isbn=1597496618}}
* {{cite book|last=Crowley|first=Paul|title=CD and DVD Forensics|publisher=Syngress|location=Rockland, MA|isbn=1597491284}}
* {{cite book|last=Easttom|first=Chuck|title=Certified Cyber Forensics Professional All in One Guide|publisher=McGraw-Hill|isbn=9780071839761}}
|