1、 http://www.chinasoftware.com.cn/cognizance_guide_product.asp,软件产品认定指南。 2、 http://www.cftt.nist.gov/project_overview.htm,CFTT Project Overview 3、Warren G.KruseII,Jay G.Heiser. Computer forensics: incident response essentials. 1st Edition, ISBN: 0201707195, Pearson Education, Inc, USA. 4、Michael R. Anderson. Computer evidence processing: the important first step-safe seizure of the computer. http://www.forensics-intl.com. 5、Sommer P. Computer forensics: an introduction in proceedings of the computer forensics '92-the 9th world conference on Computer Security Audit and Control. London Elsevier Advanced Technology,1992:82-96, http://www.virtualcity.co.uk/vcaforens.htm. 6、Anderson Michael R. Electronic fingerprints-computer evidence comes of age, http://www.forensics-intl.com .
2、 http://www.cftt.nist.gov/project_overview.htm,CFTT Project Overview
3、Warren G.KruseII,Jay G.Heiser. Computer forensics: incident response essentials. 1st Edition, ISBN: 0201707195, Pearson Education, Inc, USA.
4、Michael R. Anderson. Computer evidence processing: the important first step-safe seizure of the computer. http://www.forensics-intl.com.
5、Sommer P. Computer forensics: an introduction in proceedings of the computer forensics '92-the 9th world conference on Computer Security Audit and Control. London Elsevier Advanced Technology,1992:82-96, http://www.virtualcity.co.uk/vcaforens.htm.
6、Anderson Michael R. Electronic fingerprints-computer evidence comes of age, http://www.forensics-intl.com .