Stewardship of E-Manuscripts: Advancing a Shared Agenda >

Title: References Related to Digital Forensics and Acquisition of Digital Collections
Author: Christopher (Cal) Lee, School of Information and Library Science, University of North Carolina at Chapel Hill
Draft: March 25, 2009
Creative Commons Attribution Non-Commercial Share-Alike 3.0 License
[http://creativecommons.org/licenses/by-nc-sa/3.0/]

Balkestein, Marjan, and Heiko Tjalsma. "The ADA Approach: Retro-Archiving Data in an Academic Environment." Archival Science 7, no. 1 (2007): 89-105.

Born, Günter. The File Formats Handbook. London: International Thomson Computer Press, 1995.

Brezinski, Dominique, and Tom Killalea. "Guidelines for Evidence Collection and Archiving." Request for Comments 3227. 2002. http://www.ietf.org/rfc/rfc3227.txt

Caloyannides, Michael A., Michael A. Caloyannides. Privacy Protection and Computer Forensics. 2nd ed, Artech House Computer Security Series. Boston: Artech House, 2004. [See especially: 8-22, 32-44.]

Carrier, Brian. File System Forensic Analysis. Boston, MA: Addison-Wesley, 2005. [See especially: "Computer Foundations" (17-45), "Hard Disk Data Acquisition" (47-66), and "File System Analysis (173-210).]

Cohen, Tyler, and Amber Schroader. Alternate Data Storage Forensics. Burlington, MA: Syngress, 2007.

Crowley, Paul, and Dave Kleiman. CD and DVD Forensics. Rockland, MA: Syngress, 2007.

Davis, Pete, and Mike Wallace. Windows Undocumented File Formats: Working inside 16- and 32- Bit Windows. Lawrence, KS: R&D Books, 1997.

Elford, Douglas, Nicholas Del Pozo, Snezana Mihajlovic, David Pearson, Gerard Clifton, and Colin Webb. "Media Matters: Developing Processes for Preserving Digital Objects on Physical Carriers at the National Library of Australia." Paper presented at the 74th IFLA General Conference and Council, Québec, Canada, August 10-14, 2008.

Farid, Hany. "Digital Doctoring: How to Tell the Real from the Fake." Significance 3, no. 4 (2006): 162-66.

Farmer, Dan, and Wietse Venema. Forensic Discovery. Upper Saddle River, NJ: Addison-Wesley, 2005. http://www.porcupine.org/forensics/forensic-discovery/ [See especially: "The spirit of forensic discovery" (1-15), "File System Basics" (39-58), "Persistence of deleted file information" (145-160), and "Appendix B: Data Gathering and the Order of Volatility" (193-198).]

Fileformat.info. http://www.fileformat.info/

Garfinkel, Simson L. "AFF: A New Format for Storing Hard Drive Images." Communications of the ACM 49, no. 2 (2006): 85-87.

Garfinkel, Simson, and David Cox. "Finding and Archiving the Internet Footprint." Paper presented at the First Digital Lives Research Conference: Personal Digital Archives for the 21st Century, London, UK, February 9-11, 2009. http://www.simson.net/clips/academic/2009.BL.InternetFootprint.pdf

Geiger, Matthew. "Counter-Forensic Tools: Analysis and Data Recovery." http://www.first.org/conference/2006/papers/geiger-matthew-papers.pdf

Haralambous, Yannis, and P. Scott Horne. Fonts & Encodings. Sebastopol, CA: O'Reilly Media, 2007.

Hillis, W. Daniel. The Pattern on the Stone: The Simple Ideas That Make Computers Work. 1st ed. New York: Basic Books, 1998. [See especially: "Nuts and Bolts" (1-19) and "Universal Building Blocks" (21-38).]

John, Jeremy Leighton. "Adapting Existing Technologies for Digitally Archiving Personal Lives: Digital Forensics, Ancestral Computing, and Evolutionary Perspectives and Tools." Paper presented at iPRES 2008: The Fifth International Conference on Preservation of Digital Objects, London, UK, September 29-30, 2008. http://www.bl.uk/ipres2008/presentations_day1/09_John.pdf

John, Jeremy Leighton. "Digital Manuscripts: Capture and Context." Presented at Email Curation: Practical Approaches for Long-Term Preservation and Access, Newcastle, April 24-25, 2006. http://www.dcc.ac.uk/events/ec-2006/EC_Digital_Manuscripts_Jeremy_John.pdf

Jones, Keith J., Richard Bejtlich, and Curtis W. Rose. Real Digital Forensics: Computer Security and Incident Response. Upper Saddle River, NJ: Addison-Wesley, 2006. [See especially: "Acquiring a Forensic Duplication" (161-204), "Common Forensic Analysis Techniques" (207-246), "E-Mail Activity Reconstruction" (273-289), "Forensic Duplication and Analysis of Personal Digital Assistants" (515-570), “Forensic Duplication of USB and Compact Flash Memory Devices” (571-576), "Forensic Analysis of USB and Compact Flash Memory Devices" (577-594), "Tracing E-Mail" (597-607), and "An Introduction to Perl" (625-636).]

