Počítačová forenzní věda (Czech Wikipedia)

Analysis of information sources in references of the Wikipedia article "Počítačová forenzní věda" in Czech language version.

refsWebsite
Global rank Czech rank
low place
low place
3rd place
25th place
504th place
471st place
1st place
1st place
881st place
2,363rd place
275th place
1,360th place
low place
low place
3,828th place
3,296th place
low place
low place
741st place
1,164th place

books.google.com

  • Warren G. Kruse; JAY G. HEISER. Computer forensics: incident response essentials. [s.l.]: Addison-Wesley, 2002. Dostupné online. ISBN 0-201-70719-5. S. 392. 
  • CASEY, Eoghan. Digital Evidence and Computer Crime, Second Edition. [s.l.]: Elsevier, 2004. Dostupné online. ISBN 0-12-163104-4. 

fbi.gov

  • Michael G. Noblett; MARK M. POLLITT; LAWRENCE A. PRESLEY. Recovering and examining computer forensic evidence [online]. October 2000 [cit. 2010-07-26]. Dostupné online. 

google.co.uk

books.google.co.uk

  • VARIOUS. Handbook of Digital Forensics and Investigation. Redakce Eoghan Casey. [s.l.]: Academic Press, 2009. Dostupné online. ISBN 0-12-374267-6. S. 567. 
  • Aaron Phillip; DAVID COWEN; CHRIS DAVIS. Hacking Exposed: Computer Forensics. [s.l.]: McGraw Hill Professional, 2009. Dostupné online. ISBN 0-07-162677-8. S. 544. 

nla.gov.au

trove.nla.gov.au

  • Adams, R. 'The Advanced Data Acquisition Model (ADAM): A process model for digital forensic practice [online]. 2012. Dostupné online. 

nsf.gov

  • EXP-SA: Prediction and Detection of Network Membership through Automated Hard Drive Analysis [online]. Dostupné online. 

princeton.edu

citp.princeton.edu

sans.org

  • Dunbar, B. A detailed look at Steganographic Techniques and their use in an Open-Systems Environment [online]. January 2001. Dostupné online. 

simson.net

  • Garfinkel, S. Forensic Feature Extraction and Cross-Drive Analysis [online]. August 2006. Dostupné online. 

utica.edu

  • Leigland, R. A Formalization of Digital Forensics [online]. September 2004. Dostupné online. 
  • Gunsch, G. An Examination of Digital Forensic Models [online]. August 2002. Dostupné online. 

web.archive.org

  • J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, and Edward W. Felten. Lest We Remember: Cold Boot Attacks on Encryption Keys. citp.princeton.edu. Princeton University, 2008-02-21. Dostupné online [cit. 2009-11-20].  Archivovaná kopie. citp.princeton.edu [online]. [cit. 2015-01-14]. Dostupné v archivu pořízeném z originálu dne 2011-07-22. 
  • Geiger, M. Evaluating Commercial Counter-Forensic Tools [online]. March 2005 [cit. 2015-01-14]. Dostupné v archivu pořízeném dne 2014-12-30.