圖書1. | Jonathan, C.(2010)。Principles of Cybercrime。Cambridge:Cambridge University Press。 |
2. | Jewkes, Y.、Yar, M.(2010)。Handbook of Internet Crime。Willan Publishing。 |
3. | Casey, Eoghan(2011)。Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet。Elsevier。 |
4. | Bernik, I.(2014)。Cybercrime and Cyber Warfare。NJ:John Wiley & Sons Inc。 |
5. | Corera, G.(2015)。Intercept: The Secret History of Computers and Spies。London:Orion Publishing。 |
6. | Pearson, S.、Watson, R.(2010)。Digital Triage Forensics: Processing the Digital Crime Scene。MA:Elsevier Inc。 |
7. | SWGDE(2014)。SWGDE Best Practices for Computer Forensics, Version: 3.1.。Virginia:Scientific Working Group on Digital Evidence。 |
其他1. | Blue Coat Systems Inc.(2013)。Blue Coat Systems 2013 Mobile Malware Report - How Users Drive the Mobile Threat Landscape,http://www.bluecoat.com., 。 |
2. | 趨勢科技全球技術支援與研發中心(2012)。認識APT--進階持續性滲透攻擊,http://blog.trendmicro.com.tw/?p=986, 2013/12/30。 延伸查詢 |
3. | National Institute of Justice(2001)。Electronic Crime Scene Investigation: A Guide for First Responders,http://www.ncjrs.org/pdffiles1/nij/187736.pdf。 |
4. | 台灣地區認基金會(2016)。實驗室認證,http://www.taftw.org.tw/。 延伸查詢 |
5. | 戴志揚(2012)。大陸網軍人侵海巡署3,000機密外洩,http://magazine.chinatimes.com/ctweekly/20120713003175-300106。 延伸查詢 |
6. | ACPO(2012)。2012 ACPO Good Practice Guide for Digital Evidence,http://library.college.police.uk/docs/acpo/digital-evidence-2012.pdf.。 |
7. | Greenberg, A.(2016)。The Silk Road's Dark-Web Dream Is Dead,https://www.wired.com/2016/01/the-silk-roads-dark-web-dream-is-dead/。 |
8. | IBM Corporation(2013)。IBM X-Force 2013 Mid-Year Trend and Risk Report,http://public.dhe.ibm.com/common/ssi/ecm/en/wgl03036usen/wgl03036usen.pdf.。 |
9. | IBM Corporation(2016)。IBM X-Force Threat Intelligence Report,http://www.foerderland.de/fileadmin/pdf/IBM_XForce_Report_2016.pdf.。 |
10. | Kaspersky Team(2016)。Larger than meets the eye: xDedic follow-up,https://www.kaspersky.com/blog/xdedic-ii/15147。 |
11. | Maor, E.(2013)。Carberp Source Code for Sale: Free Bootkit Included!,https://securityintelligence.com/carberp-source-code-sale-free-bootkit-included/。 |
12. | Send2Press Newswire(2011)。ADF Solutions and the High Tech Crime Institute Team Up to Educate Investigators on Leading Forensic Triage Tools,http://send2pressnewswire.com/2011/08/08/s2p5124_163905.php.。 |
13. | Sophos Ltd.(2015)。Our cybersecurity predictions for 2016,https://blogs.sophos.com/2015/12/11/our-cybersecurity-predictions-for-2016/#tip10。 |
14. | USA Attorney's Office(2014)。Cyber Criminal Pleads Guilty to Developing and Distributing Notorious SpyEye Malware,http://www.fbi.gov/atlanta/press-releases/2014/cyber-criminal-pleads-guilty-to-developingand-distributing-notorious-spyeye-malware.。 |
15. | USA DHS,FBI(2016)。Grizzly Steppe - Russian Malicious Cyber Activity,https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLYSTEPPE-2016-1229.pdf。 |
16. | USA NIJ(2004)。Forensic Examination of Digital Evidence: A Guide for Law Enforcement,https://www.ncjrs.gov/pdffilesl/nij/199408.pdf.。 |
17. | USA NIJ(2008)。Electronic Crime Scene Investigation: A Guide for First Responders,https://www.ncjrs.gov/pdffilesl/nij/219941.pdf.。 |
18. | Verizon RISK Team(2014)。2014 Data Breach Investigations Report,http://www.verizonenterprise.com/DBIR/2014/.。 |
19. | Verizon RISK Team(2015)。Data Breach Investigations Report,http://www.verizonenterprise.com/DBIR/2015/.。 |
20. | Zetter, K.(2014)。Coder Behind Notorious Bank-Hacking Tool Pleads Guilty,https://www.wired.com/2014/01/spy-eye-author-guilty-plea/。 |