These are the sources and citations used to research Digital Forensics Advanced. This bibliography was generated on Cite This For Me on

  • Book

    Nelson, B., Steuart, C. and Phillips, A.

    Guide to computer forensics and investigations

    In-text: (Nelson, Steuart and Phillips, n.d.)

    Your Bibliography: Nelson, B., Steuart, C. and Phillips, A. (n.d.). Guide to computer forensics and investigations. pp.194-195.

  • Website

    Master File Table (Windows)

    2018

    In-text: (Msdn.microsoft.com, 2018)

    Your Bibliography: Msdn.microsoft.com. (2018). Master File Table (Windows). [online] Available at: https://msdn.microsoft.com/en-us/library/windows/desktop/aa365230(v=vs.85).aspx [Accessed 2 Jan. 2018].

  • Book

    Nelson, B., Steuart, C. and Phillips, A.

    Guide to computer forensics and investigations

    In-text: (Nelson, Steuart and Phillips, n.d.)

    Your Bibliography: Nelson, B., Steuart, C. and Phillips, A. (n.d.). Guide to computer forensics and investigations. pp.220-221.

  • Journal

    Capriotti, J.

    FAT32 vs NTFS

    2000

    In-text: (Capriotti, 2000)

    Your Bibliography: Capriotti, J. (2000). FAT32 vs NTFS. [online] Available at: http://dnl1.tebyan.net/Library/Books/pdf/English/0075f27de8b7d47e87ab6969dac55433.pdf [Accessed 4 Jan. 2018].

  • Website

    Anon

    2018

    In-text: (Support.microsoft.com, 2018)

    Your Bibliography: Support.microsoft.com. (2018). [online] Available at: https://support.microsoft.com/en-us/help/140365/default-cluster-size-for-ntfs--fat--and-exfat [Accessed 4 Jan. 2018].

  • Journal

    Nabity, P. and Landry, B.

    Recovering Deleted and Wiped Files: A Digital Forensic Comparison of FAT32 and NTFS File Systems using Evidence Eliminator

    2018

    In-text: (Nabity and Landry, 2018)

    Your Bibliography: Nabity, P. and Landry, B. (2018). Recovering Deleted and Wiped Files: A Digital Forensic Comparison of FAT32 and NTFS File Systems using Evidence Eliminator. [online] pp.4-5. Available at: http://www.swdsi.org/swdsi2010/sw2010_preceedings/papers/pa121.pdf [Accessed 4 Jan. 2018].

  • Journal

    Srinivasan, A., Nazaraj, S. T. and Stavrou, A.

    HIDEINSIDE — A novel randomized & encrypted antiforensic information hiding

    2013 - 2013 International Conference on Computing, Networking and Communications (ICNC)

    In-text: (Srinivasan, Nazaraj and Stavrou, 2013)

    Your Bibliography: Srinivasan, A., Nazaraj, S. and Stavrou, A. (2013). HIDEINSIDE — A novel randomized & encrypted antiforensic information hiding. 2013 International Conference on Computing, Networking and Communications (ICNC).

  • Journal

    Kwak, J., Kim, H. C., Park, I. H. and Song, Y. H.

    Anti-forensic deletion scheme for flash storage systems

    2016 - 2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)

    In-text: (Kwak et al., 2016)

    Your Bibliography: Kwak, J., Kim, H., Park, I. and Song, Y. (2016). Anti-forensic deletion scheme for flash storage systems. 2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC).

  • Book

    Nelson, B., Steuart, C. and Phillips, A.

    Guide to computer forensics and investigations

    In-text: (Nelson, Steuart and Phillips, n.d.)

    Your Bibliography: Nelson, B., Steuart, C. and Phillips, A. (n.d.). Guide to computer forensics and investigations. p.623.

  • Journal

    Broomfield, M.

    NTFS Alternate Data Streams: focused hacking

    2006 - Network Security

    In-text: (Broomfield, 2006)

    Your Bibliography: Broomfield, M. (2006). NTFS Alternate Data Streams: focused hacking. Network Security, 2006(8), pp.7-9.

  • Website

    How NTFS Works: Local File Systems

    2018

    In-text: (Technet.microsoft.com, 2018)

    Your Bibliography: Technet.microsoft.com. (2018). How NTFS Works: Local File Systems. [online] Available at: https://technet.microsoft.com/en-us/library/cc781134(v=ws.10).aspx [Accessed 4 Jan. 2018].

  • Website

    What Is NTFS?: Local File Systems

    2018

    In-text: (Technet.microsoft.com, 2018)

    Your Bibliography: Technet.microsoft.com. (2018). What Is NTFS?: Local File Systems. [online] Available at: https://technet.microsoft.com/en-us/library/cc778410(v=ws.10).aspx [Accessed 4 Jan. 2018].

  • Website

    Master File Table (Windows)

    2018

    In-text: (Msdn.microsoft.com, 2018)

    Your Bibliography: Msdn.microsoft.com. (2018). Master File Table (Windows). [online] Available at: https://msdn.microsoft.com/en-us/library/bb470206(v=vs.85).aspx [Accessed 4 Jan. 2018].

