-
1
-
-
33748330773
-
The Aeneid
-
Book II, Jackson Knight, W. F. (trans Penguin Books
-
Virgil, ‘The Aeneid’, Book II, Jackson Knight, W. F. (trans. 1996), Penguin Books, pp. 51–56.
-
(1996)
, pp. 51-56
-
-
Virgil1
-
2
-
-
84992978071
-
Subversion of a “Secure” Operating System
-
Mem. Rpt. 2821, June
-
Stryker, D.J. (1974) ‘Subversion of a “Secure” Operating System’, NRL Mem. Rpt. 2821, June.
-
(1974)
NRL
-
-
Stryker, D.J.1
-
3
-
-
84992984965
-
Computer Capers
-
Sidgwick & Jackson
-
Whiteside, T. (1979) ‘Computer Capers’, Sidgwick & Jackson, pp. 116–121.
-
(1979)
, pp. 116-121
-
-
Whiteside, T.1
-
4
-
-
84976720856
-
The “Worm” Programs — Early Experience with a Distributed Computation
-
Shoch, J. F. and Hupp, J. A. (1982) ‘The “Worm” Programs — Early Experience with a Distributed Computation’, Commun. ACM, Vol. 25, No. 3, pp. 172–180.
-
(1982)
Commun. ACM
, vol.25
, Issue.3
, pp. 172-180
-
-
Shoch, J.F.1
Hupp, J.A.2
-
5
-
-
0023294949
-
Computer Viruses: Theory and Experiments
-
Cohen, F. (1987) ‘Computer Viruses: Theory and Experiments’, Computers & Security, Vol. 6, No. 1, pp. 22—35.
-
(1987)
Computers & Security
, vol.6
, Issue.1
, pp. 22-35
-
-
Cohen, F.1
-
6
-
-
84909368303
-
Beating the System: Hackers, Phreakers and Electronic Spies
-
Bloomsbury, Ch. IV
-
Bowcott, O. and Hamilton, S. (1992) ‘Beating the System: Hackers, Phreakers and Electronic Spies’, Bloomsbury, Ch. IV.
-
(1992)
-
-
Bowcott, O.1
Hamilton, S.2
-
7
-
-
84886355703
-
Scotland Yard
-
Michael Joseph
-
Fleming, R. (1994) ‘Scotland Yard’, Michael Joseph, pp. 78–83.
-
(1994)
, pp. 78-83
-
-
Fleming, R.1
-
8
-
-
84993087916
-
-
Texas, CILR 8262
-
State v Burleson, Texas, CILR 8262, 1988.
-
(1988)
State v Burleson
-
-
-
9
-
-
0003995482
-
Spectacular Computer Crimes
-
Dow Jones-Irwin, Ch. 7
-
BloomBecker, B. (1990) ‘Spectacular Computer Crimes’, Dow Jones-Irwin, Ch. 7.
-
(1990)
-
-
BloomBecker, B.1
-
10
-
-
84993098507
-
-
27th November
-
Computing, 27th November, 1992.
-
(1992)
Computing
-
-
-
11
-
-
84993098507
-
-
11th December
-
Computing, 11th December, 1992.
-
(1992)
Computing
-
-
-
12
-
-
84921176017
-
Data Theft
-
Mandarin
-
Cornwall, H. (1990) ‘Data Theft’, Mandarin, pp. 218–220.
-
(1990)
, pp. 218-220
-
-
Cornwall, H.1
-
13
-
-
50749133764
-
Investigating Computer Crime in the UK
-
Fisch Nigri, D. (1992) ‘Investigating Computer Crime in the UK’, Computer Law & Security Report, Vol. 8, No. 3, pp. 132–135.
-
(1992)
Computer Law & Security Report
, vol.8
, Issue.3
, pp. 132-135
-
-
Fisch, N.D.1
-
15
-
-
0041065277
-
The Internet Worm: An Analysis
-
Spafford, E. H. (1989) ‘The Internet Worm: An Analysis’, Computer Commun. Review, Vol. 19, No. 1, pp. 17–57.
-
(1989)
Computer Commun. Review
, vol.19
, Issue.1
, pp. 17-57
-
-
Spafford, E.H.1
-
16
-
-
0242444735
-
The Worm Story
-
Spafford, E. H. et al. (1989) ‘The Worm Story’, Commun. ACM, Vol. 32, No. 6, pp. 677–710.
-
(1989)
Commun. ACM
, vol.32
, Issue.6
, pp. 677-710
-
-
Spafford, E.H.1
-
17
-
-
84992947539
-
The Secret War
-
20th June
-
Warren, P. (1996) ‘The Secret War’, Computing, 20th June.
-
(1996)
Computing
-
-
Warren, P.1
-
18
-
-
0542386000
-
A Pathology of Computer Viruses
-
Springer-Verlag
-
Ferbrache, D. (1991) ‘A Pathology of Computer Viruses’, Springer-Verlag.
-
(1991)
-
-
Ferbrache, D.1
-
19
-
-
84992947524
-
-
computer virus prevalence survey
-
NCSA 1997 computer virus prevalence survey.
