Main Introduction Possibilities Ethics Physical Security Digital Security Bibliography

Annotated Bibliography


Alexander, Yonah, and Michael S. Swetnam, eds. Cyber Terrorism and Information Warfare :
       Threats and Responses. Ardsley, NY: Transnational, 2001.

An overview of all aspects of information security. It covers a variety of subjects in the subject, including ethics, methods, and examples.

Denning, Dorothy Elizabeth Robling. Information Warfare and Security.
       New York Reading, Ma.: ACM Press ; Addison-Wesley, 1999.

Denning's book is a full review of Information Warfare and Security, it covers the history and methods of the field.

Glough, Bryan, and Paul Mungo. Approaching Zero : Data Crime and the Computer Underworld.
        London ; Boston: Faber and Faber, 1992.

Approaching Zero is a novel documenting the progression of hacker history and ideology with a pro-hacker slant.


Hafner, Katie, and John Markoff. Cyberpunk : Outlaws and Hackers on the Computer Frontier.
        1st Touchstone ed. New York: Simon & Schuster, 1995.

Approaching Zero is a novel documenting the progression of hacker history and ideology with a pro-hacker slant.


Sterling, Bruce. The Hacker Crackdown : Law and Disorder on the Electronic Frontier.
        New York: Bantam, 1993.

A full, impartial, report of the hacker society's history, the progression of cyberpunk society and a good description of various criminal acts and legal responses.


Stoll, Clifford. The Cuckoo's Egg : Tracking a Spy through the Maze Computer Espionage.of
        1st ed. New York: Doubleday, 1989.

This novel is a record of Clifford Stoll's tracking of a group of digital spies who were stealing information from US government computers and the results.


Tatum, Christine. "Legendary Con Artist Warns: Hackers Play Mind Games."
        Wire Feed. Knight Ridder Tribune News Service Jun 26 2003 2003: 1.

This is an article detailing a assortment of social engineering techniques and warnings.


United States. Dept. of Homeland Security. The National Strategy to Secure Cyberspace.
        Washington, D.C.: [Dept. of Homeland Security], 2003

This is the US Government report detailing the administration's attempts to secure cyberspace and what they want the public to do.


Used "http://office.microsoft.com/clipart/">"http://office.microsoft.com/clipart/" for "mouse.jpg"