Fowler, 2008
| Publication | Publication Date | Title |
|---|---|---|
| Fowler | SQL server forenisc analysis | |
| Khan et al. | Cloud log forensics: Foundations, state of the art, and future directions | |
| Kent et al. | Guide to integrating forensic techniques into incident | |
| US10169606B2 (en) | Verifiable data destruction in a database | |
| Hassan | Digital forensics basics: A practical guide using Windows OS | |
| Lin et al. | Introductory computer forensics | |
| Nolan et al. | First responders guide to computer forensics | |
| Madyatmadja et al. | Performance testing on Transparent Data Encryption for SQL Server's reliability and efficiency | |
| Kent et al. | Sp 800-86. guide to integrating forensic techniques into incident response | |
| Singh | Security analysis of mongodb | |
| Spreitzenbarth et al. | Mastering python forensics | |
| Lakhe | Practical Hadoop Security | |
| Carter et al. | Securing SQL Server | |
| Shaul et al. | Practical Oracle Security: Your Unauthorized Guide to Relational Database Security | |
| Jones et al. | Tracking emigrant data via transient provenance | |
| Kharraz | Techniques and Solutions for Addressing Ransomware Attacks | |
| Schroader et al. | Alternate Data Storage Forensics | |
| Waizenegger et al. | SDOS: Using Trusted Platform Modules for Secure Cryptographic Deletion in the Swift Object Store. | |
| Finnigan et al. | Oracle Incident response and forensics | |
| Goel et al. | Reconstructing system state for intrusion analysis | |
| Carvey | Investigating Windows Systems | |
| Abahussain et al. | DBMS, NoSQL and Securing Data: the relationship and the recommendation | |
| Gurkok | Cyber forensics and incident response | |
| Easttom et al. | Windows Forensics: Understand Analysis Techniques for Your Windows | |
| Hargreaves | Assessing the reliability of digital evidence from live investigations involving encryption |