Kappel, Sherry. "The Ten Commandments for Comparison of a Legal Document in MS Word." Microsystems Engineering Company, 1999. http://www.dontworry.com/wp/legaldoc.html

Kientzle, Tim. Internet File Formats. Scottsdale, AZ: Coriolis Group Books, 1995.

Kirschenbaum, Matthew G. Mechanisms: New Media and the Forensic Imagination. Cambridge, MA: MIT Press, 2008. [See especially: 50-53, 58-67, 89-96.]

Kussmann, Ralf. PC File Formats & Conversions. Grand Rapids, MI: Abacus, 1990.

Littman, Justin. "A Technical Approach and Distributed Model for Validation of Digital Objects." D-Lib Magazine 12, no. 5 (2006). http://www.dlib.org/dlib/may06/littman/05littman.html

Petzold, Charles. Code: The Hidden Language of Computer Hardware and Software. Redmond, WA: Microsoft Press, 1999. [See especially: "Bit by Bit by Bit" (69-85), "Bytes and Hex" (180-189), and "ASCII and a Cast of Characters" (286-300).]

"Recovering and Converting Data from Manuscripts Collection Discs." National Library of Australia. http://www.nla.gov.au/preserve/digipres/recovering.html

Ross, Seamus, and Ann Gow. "Digital Archaeology: Rescuing Neglected and Damaged Data Resources." London: British Library, 1999. http://www.ukoln.ac.uk/services/elib/papers/supporting/pdf/p2.pdf

Schmid, Patrick, and Achim Roos. "RAID Recovery: The Data Knight Kroll Ontrack to the Rescue!" February 14, 2007. http://www.tomshardware.com/2007/02/14/raid_recovery/

Sergeant, Derek, and Paul Wheatley. "Survey and Assessment of Sources of Information on File Formats and Software Documentation." Representation and Rendering Project, University of Leeds, 2003. http://www.jisc.ac.uk/uploaded_documents/FileFormatsreport.pdf

Swan, Tom. Inside Windows File Formats. Indianapolis, IN: SAMS, 1993.

Taylor, Allen G. File Format Handbook, The Lance A. Leventhal Microtrend Series. San Marcos, CA: Microtrend Books, 1992.

Thomas, Susan, Renhart Gittens, Janette Martin, and Fran Baker. "Workbook on Digital Private Papers." 2007. http://www.paradigm.ac.uk/workbook/introduction/index.html

Underwood, William E. "The Presidential Electronic Records Pilot System: Results of Laboratory Experiments and Use by Archivists." Georgia Tech Research Institute, 2003. http://perpos.gtri.gatech.edu/perpos/publications/TR2003-01.pdf

Underwood, William E., and Sandra L. Laib. "Perpos: An Electronic Records Repository and Archival Processing System." Paper presented at the International Symposium on Digital Curation (DigCCurr 2007), Chapel Hill, NC, April 18-20, 2007. http://www.ils.unc.edu/digccurr2007/papers/underwood_paper_6-3.pdf

Walden, Jeff. File Formats for Popular PC Software: A Programmer's Reference. New York: J. Wiley, 1986.

Walden, Jeff. More File Formats for Popular PC Software: A Programmer’s Reference. New York, NY: John Wiley & Sons, 1987.

White, Ron and Timothy Edward Downs. How Computers Work. 9th Edition. How It Works Series. Indianapolis, IN: Que, 2008.

Wittern, Christian. "Character Encoding." In A Companion to Digital Literary Studies, edited by Ray Siemens and Susan Schreibman, 564-76. Malden, MA: Blackwell, 2007. http://www.digitalhumanities.org/companion/DLS/

Wright, Craig, Dave Kleiman, and Shyaam Sundhar. "Overwriting Hard Drive Data: The Great Wiping Controversy." In Information Systems Security: 4th International Conference, Iciss 2008, Hyderabad, India, December 16-20, 2008: Proceedings, edited by R. Sekar and A.K. Pujari, 243–57. Berlin: Springer, 2008.

Zhang, Allison B. File Formats on the Internet: A Guide for PC Users. Washington, DC: Special Libraries Association, 1996.