DESIGN OF A CYBER SECURITY LABORATORY, CASE STUDY: SGU AND ID-SIRTII
PROJECT LABORATORY DEVELOPMENT Page 112 of 136
Rinaldi Yulius
REFERECES
Books
BENTON, D. & GRINDSTAFF, F. Practical Guide to Computer Forensics.
BookSurge Publishing, 2006.
BRITZ, M. T. Computer Forensics and Cyber Crime. Prentice Hall, 2003.
BROWN, C. L. T. Computer Evidence: Collection and Preservation. Charles River Media, 2005.
BUNTING, S. & WEI, W. The Official EnCe: EnCase Certified Examiner Study Guide. Sybex, 2005.
CASEY, E. Digital Evidence and Computer Crime. Academic Press, 2004.
FISHER, B. A. Techniques of Crime Scenes Investigation. CRC Press, 2003.
GENGE, N. E. The Science of Crime Scene Investigation: The Forensics Case Book.
Ballantine Books, 2002.
JONES, A. & VALLI, C. Building a Digital Forensic Laboratory Establishing and Managing a Succesful Facility. Butterworth Heinemann and Syngress, 2009.
JONES, R. Internet Forensics. O'Reilly, 2005.
MARCELLA, A. & MENENDEZ, D. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes.
Auerbach, 2007.
MOHAY, G., ANDERSON, A. & COLLIE, B. Computer and Intrusion Forensics.
Artech House Publisher, 2003.
NELSON, B., PHILLIPS, A., ENFINGER, F. & STEUART, C. Guide to Forensics and Investigations. Cengage Learning, 2007.
REYES, A. & WILES, J. The Best Damn Cybercrime and Digital Forensics Book period. Syngress Publishing, 2007.
SCHPERBERG, R. & STANLEY, R. A. Cybercrime: Incident Response and Digital Forensics. Information Systems Audit and Control Association, 2005.
SHINDER, D. L. Scene of Cybercrime: Computer Forensics Handbook. Syngress, 2002.
SOLOMON, M. G., BARRET, D. & BROOM, N. Computer Forensics JumpStart.
Sybex, 2005.
DESIGN OF A CYBER SECURITY LABORATORY, CASE STUDY: SGU AND ID-SIRTII
PROJECT LABORATORY DEVELOPMENT Page 113 of 136
Rinaldi Yulius
WILDING, E. Computer Evidence: A Forensic Investigation Handbook. Sweet &
Maxwell, 1997.
Websites
"AccessData Forensic Toolkit." http://www.accessdata.com/forensictoolkit.html, accessed April 19, 2009
"AccessData investigators." http://www.accessdata.com/courses.html, accessed March 05, 2009
"ASCLD/LAB." http://www.ascld-lab.org/dual/indexdual.html, accessed March 05, 2009
"Asosiasi Penyelenggara Jasa Internet Indonesia." http://www.apjii.or.id, accessed April 08, 2009
"AusCERT Australia's National Computer Emergency Response Team."
http://www.auscert.org.au/, accessed June 07, 2009
"Computer Forensic Analysis." http://www.porcupine.org/forensics/, accessed April 09, 2009
"Computer Forensics | e-Discovery | Incident Response | Guidance Software Digital Investigations." http://www.encaseenterprise.com/, accessed March 16, 2009
"Computer Forensics and Incident Response." http://breach-inv.blogspot.com/, accessed April 13, 2009
"Cyber Security Malaysia." http://www.cybersecurity.my/en/, accessed March 07, 2009
"Digital Evidence: Standards and Principles (Forensic Science Communications)."
http://www.fbi.gov/hq/lab/fsc/backissu/april2000/swgde.htm, accessed April 17, 2009
"EC-Council Security Certification." http://www.eccouncil.org/, accessed February 24, 2009
"e-fense :: Cyber Security & Computer Forensics Software." http://www.e- fense.com/products.php, accessed March 11, 2009
"FIRST - Improving security together." http://www.first.org, accessed April 09, 2009
"Forensic Computers, Inc." http://www.forensic-computers.com/index.php, accessed May 19, 2009
"Guidance Software | The World Leader in Digital Investigation (TM)."
http://www.guidancesoftware.com/, accessed March 11, 2009
DESIGN OF A CYBER SECURITY LABORATORY, CASE STUDY: SGU AND ID-SIRTII
PROJECT LABORATORY DEVELOPMENT Page 114 of 136
Rinaldi Yulius
"IACIS | The International Association of Computer Investigative Specialists."
http://www.iacis.com/, accessed March 11, 2009
"ICS - Hard Drive Duplication, Copy Data, Clone Hard Drives, Hard Drives Duplicators." http://www.ics-iq.com/, accessed May 09, 2009
"ID-SIRTII | Indonesia Security Incident Response Team on Internet Infrastructure."
http://www.idsirtii.or.id/, accessed February 01, 2009
"Information Security Certification from GIAC." http://www.giac.org/, accessed June 2, 2009
"The International Society of Forensic Computer Examiners - ISFCE."
http://www.isfce.com/, accessed June 11, 2009
"ISO/IEC 17025:200 - General requirements for the competence of testing and calibration laboratories."
http://www.iso.org/iso/catalogue_detail.htm?csnumber=39883, accessed April 20, 2009
"JPCERT Coordination Center." http://www.jpcert.or.jp/english/, accessed May 05, 2009
"Kepolisian Negara Republik Indonesia." http://www.polri.go.id/, accessed April 17, 2009
"SANS Institute - Network, Security, Computer, Audit Information & Training."
http://www.sans.org/, accessed June 2, 2009
"Tableau, LLC." http://www.tableau.com/index.php, accessed May 09, 2009
"Technology Pathways - Computer Forensics, Digital Discovery, Auditing, Incident Response." http://www.techpathways.com/DesktopDefault.aspx, accessed April 19, 2009
"WetStone Technologies, Inc." http://wetstonetech.com/, accessed April 19, 2009
"WiebeTech Micro Storage Soultions - FireWire and USB Hard Drives."
http://www.wiebetech.com/, accessed April 23, 2009