Данный модуль является ресурсом для лекторов
Список основной литературы
Учащимся следует ознакомиться со следующими публикациями (в основном доступными в открытых источниках), входящими в категорию обязательной для прочтения литературы, до начала занятий по данному модулю:
* Материалы с этим значком можно найти в библиографической базе данных SHERLOC (скоро будет).
- Chang, Weiping and Peifang Chung. (2014). Knowledge Management in Cybercrime Investigation - A Case Study of Identifying Cybercrime Investigation Knowledge in Taiwan . Pacific-Asia Workshop on Intelligence and Security Informatics (PAISI 2014: Intelligence and Security Informatics), pp. 8-17. *
- Domain Tools. Best Practices Guide: Getting Started with Domain Tools for Threat Intelligence and Incident Forensics . *
- Fafinski, Stefan, William H. Dutton, and Helen Margetts. (2010). Mapping and Measuring Cybercrime . OII Forum Discussion Paper, No 18. Oxford Internet Institute, University of Oxford. *
- Finklea, Kristin. (2017). Dark Web . Congressional Research Service. *
- GLACY. (2014). Good practice study: Cybercrime reporting mechanisms . *
- Harkin, Diarmaid, Chad Whelan, and Lennon Chang (2018). The challenges facing specialist police cyber-crime units: an empirical analysis . Police Practice and Research, Vol. 19(6), 519-536. *
- Lin, Herbert. (2017). Attribution of Malicious Cyber Incidents . Aegis Paper Series, No. 1607, Hoover Institution. *
- Maras, Marie-Helen. (2014). Computer Forensics: Cybercriminals, Laws, and Evidence . Jones and Bartlett; Chapters, 8-11. *
- Pihelgas, Mauno. (2013). Back-tracing and Anonymity in Cyberspace. In Katharina Ziolkowski (ed.). Peacetime Regime for State Activities in Cyberspace International Law, International Relations and Diplomacy (pp. 31-60). NATO Cooperative Cyber Defence Centre of Excellence.
- Wall, David S. (2007). Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace . Police Practice and Research, 8(2), 183-205. *