Компьютерное подполье. Истории о хакинге, безумии и одержимости :: Дрейфус Сьюлетт
Страница:
602 из 606
Zardoz – ограниченный лист почтовой рассылки материалов по компьютерной безопасности.
Библиография
Australian Federal Police (AFP), Annual Report 1995–1996, Canberra, 1996.
–, Annual Report 1994–1995, Canberra, 1995.
–, Annual Report 1993–1994, Canberra, 1994.
Bourne, Philip E., «Internet security; System Security», DEC Professional, vol. 11, June 1992.
Cerf, Vinton G., «Networks», Scientific American, vol. 265, september 1991.
Clyde, Robert A., «DECnet Security», DEC Professional, vol. 10, april 1991.
Commonwealth Attorney-General’s Department, Interim Report on Computer Crime (the gibbs Report), Canberra, 1988.
Commonwealth Director of Public Prosecution (DPP), Annual Report 1993–1994, Canberra, 1994.
Commonwealth Scientific and Industrial Research Organisation (CSIRO), Annual Report 1994–1995, Canberra, 1995.
Davis, Andrew W., «DEC Pathworks the mainstay in Macto-VAX connectivity», Mac Week, vol. 6, 3 August 1992.
Department of Foreign Affairs and Trade, Australian Treaty Series 1993, no. 40, Australian Government Publishing Service, Canberra, 1993.
Digital Equipment Corporation, Annual Report 1989, securities and Exchange Commission (SEC) Online (USA) Inc., 1989.
–, Quarterly Report for period ending 12.31.89, sec Online (USA).
Gezelter, Robert, «The DECnet TASK object; Tutorial», Digital Systems Journal, vol. 16, july 1994.
Gianatasio, David, «Worm Infestation hits 300 VAX/VMS systems worldwide via DECnet», Digital Review, vol. 6, 20 november 1989.
Haffner, Katie & Markoff John, Cyberpunk, Corgi Books (transworld), Moorebank NSW, 1994.
Halbert, Debora, «The Potential for Modern Communication Technology to Challenge Legal Discourses of Authorship and Property», Murdoch University E-Law Journal, vol. 1, no. 2.
Kelman, Alistair, «Computer Crime in the 1990s: a Barrister’s View», Paper for the Twelfth National Symposium on Economic Crime, September 1994.
Law Commission (UK) Working Paper, no. 110, 1988.
Lloyd, J. Ian & Simpson, Moira, Law on the Electronic Frontier, David Hume Institute, Edinburgh, 1996.
Longstaff, Thomas A., & Schultz, E. Eugene, «Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code». Computers & Security, vol. 12, february 1993.
Loundy, David J., «Information Systems Law and Operator Liability Revisited», Murdoch University E-Law Journal, vol. 1, no.
|< Пред. 600 601 602 603 604 След. >|