Docstoc

President's Commission on Critical Infrastructure Protection

Document Sample
President's Commission on Critical Infrastructure Protection Powered By Docstoc
					     President’s Commission
on Critical Infrastructure Protection

               1997
                ACKNOWLEDGMENT

The Commission acknowledges the important contributions to the development of this Open
Source Bibliography made by Ronald Shade of the Department of Defense, and thanks him for
his efforts. This bibliography serves as a valuable roadmap for existing knowledge and thinking
on issues related to critical infrastructures and their protection.




                                                                                                  2
           Open Source Bibliography

“1995 Annual Report of the Computer System Security and Privacy Advisory Board.”
Gaithersburg, MD: National Institute of Standards and Technology. Mar. 1996. Online. Internet.
Jul. 3, 1997. Available http://csrc.ncsl.nist.gov/csspab/95-rpt.txt

Abdullah, Omar C. “Security Threats to Computer Networks: A Case of ‘We Can’t See the
Wood for the Trees.’ “ Information Security: Its Development and Impact on Business.
Proceedings of the 8th Asia Pacific Information Systems Control Conference, October 1992.

Abrams, Marshall D. and H. Podell. Information Security in Computing Systems.           Silver
Springs, MD: Computer Educators, 1992.

Abrams, Marshall D., Sushil Jajodia, and Harold J. Podell, eds. Information Security: An
Integrated Collection of Essays. Los Alamitos, CA: IEEE Computer Society Press, 1995.

Abrams, Marshall D. Information Security Principles and Practice.        Silver Springs, MD:
Computer Educators, 1995.

Abrams, Marshall D. Recent Developments in Information Security. Silver Springs, MD:
Computer Educators, 1993.

Access to Information & Protection of Privacy Act: A Discussion Guide. Edmonton, Alberta,
Canada: Government. of Alberta, 1993.

Adams, Bender, Bloom, et al. “The Information Web: A Vulnerability Assessment.” Sep. 15,
1996.           Online.           Internet.         Oct.     15,   1996.       Available
http://www.au.af.mil/au/database/research/ay1996/acsc/acsc-002.htm

“Advanced Fingerprint Verification Security Added to Oracle Universal Server: Indentix’s
Biometric Authentication Technology Provides Heightened Database Security.” Business Wire
Feb. 10, 1997.

Agudo, Michael E. Joint Program Office for Special Technical Countermeasures. An Overview
of Electric Power Systems Operation. Mar. 1996.

Agudo, Michael E. Joint Program Office for Special Technical Countermeasures. Assessment
of Electric Power Control Systems Security. Report submitted to National Communication
Systems, Sep. 30, 1996.




                                                                                                 3
Ahuja, Vijay. Network and Internet Security. Boston: AP Professional, 1996.

Aiken, R.J., J.S. Cavallini, and M.A. Scott. Energy Utilities in the Internet and NII: Users or
Providers? Livermore, CA: Lawrence Livermore National Laboratory, Apr. 1995. (NTIS No.
DE96001729)

Akersten, S. Ingvar. “Modeling the Assimilation of an Enterprise and its IT-support.”
Information Security: Concepts and Technologies. Proceedings of the 1994 AFCEA Europe
Rome Symposium & Exposition, 11-13 May 1994, Rome, Italy.

Alberts, David S. Defensive Information Warfare. Washington: National Defense University.
Washington: GPO, 1996.

Alberts, David S. and Richard E. Hayes. “The Realm of Information Dominance: Beyond
Information Warfare.” In First International Symposium on Command and Control Research and
Technology. Held at National Defense University, Washington, DC, 19-22 June 1995.
Washington: National Defense University, 1995: 560-565.

Alexander, Michael. The Underground Guide to Computer Security: Slightly Askew Advice on
Protecting Your PC and What's on It. Reading, MA: Addison-Wesley, 1996.

Alexander, Yonah, and Charles K. Ebinger. Political Terrorism and Energy: The Threat and
Response. New York: Praeger, 1982.

Allard, Kenneth C. Command, Control, and the Common Defense: Key Study of Command and
Control from the Strategic, Macro Level. Washington, DC: National Defense University.
Washington: GPO, 1996.

Alleyne, Mark D. “Thinking About the International System in the 'Information Age': Theoretical
Assumptions and Contradictions.” Journal of Peace Research Nov. 1994: 407-424.

Alliance for Telecommunications Industry Solutions (ATIS) Network Reliability Steering
Committee. Analysis of Power Related Network Outages. Aug. 1996.

