American Heritage Dictionary of the English Language. (n.d.). Forensics. Retrieved from https://ahdictionary.com/word/search.html?q=forensic American Society of Crime Laboratory Directors. (n.d.). Home Page. Retrieved from http://www.ascld.org.
Bard, Joan. The Windows Registry. Microsoft TechNet. Retrieved from http://technet.microsoft.com/en-us/library/cc751049.aspx.
Computer Forensics World. (n.d.). Computer Forensics Basics: Frequently Asked Questions. Retrieved from http://www.computerforensicsworld.com/modules.php?name=News&file=article&sid=1.
Cornell University Law School. (2015, Dec. 1). Federal Rules of Evidence. Retrieved from http://www.law.cornell.edu/rules/fre/.
Cornell University Law School. (n.d.). Daubert Standard. Retrieved from http://www.law.cornell.edu/wex/daubert_standard.
Digital Forensic Research Workshop. (n.d.) Home Page. Retrieved from http://dfrws.org.
Federal Bureau of Investigation. Cyber Crime. Retrieved from http://www.fbi.gov/about-us/investigate/cyber/cyber.
Findlaw.com. (n.d.). U.S. Code - Unannotated Title 18. Crimes and Criminal Procedure. Retrieved from http://codes.lp.findlaw.com/uscode/18/I/110/2252B.
Irongeek.com. (n.d.). Practical Guide to Alternative Data Streams in NTFS. Retrieved from http://www.irongeek.com/i.php?page=security/altds.
Maras, Marie-Helen. Computer Forensics: Cybercriminals, Laws, and Evidence. Burlington, MA: Jones & Bartlett Learning, 2011.
Metro News. (2009, Nov. 9). Facebook Stalker Is Given a Life Ban for Bombarding Student with 30 Messages a Day. Retrieved from http://metro.co.uk/2009/11/09/facebook-stalker-is-given-a-life-ban-for-bombarding-student-with-30-messages-a-day-538240/.
U.S. Department of Justice. (n.d.). What Are Identity Theft and Identity Fraud? Retrieved from http://www.justice.gov/criminal/fraud/websites/idtheft.html.
U.S. Secret Service. (n.d.). National Computer Forensics Institute. Retrieved from http://www.ncfi.usss.gov.
US-CERT. (2008). Computer Forensics. Retrieved from http://www.us-cert.gov/reading_room/forensics.pdf.
Williams, Mike. (2011). UserAssist Uncovers Hidden Windows Activity Logs. BetaNews. Retrieved from http://betanews.com/2011/07/18/userassist-uncovers-hidden-windows-activity-logs/.
3.19.27.178