{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T15:11:09Z","timestamp":1766848269945},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642026164"},{"type":"electronic","value":"9783642026171"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02617-1_12","type":"book-chapter","created":{"date-parts":[[2009,6,17]],"date-time":"2009-06-17T14:22:04Z","timestamp":1245248524000},"page":"110-121","source":"Crossref","is-referenced-by-count":1,"title":["Methodology and Tools of IS Audit and Computer Forensics \u2013 The Common Denominator"],"prefix":"10.1007","author":[{"given":"Magdalena","family":"Sze\u017cy\u0144ska","sequence":"first","affiliation":[]},{"given":"Ewa","family":"Huebner","sequence":"additional","affiliation":[]},{"given":"Derek","family":"Bem","sequence":"additional","affiliation":[]},{"given":"Chun","family":"Ruan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"CNSS: National Information Assurance Glossary. The Committee on National Security Systems (2006)"},{"key":"12_CR2","unstructured":"McKemmish, R.: Report No. 118: What is Forensic Computing? In: Trends & Issues in Crime And Criminal Justice. Australian Institute of Criminology (1999)"},{"key":"12_CR3","unstructured":"Hinson, G.: Top Information Security Risks for 2008, CISSP Forum (2007), \n                    \n                      http:\/\/www.iso27001security.com\/\n                    \n                    \n                   (accessed October 6, 2008)"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.cose.2005.02.002","volume":"24","author":"B.v. Solms","year":"2005","unstructured":"Solms, B.v.: Information Security governance: COBIT or ISO 17799 or both? Computers & Security\u00a024, 99\u2013104 (2005)","journal-title":"Computers & Security"},{"key":"12_CR5","unstructured":"ISACA: IS Standards, Guidelines and Procedures for Auditing and Control Professionals (2008), \n                    \n                      http:\/\/www.isaca.org\/AMTemplate.cfm?Section=Standards2&Template=\/ContentManagement\/ContentDisplay.cfm&ContentID=39354\n                    \n                    \n                   (accessed December 15, 2007)"},{"key":"12_CR6","unstructured":"ISO\/IEC TR 18044: Information security incident management, ISO (International Organization for Standardization) and IEC (International Electrotechnical Commission) (2004)"},{"key":"12_CR7","unstructured":"SKAPP: Daubert:The Most Influential Supreme Court Ruling You\u2019ve Never Heard Of. In: The Project on Scientific Knowledge and Public Policy. Tellus Institute (2003)"},{"key":"12_CR8","volume-title":"Incident Response & Computer Forensics","author":"K. Mandia","year":"2003","unstructured":"Mandia, K., Prosie, C., Pepe, M.: Incident Response & Computer Forensics, 2nd edn. McGraw-Hill\/Osborne, Emeryville (2003)","edition":"2"},{"key":"12_CR9","unstructured":"RFC 3227: Guidelines for Evidence Collection and Archiving, Internet RFC\/STD\/FYI\/BCP Archives (2002), \n                    \n                      http:\/\/www.faqs.org\/rfcs\/rfc3227.html\n                    \n                    \n                   (accessed April 14, 2008)"},{"key":"12_CR10","unstructured":"ISACA: Control Objectives for Information and related Technology (COBIT\u00ae) (2008), \n                    \n                      http:\/\/www.isaca.org\/\n                    \n                    \n                   (accessed February 15, 2008)"},{"key":"12_CR11","unstructured":"Farmer, D., Venema, W.: The Coroner\u2019s Toolkit (TCT) (2008), \n                    \n                      www.porcupine.org\/forensics\/tct.html\n                    \n                    \n                   (accessed March 10, 2008)"},{"key":"12_CR12","unstructured":"Carrier, B.: The Sleuth Kit (2007), \n                    \n                      http:\/\/www.sleuthkit.org\/sleuthkit\/desc.php\n                    \n                    \n                   (accessed February 10, 2007)"},{"key":"12_CR13","unstructured":"Remote-Exploit.org (2007), \n                    \n                      http:\/\/www.remote-exploit.org\n                    \n                    \n                   (accessed February 2, 2008)"},{"key":"12_CR14","unstructured":"Inside Security, I.T.: Consulting GmbH (2007), \n                    \n                      http:\/\/www.inside-security.de\/\n                    \n                    \n                   (accessed March 13, 2008)"},{"key":"12_CR15","unstructured":"E-fense: The HELIX Live CD Page (2007), \n                    \n                      http:\/\/www.e-fense.com\/helix\/\n                    \n                    \n                   (accessed February 9, 2007)"},{"key":"12_CR16","unstructured":"Digital Evidence & Forensic Toolkit DEF (2007), \n                    \n                      http:\/\/deft.yourside.it\n                    \n                    \n                   (accessed, November 30, 2007)"},{"key":"12_CR17","unstructured":"EnCase\u00ae