Referências

[1] D. Brezinski and T. Killalea. Guidelines for Evidence Collection and Archiving. RFC 3227 (Best Current Practice), Feb. 2002.

[2] B. D. Carrier. A hypothesis-based approach to digital forensic investigations. Technical report, Purdue University, June 2006.

[3] B. G. de Oliveira. Abordagem estruturada em camadas para investigação forense digital, 2008.

[4] D. Farmer and W. Venema. Computer forensic analysis class, August 1999.

[5] C. R. D. Filho. Cadeia de custódia: do local de crime ao trânsito em julgado; do vestígio à evidência. Revista dos Tribunais, 883:436–451, 5 2009.

[6] J. C. Foster and V. Liu. catch me, if you can..., 2005.

[7] R. Froede and C. of American Pathologists. Handbook of Forensic Pathology. College of American Pathologists, 1990.

[8] T. Grugq. The art of defiling: Defeating forensic analysis, 2005.

[9] S. Janes. The role of technology in computer forensic investigations. Information Security Technical Report, 5(2):43 – 50, 2000.

[10] R. Magritte. La trahison des images, 1828-29.

[11] G. Palmer. A road map for digital forensic research. Technical Report DTR-T001-01, First Digital Forensic Research Workshop, Utica-NY, August 2001. http://www.dfrws.org/2001/dfrws-rm-final.pdf Acessado em 22 de maio de 2013.

[12] R. Saferstein. Criminalistics: an introduction to forensic science. Prentice Hall PTR, 2011.

[13] J. Siegel and P. Saukko. Encyclopedia of Forensic Sciences. Elsevier Science, 2012.

[14] A. N. Standard. Atis telecom glossary, May 2013.

[15] N. S. Telecommunications and I. S. S. Committee. National training standard for information systems security professionals. Trainnig Report NSTISSI-4011, National Security Agency, Fort George G. Meade, MD, June 1994. http://www.cnss.gov/Assets/pdf/nstissi_4011.pdf Acessado em 22 de maio de 2013.