-
(1997)
-
-
-
20
-
-
84992990445
-
CVW — Computer Virus as a Weapon
-
Evancoe, P. and Bentley, M. (1994) ‘CVW — Computer Virus as a Weapon’, Military Technology, Vol. 5, No. 9, pp. 38–40.
-
(1994)
Military Technology
, vol.5
, Issue.9
, pp. 38-40
-
-
Evancoe, P.1
Bentley, M.2
-
21
-
-
84993048422
-
The IW Threat from Sub-state Groups: An Interdisciplinary Approach
-
National Defense University, Washington, DC, June
-
Rathmell, A., Overill, R., Gearson, J. and Valeri, L.(1997) ‘The IW Threat from Sub-state Groups: An Interdisciplinary Approach’, Proc. 3rd Intl. Command & Control Research & Technology Symp., National Defense University, Washington, DC, June, pp. 164–178.
-
(1997)
Proc. 3rd Intl. Command & Control Research & Technology Symp.
, pp. 164-178
-
-
Rathmell, A.1
Overill, R.2
Gearson, J.3
Valeri, L.4
-
22
-
-
84992979291
-
Superhighway Robbery
-
rev. edn Channel 4 TV, 20th October
-
‘Superhighway Robbery’ (rev. edn), Equinox, Channel 4 TV, 20th October, 1997.
-
(1997)
Equinox
-
-
-
23
-
-
84992979296
-
Issues and Trends
-
Computer Security Institute, March
-
‘Issues and Trends’, 1998 CSI/FBI computer crime and security survey, Computer Security Institute, March.
-
(1998)
CSI/FBI computer crime and security survey
-
-
-
24
-
-
84992977952
-
-
NCC survey of IT security failures or breaches 1991, National Computing Centre, 1992.
-
(1992)
National Computing Centre
-
-
-
25
-
-
84992979269
-
-
November
-
IT security breaches survey 1994, NCC/DTI/ICL, November 1994.
-
(1994)
NCC/DTI/ICL
-
-
-
26
-
-
84992947517
-
-
November
-
The information security breaches survey 1996, NCC/DTI/ICL/ITSEC, November 1996.
-
(1996)
NCC/DTI/ICL/ITSEC
-
-
-
27
-
-
84993033282
-
-
March
-
The business information security survey 1998, NCC/DTI/AT&T/SSL/ITSEC, March 1998.
-
(1998)
NCC/DTI/AT&T/SSL/ITSEC
-
-
-
28
-
-
84993033283
-
Ghost in the Machine: An Analysis of IT Fraud and Abuse
-
February
-
‘Ghost in the Machine: An Analysis of IT Fraud and Abuse’, Audit Commission Update Report (February 1998).
-
(1998)
Audit Commission Update Report
-
-
-
29
-
-
84992977916
-
The Role of Information Technology in Combating Fraud
-
PA Consulting Group, February
-
Jenner, P. (1996) ‘The Role of Information Technology in Combating Fraud’, PA Consulting Group, February.
-
(1996)
-
-
Jenner, P.1
-
30
-
-
0004745221
-
Computer Crime: An Emerging Challenge for Law Enforcement
-
February
-
Carter, D. L. and Katz, A.J. (1997) ‘Computer Crime: An Emerging Challenge for Law Enforcement’, February.
-
(1997)
-
-
Carter, D.L.1
Katz, A.J.2
-
31
-
-
0003615456
-
Ghost in the Machine
-
ref. 21
-
‘Ghost in the Machine’, ref. 21.
-
-
-
-
32
-
-
84992934425
-
Opportunity Makes a Thief: An Analysis of Computer Abuse
-
‘Opportunity Makes a Thief: An Analysis of Computer Abuse’ (1994) Audit Commission National Report.
-
(1994)
Audit Commission National Report
-
-
-
33
-
-
84993033277
-
Practical Intrusion Detection Introduction
-
April
-
Sparks, S. and Pethia, R. (1997) ‘Practical Intrusion Detection Introduction’, FedCIRC, CSTC 97-063, April, p. 32.
-
(1997)
FedCIRC, CSTC 97-063
, pp. 32
-
-
Sparks, S.1
Pethia, R.2
-
34
-
-
84993103125
-
Criminal Intelligence
-
14th March
-
Warren, P. (1996) ‘Criminal Intelligence’, Computing, 14th March.
-
(1996)
Computing
-
-
Warren, P.1
-
36
-
-
0009998852
-
Digital Crime: Policing the Cybernation
-
Kogan Page
-
Barrett, N. (1997) ‘Digital Crime: Policing the Cybernation’, Kogan Page, p. 40.
-
(1997)
, pp. 40
-
-
Barrett, N.1
-
40
-
-
84992990438
-
Superhighway Robbery
-
ref. 18
-
‘Superhighway Robbery’, ref. 18.
-
-
-
-
41
-
-
84992990431
-
-
ref. 14
-
Warren, ref. 14.
-
-
-
Warren1
-
42
-
-
84993032975
-
-
7th May
-
Computing, 7th May, 1998.
-
(1998)
Computing
-
-
|