Online Material

1. Beta Systems. “Immediate Escalation of Security Related Events” (http://www.betasystems.com).

2. Brenner, Susan . “Private Computing Security, Approaches to Computer Security: Practical and Legal Issues” (http://www.cybercrimes.net).

3. BS 7799 “Security Standards” (http://bsonline.techindex.co.uk).

4. Collie, Byron S. “Computer Investigation and Post-Intrusion Computer Forensics Analysis” (http://www.usyd.co.au/su/is/comms/security).

5. Ernst and Young . “Computer Forensics, Response Versus Reaction an Expert Paper” (http://www.ey.com/au/itrma).

6. Feldman, John, and Joseph V. Giordano . “Cyber Forensics” (http://www.afrl.af.mil/techconn).

7. ISO 17799 “Security Standards” (http://www.iso.ch).

8. Meta Security Group. “Incident ...

Get Security+ Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.