1998) "Remote OS detection via TCP/IP Stack FingerPrinting", (Available online at http://www.insecure.org/nmap/nmap-fingerprinting-article.txt)
(2001) "Incident Response Tools", Casey, E. (editor) Handbook of Computer Crime Investigation, London: Academic Press
(1997) "Downloads, Logs and Captures: Evidence from Cyberspace", Journal of Financial Crime, October, 1997, 5JFC2 138–152, (Available online at http://www1.bcs.org.uk/DocsRepository/03900/3968/logs)
(United States Department of Justice (2002) "Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations" (Available online at http://www.cybercrime.gov/searchmanual)