Forensic Modules (2007), \n                    \n                      http:\/\/www.guidancesoftware.com\/products\/ef_modules.asp\n                    \n                    \n                   (accessed January 25, 2007)"},{"key":"12_CR18","unstructured":"ProDiscover Technology Pathways (2007), \n                    \n                      http:\/\/www.techpathways.com\/\n                    \n                    \n                   (accessed January 2, 2008)"},{"key":"12_CR19","unstructured":"Access Data Forensic Toolkit \u00ae 2.0 (2008), \n                    \n                      http:\/\/www.accessdata.com\/Products\/ftk2test.aspx\n                    \n                    \n                   (accessed April 14, 2008)"},{"key":"12_CR20","unstructured":"X-Ways Forensics: Integrated Computer Forensics Software (2008), \n                    \n                      http:\/\/www.x-ways.net\/forensics\/\n                    \n                    \n                   (accessed February 5, 2008)"},{"key":"12_CR21","unstructured":"Paraben Corporation (2008), \n                    \n                      www.paraben-forensics.com\n                    \n                    \n                   (accessed January 12, 2008)"},{"key":"12_CR22","unstructured":"NTI Software Suites (2008), \n                    \n                      http:\/\/www.forensics-intl.com\/\n                    \n                    \n                   (accessed February 12, 2008)"},{"key":"12_CR23","unstructured":"Tenable Network Security, Inc. (2008), \n                    \n                      http:\/\/www.nessus.org\/\n                    \n                    \n                   (accessed April 14, 2008)"},{"key":"12_CR24","unstructured":"The Metasploit Project (2008), \n                    \n                      http:\/\/www.metasploit.org\n                    \n                    \n                   (accessed December 15, 2007)"},{"key":"12_CR25","unstructured":"Insecure.Org - Nmap Free Security Scanner, Tools & Hacking resources (2007), \n                    \n                      http:\/\/nmap.org\/\n                    \n                    \n                   (accessed December 10, 2007)"},{"key":"12_CR26","unstructured":"Security Auditor\u2019s Research Assistant (SARA), Advanced Research Corporation\u00ae (2008), \n                    \n                      http:\/\/www-arc.com\/sara\/\n                    \n                    \n                   (accessed March 4, 2008)"},{"key":"12_CR27","unstructured":"eEye Digital Security, \n                    \n                      http:\/\/www.eeye.com\/html\/products\/retina\/\n                    \n                    \n                   (accessed April 10, 2008)"},{"key":"12_CR28","unstructured":"GFI Software (2008) \n                    \n                      http:\/\/www.gfi.com\/lannetscan\/\n                    \n                    \n                   (accessed April 12, 2008)"},{"key":"12_CR29","unstructured":"IBM Internet Security Systems (2007), \n                    \n                      http:\/\/www.iss.net\n                    \n                    \n                   (accessed April 8, 2008)"},{"key":"12_CR30","unstructured":"SAINT Corporation (2008), \n                    \n                      http:\/\/www.saintcorporation.com\/products\/vulnerability_scan\/saint\/saint_scanner.html\n                    \n                    \n                   (accessed March 30, 2008)"},{"key":"12_CR31","unstructured":"Bem, D.: Open Source Virtual Environments in Computer Forensics. In: Proceedings of the 1st Workshop on Open Source Software for Computer and Network Forensics, Milan, pp. 1\u201313 (2008)"},{"key":"12_CR32","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1016\/j.cose.2007.07.002","volume":"26","author":"F. Buchholz","year":"2007","unstructured":"Buchholz, F., Spafford, E.H.: Run-time label propagation for forensic audit data. Computers & Security\u00a026, 496\u2013513 (2007)","journal-title":"Computers & Security"},{"issue":"3","key":"12_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1368506.1368508","volume":"42","author":"E. Huebner","year":"2008","unstructured":"Huebner, E., Henskens, F.: The Role of Operating System in Computer Forensics. ACM SIGOPS Operating Systems Review\u00a042(3), 1\u20133 (2008)","journal-title":"ACM SIGOPS Operating Systems Review"}],"container-title":["Lecture Notes in Computer Science","Advances in Information Security and Assurance"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02617-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,6]],"date-time":"2018-10-06T10:25:06Z","timestamp":1538821506000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02617-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642026164","9783642026171"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02617-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}