Alliance for Telecommunications Industry Solutions (ATIS) Standards Committee. A Technical
Report on Network Survivability Performance. Nov. 1993.

American Institute for Business Research (AIBR). Protecting Corporate America’s Secrets in the
Global Economy: A Risk Assessment of the New Threats to U.S. Business Information.
Framington, MA: Author, 1992.

American Institute of Certified Public Accountants. Information Security. Jersey City, NJ:
Author, 1995.




                                                                                                  4
American Institute of Certified Public Accountants. Information Security: Practice Aid. Jersey
City, NJ: Author, 1995.

American National Standards Institute and the Institute of Electrical and Electronic Engineers.
IEEE Standard Definitions for Use in Reporting Electric Generating Unit Reliability, Availability,
and Productivity. ANSI/IEEE Std 762-1987, approved Feb. 1986.

American National Standards Institute and the Institute of Electrical and Electronic Engineers.
IEEE Recommended Practice for the Design of Reliable Industrial and Commercial Power
Systems. ANSI/IEEE Std 493-1980, approved Jun. 1982.

American Society for Industrial Security. Security Industry Buyers Guide. Potomac, MD:
Phillips Business Information, 1997.

American Water Works Association. “Electric Power Reliability for Public Water Supply and
Wastewater Utilities.” AWWA Statement of Policy on Water Supply Matters. Jan. 25, 1987.
Online. Internet. Feb. 19, 1997. Available http://www.awwa.org/govtaff/elepopol.htm

Amoroso, Edward G. Fundamentals of Computer Security Technology. Englewood Cliffs, NJ:
Prentice Hall PTR, 1994.

Anderson, James: “Chugging up the Onramp of the Info Interstate.” Foreign Service Journal
Mar. 1995.

Anderson, Robert, H.
 Risks to the U.S. Infrastructure from Cyberspace. Santa Monica, CA: RAND, 1996.

Anderson, Robert H. and Anthony C. Hearn. An Exploration of Cyberspace Security R&D
Investment Strategies for DARPA: “The Day After--in Cyberspace II. Santa Monica, CA:
RAND, 1996.

Anderson, Ross J. and S. Johann Bezuidenhoudt. “On the Reliability of Electronic Payment
Systems.” IEEE Transactions on Software Engineering May 1996: 294-301.

Anthes, Gary H. “Analysis Tool Opens the Door for Hackers.” Computerworld Aug. 12, 1996:
45-47.

Anthes, Gary H. “Hackers Exploit Win 95 Password.” Computerworld Dec. 11, 1995: 4.

Anthes, Gary H. “In the Net Shall We Trust: Security Standards Sought to Boost Electronic
Commerce.” Computerworld Jul. 29, 1996: 59.

Arkin, Stanley S., et al. Prevention and Prosecution of Computer and High Technology Crime.
New York: Matthew Bender Books, 1989.




                                                                                                     5
Arnold, H.D. J. Hukill, J. Kennedy, et al. “Targeting Financial Systems as Centers of Gravity:
“Low Intensity” to “No Intensity” Conflict.” Defense Analysis 1994: 181-208.

Arquilla, John and David F. Ronfeldt. The Advent of Netwar. Santa Monica, CA: RAND, 1996.

Arquilla, John and David F. Ronfeldt. “Cyberwar is Coming!” Comparative Strategy Apr.-Jun.
1993: 141-165.

Arquilla, John. “The Strategic Implications of Information Dominance.” Strategic Review
Summer 1994: 24-30.

Atkins, Derek, Paul Buis, Chris Hare, et al.        Internet Security Professional Reference.
Indianapolis, IN: New Riders, 1996.

Attali, Jacques. Millennium: Winners and Losers in the Coming World Order. New York:
Random, 1991.

Automated Tools for Testing Computer System Vulnerability: Computer Security. Gordon Press,
1996.

Babbitt, Bruce. “Establishing Roots in Our Landscapes of Complexity.” Remarks by Interior
Secretary Bruce Babbitt at the ESRI - ARC/INFO User Conference, Palm Springs, CA, Tuesday,
May 21, 1996. Online. Internet. Feb. 19, 1997. Available http://www.fgdc.gov/babbitt.html

Bacard, Andre. The Computer Privacy Handbook: A Practical Guide to E-Mail Encryption, Data
Protection, and PGP Privacy Software. Berkeley, CA: Peachpit Press, 1995.

