-
3
-
-
0001156375
-
Managing computer crime: a research outlook
-
Backhouse, J. and Dhillon, G. (1995), “Managing computer crime: a research outlook”, Computers and Security, Vol. 14, pp. 645-51.
-
(1995)
Computers and Security
, vol.14
, pp. 645-651
-
-
Backhouse, J.1
Dhillon, G.2
-
6
-
-
3342894277
-
Acceptable risks
-
31 August
-
Dalton, G. (1998), “Acceptable risks”, InformationWeek, 31 August, pp. 36-48.
-
(1998)
InformationWeek
, pp. 36-48
-
-
Dalton, G.1
-
7
-
-
0004189288
-
-
2nd ed, John Wiley & Sons, Chichester
-
Davies, D.W. and Price, W.L. (1989), Security for Computer Networks, 2nd ed., John Wiley & Sons, Chichester.
-
(1989)
Security for Computer Networks
-
-
Davies, D.W.1
Price, W.L.2
-
8
-
-
84986142544
-
Security survey: is it safe?
-
8 September
-
Davis, B. (1997), “Security survey: is it safe?”, InformationWeek, 8 September, p. 42.
-
(1997)
InformationWeek
, pp. 42
-
-
Davis, B.1
-
10
-
-
84986142549
-
Smurf attack hits Minnesota
-
17 March, available at, [Accessed April 1999]
-
Festa, P. (1998a), “Smurf attack hits Minnesota”, CNET News.com, 17 March, available at http://www.news.com/News/Item/0, 4, 20178, 00.html [Accessed April 1999]
-
(1998)
CNET News.com
-
-
Festa, P.1
-
11
-
-
84986093570
-
Airport hack raises flags
-
19 March, available at, [Accessed April 1999]
-
Festa, P. (1998b), “Airport hack raises flags”, CNET News.com, 19 March, available at http://www.news.com/News/Item/0, 4, 20278, 00html [Accessed April 1999]
-
(1998)
CNET News.com
-
-
Festa, P.1
-
13
-
-
84986076705
-
Taking aim at cyberterrorism
-
22 October, available at, [Accessed April 1999]
-
Goodin, D. (1997), “Taking aim at cyberterrorism”, CNET News.com, 22 October, available at http://www.news.com/News/Item/0, 4, 15516, 00.html [Accessed April 1999]
-
(1997)
CNET News.com
-
-
Goodin, D.1
-
15
-
-
84986028855
-
Cyber leeches
-
5 December
-
Hobby, J. (1996), “Cyber leeches”, Computer Weekly, 5 December, p. 46-47.
-
(1996)
Computer Weekly
, pp. 46-47
-
-
Hobby, J.1
-
16
-
-
0003692925
-
-
HMSO, London, available at, [Accessed April 1999]
-
House of Commons (1998), Data Protection Act 1998, HMSO, London, available at http://www.hmso. gov.uk/acts/acts1998/19980029.htm [Accessed April 1999]
-
(1998)
Data Protection Act 1998
-
-
-
18
-
-
84986144534
-
Firms fall short of national standard on data security
-
20 March
-
Kerridge, S. (1996), “Firms fall short of national standard on data security”, PC User, Vol. 279, 20 March, p. 14.
-
(1996)
PC User
, vol.279
, pp. 14
-
-
Kerridge, S.1
-
20
-
-
84986031421
-
Why security is failing to meet the standard
-
14 March
-
Lambeth, J. (1996), “Why security is failing to meet the standard”, Computer Weekly, 14 March, p. 18.
-
(1996)
Computer Weekly
, pp. 18
-
-
Lambeth, J.1
-
22
-
-
84986028848
-
Anti-virus scanners: defending the network domain
-
April, available at, [Accessed April 1999]
-
Pallato, J. (1998), “Anti-virus scanners: defending the network domain”, Internet Computing, April, available at http://www.zdnet.com/products/ content/zdim/0304/287180.html [Accessed April 1999]
-
(1998)
Internet Computing
-
-
Pallato, J.1
-
23
-
-
0004198635
-
-
2nd ed, Prentice Hall International, Englewood Cliffs, NJ
-
Pfleeger, C.P. (1997), Security in Computing, 2nd ed., Prentice Hall International, Englewood Cliffs, NJ.
-
(1997)
Security in Computing
-
-
Pfleeger, C.P.1
-
24
-
-
84986127853
-
Hackers, terrorists, and spies
-
October, available at, [Accessed April 1999]
-
Radcliff, D. (1997), “Hackers, terrorists, and spies”, Software Magazine, October, available at http://www.sentrytech.com/97issues/Oct99/sm107cv.htm [Accessed April 1999]
-
(1997)
Software Magazine
-
-
Radcliff, D.1
-
25
-
-
84986105989
-
Information security in business environments
-
Sanderson, E. and Forcht, K.A. (1996), “Information security in business environments”, Information Management & Computer Security, Vol. 4 No. 1, p. 32-7.
-
(1996)
Information Management & Computer Security
, vol.4
, Issue.1
, pp. 32-37
-
-
Sanderson, E.1
Forcht, K.A.2
-
26
-
-
84986035492
-
Main threat to Net security? Clueless user
-
16 September
-
Schuman, E. (1996), “Main threat to Net security? Clueless user”, Communications Week, 16 September, pp. 24-6.
-
(1996)
Communications Week
, pp. 24-26
-
-
Schuman, E.1
-
27
-
-
84986028858
-
How ethical hackers pinpoint security weaknesses
-
3 September
-
Taylor, P. (1997), “How ethical hackers pinpoint security weaknesses”, Financial Times Technology Section, 3 September, p. 1.
-
(1997)
Financial Times Technology Section
, pp. 1
-
-
Taylor, P.1
-
28
-
-
0346478937
-
-
IDG Books World wide Inc., Foster City
-
Vacca, J. (1996), Internet Security Secrets, IDG Books World wide Inc., Foster City
-
(1996)
Internet Security Secrets
-
-
Vacca, J.1
-
31
-
-
24744441187
-
Profits embolden hackers
-
23 March, available at, [Accessed April 1999]
-
Wilson, T. (1998), “Profits embolden hackers”, InternetWeek, 23 March, available at http://internetwk.com/news/news0323-4.htm [Accessed April 1999]
-
(1998)
InternetWeek
-
-
Wilson, T.1
-
32
-
-
84992978545
-
Information owners, custodians, and users
-
Wood, C.C. (1996), “Information owners, custodians, and users”, Information Management and Computer Security, Vol. 4 No. 4, pp. 34-5.
-
(1996)
Information Management and Computer Security
, vol.4
, Issue.4
, pp. 34-35
-
-
Wood, C.C.1
|