Online Material
1. Beta Systems. “Immediate Escalation of Security Related Events” (http://www.betasystems.com).
2. Brenner, Susan . “Private Computing Security, Approaches to Computer Security: Practical and Legal Issues” (http://www.cybercrimes.net).
3. BS 7799 “Security Standards” (http://bsonline.techindex.co.uk).
4. Collie, Byron S. “Computer Investigation and Post-Intrusion Computer Forensics Analysis” (http://www.usyd.co.au/su/is/comms/security).
5. Ernst and Young . “Computer Forensics, Response Versus Reaction an Expert Paper” (http://www.ey.com/au/itrma).
6. Feldman, John, and Joseph V. Giordano . “Cyber Forensics” (http://www.afrl.af.mil/techconn).
7. ISO 17799 “Security Standards” (http://www.iso.ch).
8. Meta Security Group. “Incident ...
Get Security+ Training Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.