Main | Introduction | Possibilities | Ethics | Physical Security | Digital Security | Bibliography |
Alexander, Yonah, and Michael S. Swetnam, eds. Cyber Terrorism and Information Warfare :
Threats and Responses. Ardsley, NY: Transnational, 2001.
An overview of all aspects of information security. It covers a variety of subjects in the subject, including ethics, methods, and examples.
Denning, Dorothy Elizabeth Robling. Information Warfare and Security.
New York Reading, Ma.: ACM Press ; Addison-Wesley, 1999.
Denning's book is a full review of Information Warfare and Security, it covers the history and methods of the field.
Glough, Bryan, and Paul Mungo. Approaching Zero : Data Crime and the Computer Underworld.
London ; Boston: Faber and Faber, 1992.
Approaching Zero is a novel documenting the progression of hacker history and ideology with a pro-hacker slant.
Hafner, Katie, and John Markoff. Cyberpunk : Outlaws and Hackers on the Computer Frontier.
1st Touchstone ed. New York: Simon & Schuster, 1995.
Approaching Zero is a novel documenting the progression of hacker history and ideology with a pro-hacker slant.
Sterling, Bruce. The Hacker Crackdown : Law and Disorder on the Electronic Frontier.
New York: Bantam, 1993.
A full, impartial, report of the hacker society's history, the progression of cyberpunk society and a good description of various criminal acts and legal responses.
Stoll, Clifford. The Cuckoo's Egg : Tracking a Spy through the Maze Computer Espionage.of
1st ed. New York: Doubleday, 1989.
This novel is a record of Clifford Stoll's tracking of a group of digital spies who were stealing information from US government computers and the results.
Tatum, Christine. "Legendary Con Artist Warns: Hackers Play Mind Games."
Wire Feed. Knight Ridder Tribune News Service Jun 26 2003 2003: 1.
This is an article detailing a assortment of social engineering techniques and warnings.
United States. Dept. of Homeland Security. The National Strategy to Secure Cyberspace.
Washington, D.C.: [Dept. of Homeland Security], 2003
This is the US Government report detailing the administration's attempts to secure cyberspace and what they want the public to do.
Used "http://office.microsoft.com/clipart/">"http://office.microsoft.com/clipart/" for "mouse.jpg"