References
- Garfinkel, S.L. & Shelat., A. (2003). Remembrance of Data Passed: A Study of Disk Sanitization Practices. IEEE Security and Privacy, 1 (1), 17–27.
- Gutmann, P. (2006). Secure Deletion of Data from Magnetic and Solid-State Memory. In Proceedings of the 6th USENIX Security Symposium, San Jose, California, U.S.A.
- Jones, A. (2005). How Much Information Do Organizations Throw Away? Computer Fraud and Security, 5 (3), 4–9.
- Kwon, Y.C., Lee, S. W., & Moon, S. (2006). Advances in information and computer security. First International Workshop on Security, IWSEC 2006, Kyoto, Japan.
- Microsoft, Inc. (2007). “WD 2000: How Word for Windows Uses Temporary Files.” Retrieved on June 6, 2007 from <http://support.microsoft.com/kb/q211632/=.
- Minasi, M. (1999). The Complete PC Upgrade & Maintenance Guide, Tenth Edition. San Francisco, CA: Sybex.
- Rosencrance, L. (2007).“Ebay Auction Yields Drive Holding Political Data.” Computer World. Retrieved on October 4, 2007 from <http://www.computerworld.com=.
- Schneier, B. (2005). Risks of Third Party Data. Communications of the ACM. 48 (5), 136.
- TechWeb News. (2005). “Seven in 10 Secondhand Hard Drives Still Have Data.” Information Week. Retrieved on_December 4, 2007 from <http://www.information_week.com/story/showArticle.jhtml?articleID=163702381=
- United States Defense Security Service. (2006). National Industrial Security Program Operating Manual (NIPSOM). Washington: GPO.
- United States. Department of the Navy. Naval Information Systems Management Center. Remanence Security Guidebook. (NAVSO P-5239-26). Washington: GPO 1993
- Weeks, K. (2007). “Hospitals Protect Data By Erasing Old Hard Drives.” San Diego Business Journal, 23.