Home | Introduction | Federal Systems | Private Systems | Computer Crimes | Benefits and Potential Changes | Conclusion | Bibliography |
“Computer Security.” Wikipedia: The Free Encyclopedia. 30 Spetember 2006
"Computer Security" clip art on the home.html page is obtained from http://basicsec.org/Cover1.png (retrieved 11/11/2006). A picture of a computer being robbed.
"Computer Security Leak". Paint program. Created 4/11/2006. "Artwork is original and Created by me".
"Girl Screaming" clip art on the conclusion.html page is obtained from http://www.pbs.org/independentlens/shortnotsweet/images/monster3.jpg (retrieved 11/11/2006). A picture of a girl screaming.
Hofmeyr, Steven. “Why Today’s Security Technologies Are So Inadequate: History, Implications, and New Approaches.” Security Architecture and Models March/April 2003: 17-21.
Moteff, John. Computer Security: A Summary of Selected Federal Laws, Executive Orders, and Presidential Directives. CRS Report for Congress. 16 April 2004. 30 September 2006
Peltier, R. Thomas, Justin Peltier, and John Blackley. Information Security Fundamentals. New York: Auerbach Publications, 2005.
"Safe" clip art on introduction.html, federal systems.html, private systems.html, computer crimes.html, benefits and potential changes.html and conclusion.html pages obtained from Microsoft Office clipart collection (retrieved 11/12/2006). A picture of a smiling safe.