Skip to main content

Mobile Main Menu

  • Library Portal
    • Library Resources
      • Search the Library
      • A-Z Databases
      • Browse Journals
    • Accessibility Tools
    • Subject Guides
      • Criminal Justice
      • Digital Education in Practice
      • Investigation, Security and Defence
      • Law
      • Psychology
      • Computing
      • Design and creativity
      • Finance and Accounting
      • Marketing
      • Health and Care Management
      • Human Resource Management
      • Business Management
      • Supply Chain Management and Logistics
      • Hospitality and Tourism
      • Foundation Year
  • English Language Hub
    • Academic Writing in English
    • Self-study Resources
  • Academic Skills
    • Academic Integrity
    • Academic Writing
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
  • Workshops and One-to-Ones
    • One-to-one Appointments
    • Workshops

Secondary navigation

  • Your Projects
  • Feedback to Win
  • iLearn
  • About Us
  • Office 365
  • Request It!
  • News Hub
Home
  • Library Portal
    • Library Resources
    • Accessibility Tools
    • Research Tools
    • Subject Guides
    • AppsAnywhere
    • Search the Library
    • A-Z Databases
    • Browse Journals
    • eBook Spotlight Collections

    Get started with the Library Portal

    Get Started
    • Accessible eBooks
    • Document Conversion Tools
    • RNIB Bookshare
    • Sensus Access

    Get started with the Library Portal

    Get Started
    • Research Tools

    Get started with the Library Portal

    Get Started
    Faculty of Social Sciences
    • Criminal Justice
    • Digital Education in Practice
    • Investigation, Security and Defence
    • Law
    • Psychology
    STEM
    • Computing
    Arden Business
    • Business Management
    • Design and Creativity
    • Finance
    • Marketing
    • Health and Care Management
    • Human Resource Management
    • Supply Chain and Project Management
    • Hospitality and Tourism
    • MBA and Executive Education
    IFS
    • Foundation Year
     

    Get started with the Library Portal

    Get Started

  • English Language
    • Academic Writing
    • Self-Study Resources
    • Workshops and one-to-ones
    • Academic Writing in English

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
    • Academic Grammar in Focus
    • Academic Vocabulary in Focus

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
    • English Language Hub One-to-one
    • English Language Hub Workshops

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
  • Academic Skills
    • Academic Integrity
    • Academic Writing
    • Artificial Intelligence
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library
    • Academic Integrity
    • Artificial Intelligence
    • Referencing Guides

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Academic Writing
    • Reading and Notetaking
    • Paraphrasing and Synthesising
    • Critical Thinking
    • Developing Your Academic Voice

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
     

    Book a one-to-one appointment

    Book a appointment

    • JISC Digital Capabilities Discovery Tool
    • Microsoft Office 365

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • What is a Dissertation?
    • Identifying a Research Topic
    • Formatting your Dissertation

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Assessment Types
    • Understanding Assignments
    • Assessment Strategies

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Maths and Statistics
    • Programming
    • SPSS

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
  • Workshops and One-to-Ones
    • One-to-one Appointments
    • Workshops
     

    Book onto a Learning Success Hub workshop

    Book a place
    • Academic Skills Workshops
    • Academic English Workshops
    • Library Workshops

    Book onto a Learning Success Hub workshop

    Book a place
Support

PG Computing Reading Lists  COM7016

Digital Forensics and Incident Management

All the reading and resources from your modules, all in one place

Reading List Category
Resource Type
Lesson

Lesson 1

Key Text eBook

Digital Forensics Explained

by Gogolin, G., ed
Key Text eBook

Digital Forensics and Incident Response: Incident…

by Johansen, G.
Essential Resource Website

GIAC Incident Handler Certification | GCIH

by GIAC Certifications
Essential Resource Website

GIAC Certified Forensic Examiner | Cybersecurity…

by GIAC Certifications
Essential Resource Website

Hackers jailed over SpyEye virus that robbed bank…

by Associated Press in Atlanta
Essential Resource Website

Insider Threat Statistics for 2024: Facts,…

by Storchak, Y.
Essential Resource Website

GIAC Certified Forensic Analyst | Digital…

by GIAC Certifications
Essential Resource Website

Computer Hacking Forensic Investigator (CHFI) |…

by EC-Council
Essential Resource Website

What to Look For in a Digital Forensics…

by Bowcut, S.
Essential Resource Website

Ex-Apple engineer accused of stealing self-…

by Drenon, B.
Essential Resource Website

Certification - International Society of Forensic…

by International Society of Forensic Computer Examiners
Essential Resource Website

Tesla says two ex-employees behind May data breach

by Kachwala, Z.

Lesson 2

Key Text eBook

Digital Forensics Explained

by Gogolin, G., ed
Key Text eBook

Digital Forensics and Incident Response: Incident…

by Johansen, G.
Essential Resource Other

Incident Handler's Handbook

by Kral, P.
Essential Resource Other

Computer Security Incident Handling Guide

by Cichonski, P. et al.

