中文部份
王亮、楊永川,2008 ,網路取證與分析技術初探,網路安全技術與應用期刊,35-38頁。
林宜隆,2007,網路犯罪理論與實務,中央警察大學出版社。
林宜隆、朱惠中、張志汖,2008,數位證據鑑識標準作業程序與案例驗證之建構─以Windows XP系統為例,華梵大學數位科技與創新管理研討會。林宜隆、吳政祥,2007,數位鑑識標準作業程序案例驗證之分析,第9屆網際空間:資安犯罪與法律社會學術研討會暨實務研討會。林宜隆、周瑞國,2009,植基於雲端安全之數位證據鑑識標準作業程序之研究
林宜隆、林佳慶,2007 ,建構Windows系統數位證據鑑識標準作業程序與案例驗證之研究, TANET研討會。林宜隆、鄭進興、林敬皇、沈志昌,2003,電腦鑑識方法與程序之研究, TANET 2003台灣網際網路研討會論文。
林宜隆、朱惠中、張志汖,2008,數位證據鑑識標準作業程序與案例驗證之建構─以Windows XP系統為例,華梵大學,數位科技與創新管理研討會林宜隆、呂宗霖,2012,建構智慧型手機整合數位證據鑑識標準作業程序之研究陳瀅,2010,雲端策略:雲端運算與虛擬化技術,天下文化。
英文部分
M. ALMORSY, J. GRUNDY AND A. S. IBRAHIM (2011) Collaboration-Based CloudComputing Security Management Framework, Proceedings of 2011 IEEE InternationalConference on Cloud Computing (CLOUD 2011), IEEE, Washington DC, USA.
Amani S. Ibrahim, Hamlyn-Harris James, Grundy John and Almorsy Mohamed,2011,CloudSec:A securityMonitoring Appliance for Virtual Machines in the IaaS Cloud Model,Proceedings of the 5th International Conference on Network and System Security.
Zhang Liang-Jie, Zhou Qun,2009, CCOA: Cloud Computing Open Architecture, IEEE International Conference on Web Service
Hong Cheol-Ho, Park Miri, Yoo Seehwan, Yoo Chuck, 2010,Hypervisor design considering network performance for multi-core CE devices, Consumer Electronics (ICCE), 2010 Digest of Technical Papers International Conference
Davis, Bryan j. ,2001,Computer Intrusion Investigation Guidelines, FBI Law Enforcement Bulletin
Mohamed Wahib et al, A Framework for Cloud Embedded Web Services Utilized by Cloud Applications,2011 IEEE World Congress on Services,2011
R. La‘Quata Sumter, Cloud Computing: Security Risk Classification, ACMSE 2010, Oxford, USA
Wenchaoet al, Towards a Data-centric View of Cloud Security, CloudDB 2010, Toronto, Canada
Valdman Jan, 2001, Log File Analysis, University of West Bohemia in Pilsen Department of Computer Science and Engineering Technical Report No. DCSE/TR-2001-04
Flavio Lombardi& Roberto Di Pietro, Transparent Security for Cloud, SAC‘10 March 22-26, 2010, Sierre, Switzerland.
Jinpeng et al, Managing Security of Virtual Machine Images in a Cloud Environment, CCSW, 2009, Chicago, USA
Dan Lin et al, Data Protection Models for Service Provisioning in Cloud, SACMAT'10, 2010 ,Pittsburgh, Pennsylvania, USA
Soren Bleikertz et al, Security Audits of Multi-tier Virtual Infrastructures in Public Infrastructure Clouds, CCSW 2010, Chicago, USA
Mladen A. Vouch, Cloud Computing Issues, Research and Implementations, Journal of Computing and Information Technology - CIT 16, 2009, 4, 235–246
Richard Mosher,Cloud Computing Risks,ISSA Journal,July 2011
Mike Scanlin,Managing Risk in the Cloud,NetApp,October 2010
Davis, Bryan j. ,2001,Computer Intrusion Investigation Guidelines, FBI Law Enforcement Bulletin
IOCE,2000,Digital Evidence: Standards and Principles, Forensic science communications,volume2 number2.
SIBIYA George,VENTER S. Hein and FOGWILL Thomas,"Digital Forensic Framework for a Cloud
Environment",IST-Africa 2012 Conference Proceedings,2012
Ruan Keyun et al,"Cloud forensics: An overview",IBM,2011
CSA,"Security Guidance for Critical Areas of Areas of Focus in Cloud Computing V3.0",CSA,2012
ENISA,"Benefits, risks and recommendations for information security",ENISA,2009
NIST,"Guidelines on Security and Privacy in Public Cloud Computing",NIST,2011
Ristov Sasko,Gusev Marjan and Kostoska Magdalena,"CLOUD COMPUTING SECURITY IN BUSINESS
INFORMATION SYSTEMS" ,International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012
Endicott Barbara,Unitended Consequences:Digital Evidence in Our Legal System,IEEE Computer and Relaibility Socienties,2012
Zakis Pat, John M.,2000, Electronic Evidence Discovery: From High-End Litigation Tactic to Standard Practice, Federal Discovery News, Vol. 6,No. 10, pp. 34
網路部分
IDC(國際數據資訊),IDC公佈2009年台灣資訊電信市場十大趨勢預測,參見IDC網站http://www.idc.com.tw/about/detail.jsp?id=NjE=,2009年1 [visited in 2012/9/1]
Kevin Fogarty, Server Virtualization:Top Five Security Concerns,2009, 參見CIO網站http://www.cio.com/article/492605/Server_Virtualization_Top_Five_Security_Concerns [visited in 2012/8/10]
Louis de kerk, Log Capture and Analysis, Microsoft Enterprise Services White Paper, 參見微軟網站https://www.microsoft.com/technet/archive/itsolutions/ecommerce/maintain/monitor/logcanda.mspx?mfr=true. [visited in 2012/7/20]
Vmware,台灣2012年雲端成熟度指標調查結果,參見Vmware網站http://www.vmware.com/ap/cloudindex[ visited in 2012/10/10]
數位資訊,諾頓:每秒便有14人受到網路犯罪攻擊,參見數位資訊網站http://mag.udn.com/mag/digital/storypage.jsp?f_ART_ID=343569#ixzz2 DTw7QNrr [visited in 2012/9/20]
I. Resendez, P. Martinez, and J. Abraham, An introduction to digital forensics. 參見:http://acetweb.org/journal/ACETJournal_Vol6/ [visited in 2012/11/10].
GARTNER, 2008. Tough questions: Gartner tallies up seven cloud-computing security risks. 參見http://www.mbtmag.com/article/CA6578305.html [visited in 2012/9/10]
黃重憲,談雲端運算(Cloud Computing),國立臺灣大學計算機及資訊網路中心,參見國立台灣大學網站http://www.cc.ntu.edu.tw/chinese/epaper/0008/20090320_8008.htm [visited in 2012/7/10]