References
- Information Terrorism: Can You Trust Your Toaster? M. G. Devost;B. K. Houghton;N. A. Pollard
- 1996 IEEE Symp. on Security and Privacy Java Security: From HotJava to Netscape and Beyond D. Dean;E. W. Felten;D. S. Wallach
- Information Systems Security v.6 no.Issue 2 Information Warfare and Information Systems Security Professional G. Kovacich
- What is Information Warfare M. Libichi
- The Digital Threat: United States National Security and Computers M. G. Devost
- Committee on Governmental Affairs Testimony in Hackers Penetrate D.O.D. Computer Systems: Hearings before the Subcommittee on Government Information & Regulation J. L. Brock
- Information Warfare and Security D. E. Denning
- The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espinage C. Stoll
- Cyberpunk: Outlaws & Hackers on the computer Frontier K. Hafner;J. Markoff
- Computers Under Attack: Intruders, Worms & Viruses P. J. Denning
- The Hacker Crackdown: Law and Disorder on the Electronic Frontier B. Sterling
- ISSUES in Sci. and Tech. Fall An Electronic Pearl Harbor? Not Likely G. Smith