Bae, K. Security Issues in the Telecommunications Plan for CALS Implementation in Korea.
Monterey, CA: Naval Postgraduate School, 1995.

Baer, W. S. Technology's Challenges to the First Amendment. Santa Monica, CA: RAND, 1992.

Bagwill, R., et al. Security in Open Systems. Gaithersburg, MD: National Institute of Standards
and Technology. Washington: GPO, 1994.

Baker, Bruce N. “The Most Important Future Threats to Information.” First Annual Pan-Asian
Information Technology Security Summit ‘95, 26-28 June 1995, Singapore: Proceedings.

Baker, Richard H. Network Security: How to Plan for It and Achieve It. New York: McGraw-
Hill, 1995.

Bamberger, Rita J., William A. Blazer, and George E. Peterson. “Infrastructure Support for
Economic Development.” American Planning Association Planning Advisory Service Report
No. 39. Washington, Sep. 1985.




                                                                                                  6
Banisar, David, ed. Cryptography and Privacy Sourcebook (1995): Documents on Encryption
Policy, Wiretapping, and Information Warfare. Upland, PA: DIANE, 1995.

Barber, Paul, Vikram Buhraja, Jim Byrd, et al. Options to Ensure Compliance with NERC and
Regional Reliability Council Policies, Standards, and Criteria. Princeton, NJ: North American
Electric Reliability Council, 1996.

Barbetta, Frank. “Concern for Security High: Action Remains Low.” Business Communications
Review
Jan. 1997: 59.

Barlow, Jason B. Strategic Paralysis: An Airpower Theory for the Present. Maxwell AFB, AL:
Air University, School of Advanced Airpower Studies.

Barrett, Daniel J. Bandits on the Information Highway: What You Need to Know. Sebastopol,
CA: O’Reilly & Associates, 1996.

Baskerville, Richard. “A Taxonomy for Analyzing Hazards to Information Systems.”
Information Systems Security: Facing the Information Society of the 21st Century. Sokratis K.
Katsikas and Dimitris Gritzalis, eds. New York: Chapman & Hall, 1996. 167-176.

Basalla, George. The Evolution of Technology. Cambridge: Cambridge University Press, 1988.

Bates, Regis J. Disaster Recovery Planning: Networks, Telecommunications, and Data
Communications. New York: McGraw-Hill, 1992.

Bauer, Martin, ed. Resistance to New Technology: Nuclear Power, Information Technology and
Biotechnology. Cambridge: Cambridge University Press, 1995.

Bazzana, G., M. Giunchi, C. Praolini, et al. “An Industrial Approach to Software Reliability and
Security Through Testing.” Information Security: Concepts and Technologies. Proceedings of
the 1994 AFCEA Europe Rome Symposium & Exposition, 11-13 May 1994, Rome, Italy.

Beaty, Wayne. “SCADA/EMS Systems Decline in Number and Value.” Electric Light & Power
Aug. 1996: 17-19.

Bedrosian, E., E.D. Harris, K.J. Hoffmayer, et al. AM Broadcast Emergency Relay (AMBER):
Final Report. 1990.

“Beepers Go Nuts Across U.S. for 30 Minutes.” Jan. 10, 1997. Online. Internet. Feb. 19, 1997.
Available http://www.info-sec.com/abuse/infosecz4.html-ssi

Behar, Richard and Melanie Warner. “Who’s Reading Your E-mail?: As the World Gets
Networked, Spies, Rogue Employees, and Bored Teens Are Invading Companies’ Computers to
Make Mischief, Steal Trade Secrets--Even Sabotage Careers.” Fortune Feb. 3, 1997: 56-70.




                                                                                                   7
Bel Bruno, Joe. “Trends in Region: Deregulation May Mean a Makeover for Large Power
Agency.” The Bond Buyer Jun. 28, 1996: 40.

Bender, Bryan. “Perry Confident in Ability to Fend Off Cyber Attacks.” Defense Daily Jan. 3,
1997.

Benedikt, Michael, ed. Cyberspace: the First Steps. Cambridge, MA: MIT Press, 1991.

Berghel, Hal and Lawrence O’Gorman. “Protecting Ownership Rights Through Digital
Watermarking.” IEEE Computer July 1996: 101-103.

Berkowitz, Bruce D. “Warfare in the Information Age.” Issues in Science and Technology Fall
1995: 59-66.

Bernardino, R.S. SCADA and Related-Systems: Critical and Vulnerable Elements of Domestic
Components of National and Economic Security. Washington, DC: National Defense University.
Washington: GPO, 1996.

