Footnotes

Chapter 1

1 Computer forensics involves the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and/or root cause analysis. Read on for a more detailed description.

2 http://www.msnbc.com/news/417406.asp

3 http://www.jetform.com

4 http://www.tripwire.com

5 http://www.ics-iq.com

6 The syllabus can be viewed at http://www.forensics-intl.com.

7 Information is available at http://www.encase.com.

Chapter 2

1 From RFC 1918. (For more information on private addresses, see http://www.isi.edu/in-notes/rfc1918.txt.)

2 http://www.iana.org

3 http://galeb.etf.bg.ac.yu/~azdaja/changemac.html

4 http://www.icann.org/registrars/accredited-list.html

5 http://samspade.org/.

6 http://networksolutions.com/cgi-bin/whois/whois ...

Get Computer Forensics: Incident Response Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.