Home Introduction Federal Systems Private Systems Computer Crimes Benefits and Potential Changes Conclusion Bibliography

Bibliography

“Computer Security.” Wikipedia: The Free Encyclopedia. 30 Spetember 2006 .

"Computer Security" clip art on the home.html page is obtained from http://basicsec.org/Cover1.png (retrieved 11/11/2006). A picture of a computer being robbed.

"Computer Security Leak". Paint program. Created 4/11/2006. "Artwork is original and Created by me".

"Girl Screaming" clip art on the conclusion.html page is obtained from http://www.pbs.org/independentlens/shortnotsweet/images/monster3.jpg (retrieved 11/11/2006). A picture of a girl screaming.

Hofmeyr, Steven. “Why Today’s Security Technologies Are So Inadequate: History, Implications, and New Approaches.” Security Architecture and Models March/April 2003: 17-21.

Moteff, John. Computer Security: A Summary of Selected Federal Laws, Executive Orders, and Presidential Directives. CRS Report for Congress. 16 April 2004. 30 September 2006 .

Peltier, R. Thomas, Justin Peltier, and John Blackley. Information Security Fundamentals. New York: Auerbach Publications, 2005.

"Safe" clip art on introduction.html, federal systems.html, private systems.html, computer crimes.html, benefits and potential changes.html and conclusion.html pages obtained from Microsoft Office clipart collection (retrieved 11/12/2006). A picture of a smiling safe.