Bernstein, Barton J. “The Birth of the U.S. Biological-Warfare Program.” Scientific American
Jun. 1987: 116-121.

Bernstein, Terry, Anish B. Bhimani, Eugene Schultz, et al. Internet Security for Business. New
York: John Wiley & Sons, 1996.

Berry, John. “Who Will Tax the Web?” Internet World Apr. 1997: 37-40.

Bertino, Elisa, ed. Computer Security, ESORICS 96: 4th European Symposium on Research in
Computer Security, Rome, Italy, September 25-27,1996, Proceedings. New York: Springer-
Verlag, Sep. 1996.

Besancon, Francois. “Securing Multiplatform Environment Today and Tomorrow.” Information
Security: Concepts and Technologies. Proceedings of the 1994 AFCEA Europe Rome
Symposium & Exposition, 11-13 May 1994, Rome, Italy.

Bhaskar, Krish N.    Computer Security: Threats and Countermeasures.       Manchester: NCC
Blackwell, 1993.

Biehl, William. “Keep Your SCADA System Working.” Water Engineering & Management Sep.
1995: 32-35.

Bioy, Pierre. “MARBRES: The Method for Auditing C3I Systems Availability.” Information
Security: Concepts and Technologies. Proceedings of the 1994 AFCEA Europe Rome
Symposium & Exposition, 11-13 May 1994, Rome, Italy.




                                                                                                 8
Bishop, Edward C. “Risk Assessment/Risk Management for Emergency Response Operations.”
Proceedings of the Conference on Chemical Risk Assessment in the DOD: Science, Policy and
Practice, Dayton, OH, April 8 - 11, 1991. (DTIC No. AD-A268643, Jan. 1993 - Unclassified)

Bishop, Matthew A. The Art & Science of Computer Security. Reading, MA: Addison-Wesley,
1997.

Bjerknes, Gro, Pelle Ehn, and Morten Kyng, eds. Computers and Democracy: A Scandinavian
Challenge. Aldershot, UK: Ashgate Publishing, 1987.

Black, Peter. Soft Kill: Fighting Infrastructure Wars in the 21st Century.” Wired Jul.-Aug. 1995.

Blackwell, Ed. Manager’s Guide to Telephone Communications Fraud. San Francisco, CA:
Computer Security Institute, 1994.

Blake, Pat. “Invisible Protection: Security for Carrier Is in the Eye of the Beholder. But New
Forms of Encryption and Biometric Technology Are Cutting to the Core, Providing Barriers That
Prevent Fraud and Unauthorized Access.” Computerworld Nov. 1, 1996: T6.

BloomBecker, J.J. Introduction to Computer Crime. Santa Cruz, CA: National Center for
Computer Crime Data, 1988.

BloomBecker, J.J. Spectacular Computer Crimes: What They Are and How They Cost American
Business Half a Billion Dollars a Year. Homewood, IL: Dow Jones-Irwin, 1990.

BloomBecker, J.J. The Investigation of Computer Crime. Columbus, OH: Battelle Law and
Justice Center, 1992.

Bolz, Frank, Kenneth J. Dudonis, and David P. Schulz. Counter-terrorism Handbook: Tactics,
Procedures, and Techniques. New York: Elsevier, 1990.

Bond, James. “Role of Governments and International Financial Institutions in Developing
Information Infrastructure.” GIIC Regional Meeting and International Conference on National
Information Infrastructure for Social and Economic Development in Asia, November 28-30,
1995, United Nations Conference Centre, Bangkok, Thailand.

Boom, Alan. “Risk Analysis and Small Dams.” Online. Internet. Feb. 19, 1997. Available
http://wtrwww.env.gov.bc.ca/wat/dams/risk.html.

Bovelander, Ernst and Rudolf L. van Renesse. “Smartcards and Biometrics: An Overview.”
Computer Fraud & Security Dec. 1995: 8-12.

Bowers, C.A. The Cultural Dimensions of Educational Computing: Understanding the Non-
Neutrality of Technology. New York: Teachers College Press, 1988.




                                                                                                    9
Bowman, Erik J. “Security Tools Up for the Future.” Security Management Jan. 1996: 30-34.

Bowman, Stephen. When the Eagle Screams: America's Vulnerability to Terrorism. Secaucus,
NJ: Carol, 1994.

Bowyer, Kevin W. Ethics and Computing: Living Responsibly in a Computerized World. Los
Alamitos, CA: IEEE Computer Society Press, 1996.

