一、中文部份
內政部警政署(民99)。99年1-10月電腦網路犯罪概況。警政通報統計(99年第50號)。
王旭正、柯宏叡、ICCL-資訊密碼暨建構實驗室(民95)。資訊與網路安全-秘密通訊與數位鑑識新技法。新北市:博碩文化股份有限公司。
王旭正、高大宇、吳忠哲、江安展(民94)。資訊時代資安事件:數位媒介證據的來源、依據、判斷與說服力。資通安全分析專論。
林一德(民89)。電子數位資料於證據法上之研究。國立台灣大學法律研究所碩士論文,台北市。林宜隆、朱惠中、張志汖(民97)。臺灣地區網路犯罪現況分析─以刑事警察局破獲之案例為例,2008年知識社群與系統發展學術研討會,文化大學。
林宜隆、吳政祥(民96)。 數位鑑識標準作業程序案例驗證之分析。 2007 年第9 屆網際空間:資安犯罪與法律社會學術研究暨實務研討會,中央警察大學。
林宜隆、楊鴻正、辜國隆、林勤經(民91)。我國資通安全鑑識技術能量初探。TANET 2002研討會,國立清華大學。
楊中皇(民97)。 網路安全:理論與實務(第二版)。台北市:學貫行銷股份有限公司。
資策會Find網站(民99)。我國網際網路用戶數調查。100年3月31日,取自: http://www.find.org.tw/find/home.aspx。
二、西文部份
Access Data. (2010). Forensics ToolKit. Retrieved March 8, 2011, from http://www.accessdata.com/.
Adelstein, F. (2006). Live forensics: diagnosing your system without killing it first. Communications of the ACM, 49(2), 63-66.
Casey, E. (2000). Digital Evidence and Computer Crime: Forensic Science, Computer and the Internet. London: Academic Press.
Carrier, B. (2005). The Sleuth Kit. The Sleuth Kit. Retrieved March 11, 2011, from http://www.sleuthkit.org/sleuthkit/index.php.
Carrier, B. (2005). The Autopsy Forensic Browser. Retrieved March 11, 2011, from http://www.sleuthkit.org/autopsy/index.php.
Cohen, M. (2009). PyFlag. Retrieved March 9, 2011, from http://www.pyflag.net/.
Cohen, M. (2008). PyFlag - An advanced network forensic framework. Digital Investigation, 5, 112-120.
Corey, V., Peterman, C., Shearin, S., Greenberg, M. S. & Bokkelen, J. V. (2002). Network Forensics Analysis. IEEE Internet Computing, 6, 60-66.
CSI. (2009). CSI Computer Crime and Security Survey. New York: Computer Security Institute.
Debian Live Project. (2009). Debian Live. Retrieved March 9, 2011, from http://live.debian.net/.
Farmer, D. & Venema, W. (2005). Forensic Discovery. Addison-Wesley Professional.
GTK+ Team. (2007). What is GTK+ ?. Retrieved March 9, 2011, from http://www.gtk.org/.
Glade Project. (2009). What is Glade ?. Retrieved March 9, 2011, from http://glade.gnome.org/.
Garfinkel, S. (2002). Network Forensics: Tapping the Internet. O’REILLY.
Gibson, S. (2010). Automated Image and Restore. from http://air-imager.sourceforge.net/.
Guidance Software. (2010). EnCase. Retrieved March 8, 2011, from http://www.guidancesoftware.com/.
Kent, K., Chevalier, S., Grance, T., & Dang, H. (2006). Guide to Integrating Forensic Techniques into Incident Response.
Meghanathan, N., Allam, S. R. & Moore, L. A. (2009). TOOLS AND TECHNIQUES FOR NETWORK FORENSICS. International Journal of Network Security & Its Applications, 1, 14-24.
MySQLdb. (2005). MySQL-Python. Retrieved March 8, 2011, from http://mysql-python.sourceforge.net/.
Nikkel, B. J. (2006). A portable network forensic evidence collector. The International Journal of Digital Forensics and Incident Response, 3, 127-135.
Open Source Initiative. (1984). The Open Source Definition. Retrieved March 8, 2010, from http://www.opensource.org/docs/osd/
Palmer, G. (2001). A Road map for Digital Forensic Research. Utica, New York: Report From the First Digital Forensic Research Workshop (DFRWS).
Pogue, C., Altheide, C., & Haverkos, T. (2008). UNIX and Linux Forensic Analysis DVD Toolkit. Burlington: Syngress Publishing, Inc.
Python Software Foundation. (2010). About Python. Retrieved March 18, 2011, from http://www.python.org/.
Ranum, M. (1997). Network Forensics Whitepaper. Retrieved March 8, 2011, from http://www.ranum.com/.
Reith, M., Carr, C., & Gunsch, G. (2002). An Examination of Digital Forensic Models. International Journal of Digital Evidence, 1(3). 1-12.
Subhakar, E. P., Joshi, R. C. & Niyogi, R. (2010). A generic framework for network Forensics. International Journal of Computer Applications. 1(11), 1-6.
Scientific Working Group on Digital Evidence & International Organization on Digital Evidence. (1999). Digital Evidence: Standards and Principles. Forensic Science Communications, 2(2). Retrieved March 8, 2011, from http://www.fbi.gov/about-us/lab/forensic-science-communications/fsc/april2000/swgde.htm
Wang, X., Feng, D., Lai, X., & Yu, H. (2004). Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. Crypto 2004.
Kruse, W. & Heiser, J. (2002). Computer Forensic: Incident Response Essentials. Boston: Addison Wesley.
Yasinsac, A. & Manzano, Y. (2001). Policies to enhance computer and network forensics. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security. West Point, NY: United States Military Academy.