Computer Forensics in Cloud Computing Systems
Abstract
Keywords
Full Text:
PDFReferences
Cloud Security Alliance “Security Guidance for Critical Areas of Focus in Cloud Computing” 2009.
Ghemawat, S., Gobioff, H., Leung, S-T, Chen W.-K, The Google File System.2003.
Kingston. http://www.kingston.com/flash/dt300.asp?id=1.
RFC 3227. http://www.faqs.org/rfcs/rfc3227.html.
Farmer, D. Venema, W. “Forensic Computer Expertise. Theory and Applied Practice” Pearson Prentice Hall, 2007.
Carvey, H. “Windows Forensics Analysis DVD toolkit”, 2nd Ed., Syngress, 2009.
Russinovich, M., Solomon, David A. “Microsoft Windows Internals”, 5th Ed., Microsoft Press, 2004.
SRI International. http://mtc.sri.com/Conficker/.
Microsoft. “A description of Svchost.exe in Windows XP Professional Edition”. http://support.microsoft.com/kb/314056.
Microsoft. “Virus alert about the Win32/Conficker.B worm”. http://support.microsoft.com/kb/962007
Jeff Bryner. Pdgmail – http://www.jeffbryner.com/code/pdgmail. Pdymail - http://www.jeffbryner.com/code/pdymail.
Andreas Schuster. “Data Lifetime”. http://computer.forensikblog.de/en/2006/04/data_lifetime.html
Network Working Group; Request for Comments: 3227; BCP: 55.
DOI: https://doi.org/10.33258/birex.v1i1.141
Article Metrics
Abstract view : 343 timesPDF - 246 times
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.