1 Baron,K, "confirms widespread cheating on job exams"
2 Cegielski,C.G, "Who values technology certification? Commun" 47 (47): 103-105, 2004
3 Capella University, "Transfer credit & credit for prior learning"
4 Dawson,D.L, "Training in carotid artery stenting:Do carotid simulation systems really help?" 14 (14): 256-263, 2006
5 Williams,R, "Top 20 Most Braindumped Certification Vendors"
6 Crisp,G, "The e-assessment handbook" Continuum 2007
7 Reese,B, "The cheating industry that is devaluing IT certification - Part one"
8 Carrion, J, "The State of Microsoft Certification"
9 Whitman,M.E., "Principles of incident response and disaster recovery" Thomson Course Technology 2007
10 Neilson,G, "Microsoft’s New Simulation Questions: Report from the Field"
1 Baron,K, "confirms widespread cheating on job exams"
2 Cegielski,C.G, "Who values technology certification? Commun" 47 (47): 103-105, 2004
3 Capella University, "Transfer credit & credit for prior learning"
4 Dawson,D.L, "Training in carotid artery stenting:Do carotid simulation systems really help?" 14 (14): 256-263, 2006
5 Williams,R, "Top 20 Most Braindumped Certification Vendors"
6 Crisp,G, "The e-assessment handbook" Continuum 2007
7 Reese,B, "The cheating industry that is devaluing IT certification - Part one"
8 Carrion, J, "The State of Microsoft Certification"
9 Whitman,M.E., "Principles of incident response and disaster recovery" Thomson Course Technology 2007
10 Neilson,G, "Microsoft’s New Simulation Questions: Report from the Field"
11 Pellegrino,J.W, "Knowing what students know: The science and design of educational assessment"
12 Capella University, "Information Technology Online Degree Programs"
13 Dean,H, "IT certification:What it is and where it’s headed" 61 (61): 24-27, 2001
14 Kent,K, "Guide to integrating forensic techniques into incident response(NISTSpecialPublication 800-86).Gaithersburg"
15 Taylor, C, "Forensics education: Assessment and measures of excellence" 2007
16 Troell, L, "Forensic course development–One year later" 28-30, 2004
17 US Department of Energy, "First Responder’s Manual"
18 Ridder, C. K., "Evidentiary Implications of Potential Security Weaknesses in Forensic Software"
19 Armstrong, H., "Electronic forensics education needs of law enforcement" 2004
20 Vaglio-Laurin,M, "Don’t just tell us–Show Us! Performance-based testing and the SAS® certified professional program." 2006
21 Brodkin,J, "Don’t be fooled by suspicious test preparation Web sites"
22 Casey,E, "Digital evidence and computer crime : forensic science, computers, and the Internet" AcademicPress 2004
23 Shreeve,J.L, "Cyber sleuths"
24 Giordano,J., "Cyber Forensics: A Military Operations Perspective" 1 (1): 2002
25 Ball,C, "Cross-examining the computer forensics expert:Getting to the truth means understanding not just computers,but also those who examine them for evidence" 40 (40): 78-81, 2004
26 Vacca,J.R, "Computer forensics: Computer crime scene investigation" CharlesRiverMedia. 2005
27 Gottschalk, L, "Computer forensics programs in higher education: A preliminary study" 23-27, 2005
28 Talley, J, "Computer Analysis Response Team (CART) unit overview" 25-28, 2006
29 Palmer,C, "Breaking forensics software: weaknesses in critical evidence collection" 2007
30 Bender,B, "Army probes alleged exam cheating - Answers to tests for promotions found on websites"
31 Smith,F.C, "A guide to forensic testimony:the art and practice of presenting testimony as an expert technical witness" Addison-Wesley 2002
32 Witnah, D., "A Practical Guide to Simulation Development."