[1] CNET新聞專區:Graeme Wearden ,2002,http://taiwan.cnet.com/news/software/0,2000064574,20089167,00.htm
[2]王子敬、謝侑純、尤焙麒譯,Eric Maiwald著,2002年,網路安全入門手冊,第二版,麥格羅.希爾國際出版社。
[3]王旭正、柯宏叡、楊誠育,2002,網站入侵安全的證據存留鑑識探討,Communications of the CCISA ,2002, Vol. 8 No. 4 。
[4]台灣電腦網路包機處理暨協調中心,DDoS攻擊的趨勢與防禦策略 ,https://www.cert.org.tw/document/column/show.php?key=73
[5]台灣電腦網路包機處理暨協調中心,目前網路攻擊趨勢之概述https://www.cert.org.tw/document/column/show.php?key=50
[6]台灣電腦網路危機處理暨協調中心,企業組織如何處理源自外部的電腦安全事件,https://www.cert.org.tw/document/column/show.php?key=46
[7]江家明、林稚忠翻譯,Kevin Mandia and Chris Prosise原著,2002,獵殺駭客─電腦犯罪調查與解決方案,第四版,麥格羅.希爾國際出版社。
[8]林一德,2000,電子數位資料於證據法上之研究,國立台灣大學法律研究所。[9]林宜隆、邱士娟,2002,我國網路犯罪案例現況分析第四屆,2002年「網際空間:資訊、法律與社會」 學術研究暨實務研討會。
[10]林宜隆、楊鴻正、薛明杰,2003,我國資通安全鑑識機制規劃之研究,二○○三年網際網路空間:科技與犯罪與法律社會研討會論文集。
[11]林茂雄翻譯,李昌鈺原著,1999,刑案現場蒐證,中央警察大學。
[12]孫宇安譯,Julia H. Allen原著,2002,CERT網路與系統安全實務,培生教育出版社集團。
[13]黃景彰,資訊安全-電子商務之基礎,2001,華泰文化事業公司。
[14]黃榮堅,電腦犯罪的刑法問題,台大法學論叢第二十五卷第四期。
[15]楊凱勝、高大宇、王旭正,2000,電腦資訊犯罪之身分追蹤驗證分析模式建立,Proceedings of the Ninth National Conference on Information Security。
[16]廖有祿,電腦犯罪者特徵剖析之探討,2000,二○○○年網際空間:資訊、法律與社會研討會論文集(一)。[17]廖有祿,2001,電腦犯罪特性分析之研究,第六屆亞太安全會議論文集。
[18]鍾慶豐,2003,常見網路威脅(三):威脅的種類, M. Young, The Technical Writer’s Handbook。
[19]蘇清偉,2002,網路犯罪入侵案件之數位證據蒐證研究,國立交通大學資訊管理研究所碩士論文。[20]鐘瑩譯,Michael Mullins著,2004,處理安全事件七步驟,http://taiwan.cnet.com/enterprise/topic/0,2000062938,20088256,00.htm
[21]Deniz Sinangin,2002,Computer Forensics Investigations in a Corporate Environment,IEEE computer fraud & Security。
[22]Eoghan Casey, 2002, Handbook of Computer , Crime Investigation, ACADEMIC PRESS。
[23]ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip ---------------S-tools
[24]http://eventid.net/ -----------------------------------------------------------eventid.net
[25]http://is-it-true.org/nt/atips/atips155.shtml ---------------------微軟事件(event)說明
[26]http://linux01.gwdg.de/~alatham/stego.html ------------------------------------- JPHS
[27]http://support.microsoft.com/default.aspx?scid=kb;en-us;299475 ---------------------------------------------------------------------------微軟事件(event)說明
[28]http://winfingerprint.sourceforge.net/ -----------------------------------Winfingerprint
[29]http://www.accessdata.com/ ---------------------------------------------accessdata FTK
[30]http://www.anti-trojan.net/ ---------------------------------------------------anti-trojan
[31]http://www.astonsoft.com/ ---------------------------------------------PC-DoorGuard
[32]http://www.atstake.com/ ------------------------------------------------------pwdump2
[33]http://www.cerious.com/ -----------------------------------------------------thumbs plus
[34]http://www.cl.cam.ac.uk/~fapp2/steganography/mp3stego/index.html ------------- -------------------------------------------------------------------------------------------MP3stego
[35]http://www.crucialsecurity.com/ --------------------------------------------crucial ADS
[36]http://www.elcomsoft.com/prs.html -------------------------------------密碼還原程式
[37]http://www.eventreporter.com/en/index.php-----------------------------Eventreporter
[38]http://www.guidancesoftware.com -----------------------------------------------EnCase
[39]http://www.forensics-intl.com -----------------------------------------------Safeback , sfind與Advanced Password Recovery Software Toolkit
[40]http://www.foundstone.com/
[41]http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/proddesc/fport.htm ------------------------------------------------Fport
[42]http://www.foundstone.com/resources/termsofuse.htm?file=ForensicToolkit20.zip------------------------------------------------------------------------------ForensicToolkit
[43]http://www.hoobie.net/mingsweeper/ ----------------------------------MingSweeper
[44]http://www.insecure.org/nmap/ ---------------------------------------------------Nmap
[45]http://www.jasc.com/ ----------------------------------------------------Quick View Plus
[46]http://www.jetico.com/ ----------------------------------------------------------BestCrypt
[47]http://www.moosoft.com/ ----------------------------------------------------The Cleaner
[48]http://www.pgpi.org/ -----------------------------------------------------------------PGP
[49]http://www.pyzzo.com/regdump/ ---------------------------------------------regdump
[50]http://www.snapfiles.com/get/pstools.html -------------------------------------ps-tools
[51]http://www.sysinternals.com/ --------------------------------------------------streams
[52]http://www.sysinternals.com/ntw2k/source/tcpview.shtml -------------TCP View
[53]http://www.WinGuides.com/ -------------------------------------------------RegView
[54]John Austen,2003,Some stepping stones in computer forensics,Information Systems Security ,vol 8 No.2 .
[55]Kuchta, Kelly J.,2002,Forensic Fieldwork: Experience Is the Best Teacher.,Information Systems Security ,Vol. 3 Issue 1, p29-33.
[56]Kuchta, Kelly J.,2002,Forensic Fieldwork: Experience Is the Best Teacher.,Information Systems Security ,Vol. 3 Issue 1, p29-33.
[57]Mark J. Biros & Thomas F. Urban II,Crime Online - Knowledge, Prevention and Detection (chapter 10),Business & Legal Guide to Online Internet Law, Glasser Legal Works, N.J. USA,1997.
[58]New Technologies Inc.,1999,Computer Evidence Processing Steps,http://www.forensics-intl.com/evidguid.html.
[59]Philippsohn,2001,Trends in Cybercrime An Overview of Current Financial Crimes on The Internet,Computer &Security 20.
[60]Richard Power,2003,2002 CSI/FBI Computer Crime and Security Survey.
[61]Sammes、Jenkinson,2000, Forensic Computing- A Practitioner’s Guide.
[62]Timothy Wright,2000,The Field guide for investigation Computer Crime: search and seizure basic part three,security focus.
[63]Timothy Wright,2000,The Field guide for investigation Computer Crime: Overview of Methodology for the Application of Computer Forensics part two,security focus.
[64]Tohmas Rude,2002,Evidence Seizure Methodology for computer forensics crazytrain.com.