  • Book

    Nelson, B., Steuart, C. and Phillips, A.

    Guide to computer forensics and investigations

    In-text: (Nelson, Steuart and Phillips, n.d.)

    Your Bibliography: Nelson, B., Steuart, C. and Phillips, A. (n.d.). Guide to computer forensics and investigations. p.628.

  • Website

    How NTFS Works: Local File Systems

    2018

    In-text: (Technet.microsoft.com, 2018)

    Your Bibliography: Technet.microsoft.com. (2018). How NTFS Works: Local File Systems. [online] Available at: https://technet.microsoft.com/en-us/library/cc781134(v=ws.10).aspx [Accessed 5 Jan. 2018].

  • Website

    NTFS Master File Table (MFT)

    2018

    In-text: (Ntfs.com, 2018)

    Your Bibliography: Ntfs.com. (2018). NTFS Master File Table (MFT). [online] Available at: http://ntfs.com/ntfs-mft.htm [Accessed 5 Jan. 2018].

  • Journal

    Alazab, M., Venkatraman, S. and Watters, P.

    Effective digital forensic analysis of the NTFS disk image

    2009 - Ubiquitous Computing and Communication Journal 4.3 (2009)

    In-text: (Alazab, Venkatraman and Watters, 2009)

    Your Bibliography: Alazab, M., Venkatraman, S. and Watters, P. (2009). Effective digital forensic analysis of the NTFS disk image. Ubiquitous Computing and Communication Journal 4.3 (2009), pp.551-558.

  • Website

    MFT Entry Attribute Concepts | NTFS Concepts

    2018

    In-text: (Flylib.com, 2018)

    Your Bibliography: Flylib.com. (2018). MFT Entry Attribute Concepts | NTFS Concepts. [online] Available at: http://flylib.com/books/en/2.48.1/mft_entry_attribute_concepts.html [Accessed 5 Jan. 2018].

  • Journal

    Huebner, E., Bem, D. and Wee, C. K.

    Data hiding in the NTFS file system

    2006 - Digital Investigation

    In-text: (Huebner, Bem and Wee, 2006)

    Your Bibliography: Huebner, E., Bem, D. and Wee, C. (2006). Data hiding in the NTFS file system. Digital Investigation, 3(4), pp.211-226.

  • Journal

    Wee, C. K.

    Analysis of hidden data in NTFS file system

    2006 - Edith Cowan University

    In-text: (Wee, 2006)

    Your Bibliography: Wee, C. (2006). Analysis of hidden data in NTFS file system. Edith Cowan University.

  • Website

    Structure of the Registry (Windows)

    2018

    In-text: (Msdn.microsoft.com, 2018)

    Your Bibliography: Msdn.microsoft.com. (2018). Structure of the Registry (Windows). [online] Available at: https://msdn.microsoft.com/en-us/library/windows/desktop/ms724946(v=vs.85).aspx [Accessed 6 Jan. 2018].

  • Website

    Verduzco, W.

    Tweak Your Lumia WP8 Device with Lumia Registry Modifier

    2018

    In-text: (Verduzco, 2018)

    Your Bibliography: Verduzco, W. (2018). Tweak Your Lumia WP8 Device with Lumia Registry Modifier. [online] xda-developers. Available at: https://www.xda-developers.com/tweak-your-lumia-wp8-device-with-lumia-registry-modifier/ [Accessed 6 Jan. 2018].

  • Website

    Predefined Keys (Windows)

    2018

    In-text: (Msdn.microsoft.com, 2018)

    Your Bibliography: Msdn.microsoft.com. (2018). Predefined Keys (Windows). [online] Available at: https://msdn.microsoft.com/en-us/library/windows/desktop/ms724836(v=vs.85).aspx [Accessed 6 Jan. 2018].

  • Website

    Registry Value Types (Windows)

    2018

    In-text: (Msdn.microsoft.com, 2018)

    Your Bibliography: Msdn.microsoft.com. (2018). Registry Value Types (Windows). [online] Available at: https://msdn.microsoft.com/en-us/library/windows/desktop/ms724884(v=vs.85).aspx [Accessed 6 Jan. 2018].

  • Book

    Nelson, B. and Phillips, A.

    Guide to computer forensics and investigations

    In-text: (Nelson and Phillips, n.d.)

    Your Bibliography: Nelson, B. and Phillips, A. (n.d.). Guide to computer forensics and investigations. p.222.

  • Journal

    Kim, Y. and Hong, D.

    Windows Registry and Hiding Suspects' Secret in Registry

    2008 - 2008 International Conference on Information Security and Assurance (isa 2008)

    In-text: (Kim and Hong, 2008)

    Your Bibliography: Kim, Y. and Hong, D. (2008). Windows Registry and Hiding Suspects' Secret in Registry. 2008 International Conference on Information Security and Assurance (isa 2008).

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Super fast and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use our extensive Premium features (Plagiarism checks, Word Add On...)
  • ✔ Create and edit multiple bibliographies
Join