Annotated Bibliography

Anderson, Ross. “Why Cryptosystems Fail,”

Anonymous. Maximum Linux Security: A Hacker’s Guide to Protecting Your Linux Server and Workstation, Indianapolis: SAMS, 1999. This is a detailed source of information on specific attacks. It includes links to attack code, signs of attack, and countermeasures.

Bach, Maurice J. Design of the Unix Operating System, Englewood Cliffs, N.J.: Prentice-Hall, 1986. Although it is showing its age and doesn’t include many new developments such as /proc or Linux, a forensic technician is well-advised to have as detailed an understanding of Unix internals as presented in this classic.

Boyle, Phillip. “Intrusion Detection FAQ,” ...

Get Computer Forensics: Incident Response Essentials now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.