REFERENCES
- Krazit, T. “Security Breach May Have Exposed 40M Credit Cards.” ComputerWorld Available from[cited 17 June 2005]. http://www.computerworld.com/s/article/102631/Security_breach_may_have_exposed_40M_credit_cards?taxonomyId=017 (http://www.computerworld.com/s/article/102631/Security_breach_may_have_exposed_40M_credit_cards?taxonomyId=017)
- Associated Press. “T. J. Maxx Data Theft Worse Than First Reported.” 29 March 2007. Available from [cited]. http://www.msnbc.msn.com/id/17853440/ns/technology_and_science-security// (http://www.msnbc.msn.com/id/17853440/ns/technology_and_science-security//)
- National Conference of State Legislatures. State Security Breach Notification Laws. Available from[cited 28 November 2009]. http://www.ncsl.org/IssuesResearch/TelecommunicationsInformationTechnology/SecurityBreachNotificationLaws/tabid/13489/Default.aspx (http://www.ncsl.org/IssuesResearch/TelecommunicationsInformationTechnology/SecurityBreachNotificationLaws/tabid/13489/Default.aspx)
- Olivier , M. S. 2009 . On MetaData Context in Database Forensics . Digital Investigation , 5 : 115 – 123 .
- Fowler , K. 2009 . SQL Server Forensic Analysis , Boston : Addison-Wesley .
- Litchfield, D. “Oracle Forensics Part 5: Finding Evidence of Data Theft in the Absence of Auditing.” NGSSoftware Insight Security Research (NISR) Publication, Next Generation Security Software. Available from [cited]. http://www.databasesecurity.com/dbsec/OracleForensicsPt5.pdf (http://www.databasesecurity.com/dbsec/OracleForensicsPt5.pdf)
- Litchfield, D. “Oracle Forensics Part 1: Dissecting the Redo Logs.” NGSSoftware Insight Security Research (NISR) Publication, Next Generation Security Software. Available from [cited]. http://www.data basesecurity.com/dbsec/dissecting-the-redo-logs.pdf (http://www.data basesecurity.com/dbsec/dissecting-the-redo-logs.pdf)
- Carrier , B. 2005 . File System Forensic Analysis , Boston : Addison-Wesley .
- Wong, D. M., and Edwards, K. B. System and Method for Investigating a Data Operation Performed on a Database. U.S. Patent No. 2005/0289187 A1, 29 December 2005. Available from [cited]. http://www.google.com/patents?hl=en&lr=&vid=USPATAPP10879466&id=ppGRAAAAEBAJ&oi=fnd&dq=%22database+forensics%22&printsec=abstract#v=onepage&q=%22database%20forensics%22&f=false (http://www.google.com/patents?hl=en&lr=&vid=USPATAPP10879466&id=ppGRAAAAEBAJ&oi=fnd&dq=%22database+forensics%22&printsec=abstract#v=onepage&q=%22database%20forensics%22&f=false)
- Litchfield, D. “Oracle Forensics Part 2: Locating Dropped Objects.” NGSSoftware Insight Security Research (NISR) Publication, Next Generation Security Software. Available from [cited]. http://www.databasesecurity.com/dbsec/Locating-Dropped-Objects.pdf (http://www.databasesecurity.com/dbsec/Locating-Dropped-Objects.pdf)
- Litchfield, D. “Oracle Forensics Part 3: Isolating Evidence of Attacks against the Authentication Mechanism.” NGSSoftware Insight Security Research (NISR) Publication, Next Generation Security Software. Available from [cited]. http://www.databasesecurity.com/dbsec/Investigating-Authentication-Attacks.pdf (http://www.databasesecurity.com/dbsec/Investigating-Authentication-Attacks.pdf)
- Litchfield, D. “Oracle Forensics Part 4: Live Response.” NGSSoftware Insight Security Research (NISR) Publication, Next Generation Security Software. Available from [cited]. http://www.databasesecurity.com/dbsec/LiveResponse.pdf (http://www.databasesecurity.com/dbsec/LiveResponse.pdf)
- Litchfield, D. “Oracle Forensics Part 6: Examining Undo Segments, Flashback and the Oracle Recycle Bin.” NGSSoftware Insight Security Research (NISR) Publication, Next Generation Security Software. Available from [cited]. http://www.databasesecurity.com/dbsec/oracle-forensics-6.pdf (http://www.databasesecurity.com/dbsec/oracle-forensics-6.pdf)
- Litchfield, D. “Oracle Forensics Part 7: Using the Oracle System Change Number in Oracle Forensic Investigations.” NGSSoftware Insight Security Research (NISR) Publication, Next Generation Security Software. Available from [cited]. http://www.databasesecurity.com/dbsec/oracle-forensics-scns.pdf (http://www.databasesecurity.com/dbsec/oracle-forensics-scns.pdf)
- Litchfield , D. 2009 . Oracle Forensics Using Quisix , Hoboken, NJ : John Wiley & Sons .
- Wright , P. 2008 . Oracle Forensics: Oracle Security Best Practices . Rampant Techpress ,
- Westervelt, R. “Black Hat 2007: New Database Forensics Tool Could Aid Data Breach Cases.” [cited]. http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1266525,00.html (http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1266525,00.html)
- Fowler, K. “Forensic Analysis of a SQL Server 2005 Database Server.” SANS Institute Infosec Reading Room. Available from [cited]. http://www.sans.org/reading_room/whitepapers/forensics/forensic_ analysis_of_a_sql_server_2005_database_server_1906?show=1906.php&cat=forensics (http://www.sans.org/reading_room/whitepapers/forensics/forensic_ analysis_of_a_sql_server_2005_database_server_1906?show=1906.php&cat=forensics)
- Stahlberg , P. , Miklau , G. and Levine , B. N. Threats to Privacy in the Forensic Analysis of Database Systems . Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data . June . pp. 91 – 102 .
- Pavlou , K. and Snodgrass , R. Forensic Analysis of Database Tampering . Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data . June . pp. 109 – 120 .
- Casey , E. 2006 . Moving Forward in a Changing Landscape . Digital Investigation , 3 : 1 – 2 .