Lesson 3

Key Text eBook

Digital Forensics Explained

by Gogolin, G., ed
Key Text eBook

Digital Forensics and Incident Response: Incident…

by Johansen, G.
Essential Resource Other

Chain of Custody and Critical Infrastructure…

by Cybersecurity and Infrastructure Security Agency
Essential Resource Other

ACPO Good Practice Guide for Digital Evidence

by Williams, J.
Essential Resource Other

Best Practices For Seizing Electronic Evidence v.…

by U.S. Department of Homeland Security
Essential Resource Other

Digital Evidence Preservation: Considerations for…

by Guttman, B., White, D. R. and Walraven, T.
Essential Resource Other

Chain of custody — General terminology and models

by British Standards Institution

Lesson 4

Key Text eBook

Digital Forensics and Incident Response: Incident…

by Johansen, G.
Key Text eBook

Digital Forensics Explained

by Gogolin, G., ed
Essential Resource eBook

A Practical Guide to Digital Forensics…

by Hayes, D. R.
Essential Resource Website

About Apple File System | Apple Developer…

by Apple Developer
Essential Resource Website

Part I. File Systems Red Hat Enterprise Linux 6…

by Red Hat Customer Portal
Essential Resource Website

Overview of FAT, HPFS, and NTFS File Systems -…

by Microsoft Learn
Essential Resource Other

The Value of Metadata in Digital Forensics

by Alanzi, F. and Jones, A.

Lesson 5

Key Text eBook

Digital Forensics and Incident Response: Incident…

by Johansen, G.
Key Text eBook

Digital Forensics Explained

by Gogolin, G., ed
Essential Resource Article

Network Forensics: A Comprehensive Review of…

by Qureshi, S. et al.
Essential Resource Website

An introduction to using tcpdump at the Linux…

by Gerardi, R.
Essential Resource Article

Packet analysis for network forensics: A…

by Sikos, L. F.
Essential Resource Website

Logging and protective monitoring

by National Cyber Security Centre
Essential Resource Website

How to collect network traffic logs with WireShark

by Kaspersky
Essential Resource Website

Network traffic analysis using Wireshark

by Shakeel, I.

Lesson 6

Key Text eBook

Digital Forensics and Incident Response: Incident…

by Johansen, G.
Key Text eBook

Digital Forensics Explained

by Gogolin, G., ed
Essential Resource Website

PeStudio Overview: Setup, Tutorial and Tips

by Fox, N.
Essential Resource Website

Process Monitor for Dynamic Malware Analysis

by Microsoft Learn
Essential Resource Video

Ghidra Code Analysis with Anuj Soni

by SANS Digital Forensics and Incident Response

Lesson 7

Key Text eBook

Digital Forensics Explained

by Gogolin, G., ed
Essential Resource Other

Dictionary Attack on Wordpress: Security and…

by Kyaw, A. K., Sioquim, F. and Joseph, J.
Essential Resource Article

An Empirical Analysis of Email Forensics Tools

by Ghafarian, A., Mady, A. and Park, K.

Lesson 8

Key Text Other

Information technology — Electronic discovery,…

by British Standards Institution
Key Text Other

Information technology — Electronic discovery,…

by British Standards Institution
Key Text Other

Information technology — Electronic discovery,…

by British Standards Institution
Key Text Other

Information technology — Security techniques —…

by British Standards Institution
Key Text Other

Conformity assessment - Requirements for the…

by British Standards Institution
Key Text eBook

Digital Forensics Explained

by Gogolin, G., ed
Key Text Other

Information technology — Security techniques —…

by British Standards Institution
Key Text Other

Information technology — Security techniques —…

by British Standards Institution
Key Text Other

General requirements for the competence of…

by British Standards Institution
Key Text Other

Information technology — Security techniques —…

by British Standards Institution
Key Text Other

Information technology — Electronic discovery,…

by British Standards Institution
Essential Resource Other

Ethics in the IT Community

by Bundschuh, A. D.
Essential Resource Website

Apple v the FBI: what's the beef

by Thielman, S.

Lesson 9

Key Text eBook

Digital Forensics and Investigations: People,…

by Sachowski, J.
Key Text eBook

Digital Forensics and Incident Response: Incident…

by Johansen, G.
Key Text eBook

Digital Forensics Explained

by Gogolin, G., ed
Essential Resource Other

Forensic Notebook (w/ edits) for Det. Brown

by Forensic Notes
Essential Resource Website

Autopsy User Documentation 4.11.0: Graphical…

by Basis Technology
Essential Resource Website

Write a Forensic Report Step by Step [Examples…

by Salvation Data
Essential Resource Website

What Is Steganography & How Does It Work?

by Kaspersky

Footer

  • Library Portal
  • Academic Skills
  • English Language
  • Workshops
  • One-to-one Appointments

Footer 2

  • About Us
  • iLearn
  • News Hub
  • Support
  • Feedback To Win

Footer3

  • About Arden University
  • Cookies Policy
  • Privacy Policy
Contact Us
address icon

Arden University,
Middlemarch Park,
Coventry, CV3 4FJ, UK

email icon

Library@arden.ac.uk
AcademicSkills@arden.ac.uk
EnglishLanguageHub@arden.ac.uk

footer logo

Follow us on

  • Arden twitter

© 2005-2025 Arden University  | All rights reserved