• Tidak ada hasil yang ditemukan

Rinaldi Yulius - SGU Repository

N/A
N/A
Nguyễn Gia Hào

Academic year: 2023

Membagikan "Rinaldi Yulius - SGU Repository"

Copied!
3
0
0

Teks penuh

(1)

DESIGN OF A CYBER SECURITY LABORATORY, CASE STUDY: SGU AND ID-SIRTII

PROJECT LABORATORY DEVELOPMENT Page 112 of 136

Rinaldi Yulius

REFERECES

Books

BENTON, D. & GRINDSTAFF, F. Practical Guide to Computer Forensics.

BookSurge Publishing, 2006.

BRITZ, M. T. Computer Forensics and Cyber Crime. Prentice Hall, 2003.

BROWN, C. L. T. Computer Evidence: Collection and Preservation. Charles River Media, 2005.

BUNTING, S. & WEI, W. The Official EnCe: EnCase Certified Examiner Study Guide. Sybex, 2005.

CASEY, E. Digital Evidence and Computer Crime. Academic Press, 2004.

FISHER, B. A. Techniques of Crime Scenes Investigation. CRC Press, 2003.

GENGE, N. E. The Science of Crime Scene Investigation: The Forensics Case Book.

Ballantine Books, 2002.

JONES, A. & VALLI, C. Building a Digital Forensic Laboratory Establishing and Managing a Succesful Facility. Butterworth Heinemann and Syngress, 2009.

JONES, R. Internet Forensics. O'Reilly, 2005.

MARCELLA, A. & MENENDEZ, D. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes.

Auerbach, 2007.

MOHAY, G., ANDERSON, A. & COLLIE, B. Computer and Intrusion Forensics.

Artech House Publisher, 2003.

NELSON, B., PHILLIPS, A., ENFINGER, F. & STEUART, C. Guide to Forensics and Investigations. Cengage Learning, 2007.

REYES, A. & WILES, J. The Best Damn Cybercrime and Digital Forensics Book period. Syngress Publishing, 2007.

SCHPERBERG, R. & STANLEY, R. A. Cybercrime: Incident Response and Digital Forensics. Information Systems Audit and Control Association, 2005.

SHINDER, D. L. Scene of Cybercrime: Computer Forensics Handbook. Syngress, 2002.

SOLOMON, M. G., BARRET, D. & BROOM, N. Computer Forensics JumpStart.

Sybex, 2005.

(2)

DESIGN OF A CYBER SECURITY LABORATORY, CASE STUDY: SGU AND ID-SIRTII

PROJECT LABORATORY DEVELOPMENT Page 113 of 136

Rinaldi Yulius

WILDING, E. Computer Evidence: A Forensic Investigation Handbook. Sweet &

Maxwell, 1997.

Websites

"AccessData Forensic Toolkit." http://www.accessdata.com/forensictoolkit.html, accessed April 19, 2009

"AccessData investigators." http://www.accessdata.com/courses.html, accessed March 05, 2009

"ASCLD/LAB." http://www.ascld-lab.org/dual/indexdual.html, accessed March 05, 2009

"Asosiasi Penyelenggara Jasa Internet Indonesia." http://www.apjii.or.id, accessed April 08, 2009

"AusCERT Australia's National Computer Emergency Response Team."

http://www.auscert.org.au/, accessed June 07, 2009

"Computer Forensic Analysis." http://www.porcupine.org/forensics/, accessed April 09, 2009

"Computer Forensics | e-Discovery | Incident Response | Guidance Software Digital Investigations." http://www.encaseenterprise.com/, accessed March 16, 2009

"Computer Forensics and Incident Response." http://breach-inv.blogspot.com/, accessed April 13, 2009

"Cyber Security Malaysia." http://www.cybersecurity.my/en/, accessed March 07, 2009

"Digital Evidence: Standards and Principles (Forensic Science Communications)."

http://www.fbi.gov/hq/lab/fsc/backissu/april2000/swgde.htm, accessed April 17, 2009

"EC-Council Security Certification." http://www.eccouncil.org/, accessed February 24, 2009

"e-fense :: Cyber Security & Computer Forensics Software." http://www.e- fense.com/products.php, accessed March 11, 2009

"FIRST - Improving security together." http://www.first.org, accessed April 09, 2009

"Forensic Computers, Inc." http://www.forensic-computers.com/index.php, accessed May 19, 2009

"Guidance Software | The World Leader in Digital Investigation (TM)."

http://www.guidancesoftware.com/, accessed March 11, 2009

(3)

DESIGN OF A CYBER SECURITY LABORATORY, CASE STUDY: SGU AND ID-SIRTII

PROJECT LABORATORY DEVELOPMENT Page 114 of 136

Rinaldi Yulius

"IACIS | The International Association of Computer Investigative Specialists."

http://www.iacis.com/, accessed March 11, 2009

"ICS - Hard Drive Duplication, Copy Data, Clone Hard Drives, Hard Drives Duplicators." http://www.ics-iq.com/, accessed May 09, 2009

"ID-SIRTII | Indonesia Security Incident Response Team on Internet Infrastructure."

http://www.idsirtii.or.id/, accessed February 01, 2009

"Information Security Certification from GIAC." http://www.giac.org/, accessed June 2, 2009

"The International Society of Forensic Computer Examiners - ISFCE."

http://www.isfce.com/, accessed June 11, 2009

"ISO/IEC 17025:200 - General requirements for the competence of testing and calibration laboratories."

http://www.iso.org/iso/catalogue_detail.htm?csnumber=39883, accessed April 20, 2009

"JPCERT Coordination Center." http://www.jpcert.or.jp/english/, accessed May 05, 2009

"Kepolisian Negara Republik Indonesia." http://www.polri.go.id/, accessed April 17, 2009

"SANS Institute - Network, Security, Computer, Audit Information & Training."

http://www.sans.org/, accessed June 2, 2009

"Tableau, LLC." http://www.tableau.com/index.php, accessed May 09, 2009

"Technology Pathways - Computer Forensics, Digital Discovery, Auditing, Incident Response." http://www.techpathways.com/DesktopDefault.aspx, accessed April 19, 2009

"WetStone Technologies, Inc." http://wetstonetech.com/, accessed April 19, 2009

"WiebeTech Micro Storage Soultions - FireWire and USB Hard Drives."

http://www.wiebetech.com/, accessed April 23, 2009

Referensi

Dokumen terkait

Inkubator Teknologi, 5 April 2012, Kontrol Robot ARM dengan Arduino (online), (http://inkubator-teknologi.com/kontrol-robot-arm-dengan-arduino/, diakses tanggal 13 November

Hearst Newspaper, LLC Retrieved April 12, 2015, from Small Business - Chron - Four Basic Types Financial Ratios Used Measure Company's Performance: