Computer Forensics in Cloud Computing Systems
Abstract
Keywords
Full Text:
PDFReferences
Cloud Security Alliance “Security Guidance for Critical Areas of Focus in Cloud Computing†2009.
Ghemawat, S., Gobioff, H., Leung, S-T, Chen W.-K, The Google File System.2003.
Kingston. http://www.kingston.com/flash/dt300.asp?id=1.
RFC 3227. http://www.faqs.org/rfcs/rfc3227.html.
Farmer, D. Venema, W. “Forensic Computer Expertise. Theory and Applied Practice†Pearson Prentice Hall, 2007.
Carvey, H. “Windows Forensics Analysis DVD toolkitâ€, 2nd Ed., Syngress, 2009.
Russinovich, M., Solomon, David A. “Microsoft Windows Internalsâ€, 5th Ed., Microsoft Press, 2004.
SRI International. http://mtc.sri.com/Conficker/.
Microsoft. “A description of Svchost.exe in Windows XP Professional Editionâ€. http://support.microsoft.com/kb/314056.
Microsoft. “Virus alert about the Win32/Conficker.B wormâ€. http://support.microsoft.com/kb/962007
Jeff Bryner. Pdgmail – http://www.jeffbryner.com/code/pdgmail. Pdymail - http://www.jeffbryner.com/code/pdymail.
Andreas Schuster. “Data Lifetimeâ€. http://computer.forensikblog.de/en/2006/04/data_lifetime.html
Network Working Group; Request for Comments: 3227; BCP: 55.
DOI: https://doi.org/10.33258/birex.v1i1.141
Article Metrics
Abstract view : 343 timesPDF - 246 times
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Â
_.gif)















_.gif)


