[1] Fred Cohen, "Challenges to Digital Forensic Evidence", ASP Press, 2008.

[2] Paul H. Suegel, "Recording Codes for Digital Magnetic Storage", IEEE Transactions Magnetics Mag-21#5, September, 1985.

[3] The U.S. Federal Rules of Evidence.

[4] Daubert v. Merrell Dow Pharmaceuticals, Inc., 509 U.S. 579, 125 L. Ed. 2d 469, 113 S. Ct. 2786 (1993)

[5] Frye v. United States, 293 F 1013 D.C. Cir, 1923

[6] "Advances in Digital Forensics II", 364 pages, Springer; August 30, 2006, ISBN-13: 978-0387368900

[7] T. Johnson, Ed. "Forensic Computer Crime Investigation", Taylor and Francis, 2006

[8] E. Casey, "Digital Evidence and Computer Crime, Second Edition", 688 pages, Academic Press, March 8, 2004, ISBN 0121631048

[9] "The Sedona Guidelines: Best Practice Guidelines & Commentary for Managing Information & Records in the Electronic Age, A Project of The Sedona Conference Working Group on Best Practices for Electronic Document Retention & Production", September 2004 Public Comment Draft.

[10] "A Guide to Understanding Data Remanence in Automated Information Systems", NCSC-TG-025 - Library No. 5-236,082 - Version-2, available at

[11] Craig Wright, Dave Kleiman, and Shyaam Sundhar R., "Overwriting Hard Drive Data: The Great Wiping Controversy". Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008, Proceedings; Series: Lecture Notes in Computer Science Subseries: Security and Cryptology , Vol. 5352 Sekar, R.; Pujari, Arun K. (Eds.) 2008, XIII, 307 p., Softcover ISBN: 978-3-540-89861-0

[12] James R. Lyle, Douglas R. White, Richard P. Ayers, "Digital Forensics at the National Institute of Standards and Technology", NISTIR 7490

[13] IEEE Design & Test of Computers, issues available starting in 1985 from