Boyce, Brian. “A Manual Security Solution: Information Technology Security Manual.”
Security Management Nov. 1996: 67.

Branscomb, Anne W. Who Owns Information?: From Privacy to Public Access. New York:
Basic Books, 1994.

Branscomb, Lewis M, and James Keller. Converging Infrastructures: Intelligent Transportation
and the NII. Cambridge, MA: MIT Press, 1996.

Brewer, Michael.     Information Security.   London: DISC (organization), British Standards
Institution, 1992.

Brown, James. “Risk Data: What It Often Doesn’t Tell Us.” Professional Safety Jan. 1996: 26-
29.

Brown, Randy. “Bombs Away: Preventing Terrorist Attacks on Buildings.” Buildings August
1996: 34.

Brusin, G. “Improving Your GPS Capabilities in a Tactical Environment with Loran-C.”
Megapulse, Inc. Megazine, [Online serial], 1:1. Online. Internet. Feb. 19, 1997. Available
http://www.megapulse.com/megazine.html

“BSA: No Privacy and Security, No Highway.” Newsbytes News Network Jul. 15, 1994.

Bucciero, Joseph. Electric Utility Controls & Exposure to Security Threats. Briefing to NSTAC
IATF Energy Risk Assessment Subgroup, Jun. 6, 1996.

Bud-Frierman, Lisa, ed. Information Acumen: The Understanding and Use of Knowledge in
Modern Business. London: Routledge, 1994.

Bugliarello, Dr. George. “Telecommunications, Politics, Economics, and National Sovereignty:
A New Game.” Airpower Journal Spring 1996.

Burgess, Sean P. “Cellular Cloning Succumbs to Recycled Defense Technology.” Signal Apr.
1997: 27-29.




                                                                                                10
Busey IV, Adm. James B. “Information Warfare Calculus Mandates Protective Actions.” Signal,
Oct. 1994: 15.

“Businesses Face Threat Of Information Warfare.” Signal Jun. 1996: 45-46.

Button, Graham. Technology in Working Order: Studies of Work, Interaction, and Technology.
London: Routledge, 1993.

Caelli, William, Dennis, Longley, and Michael Shain. Information Security Handbook. New
York: Macmillan, 1994.

Campen, Alan D., Douglas H. Dearth, and R. Thomas Goodden, eds. Cyberwar: Security,
Strategy, and Conflict in the Information Age. Fairfax, VA: AFCEA International Press, 1996.

Campen, Alan D, ed. The First Information War: The Story of Communications, Computers, and
Intelligence Systems in the Persian Gulf War. Fairfax, VA: AFCEA International Press, 1992.

Canadian Standards Association.    Model Code for the Protection of Personal Information.
CAN/CSA-Q830-1996, 1996.

Capocelli, Renato M., Alfredo De Santis, and Ugo Vaccaro, eds. Sequences II: Methods in
Communication, Security and Computer Science, Sequences '91 Conference, Positano, Italy,
1991: Proceedings. New York: Springer-Verlag, 1993.

Caputo, Chuck, Frederick Herr, and Jaton West. “Assessment of Threats and Vulnerabilities of
the Public Switched Network.” Information Security: Concepts and Technologies. Proceedings
of the 1994 AFCEA Europe Rome Symposium & Exposition, 11-13 May 1994, Rome, Italy.

Carman, Dawn Murto. “Balancing Patient Confidentiality and Release of Information.” Bulletin
of the American Society for Information Science Feb./Mar. 1997: 16-17.

Carroll, John M. Computer Security. 3rd ed. Boston: Butterworth-Heinemann, 1996.

Carter, David L. and Andra J. Katz. “Computer Crime: An Emerging Challenge for Law
Enforcement.” Feb. 03, 1997. Online. Internet. Feb. 19, 1997. Available http://www.info-
sec.com/access/infoseczh.html-ssi

Cassils, J. Anthony. The Financial Services Industry and Sustainable Development: Managing
Information and Risk in Canada. Upland, PA: DIANE, 1996.

Castano, Silvana, Mariagrazia Fugini, Giancarlo Martella, et al. Database Security. Reading,
MA: Addison-Wesley, 1995.

Cauley, G. and K. Stahlkopf. Technical Issues Raised by the Western System Outages of July 2
and August 10, 1996. Electric Power Research Institute. Sep. 11, 1996.




                                                                                               11
Cavazos, Edward and Gavino Morin. Cyberspace and the Law: Your Rights and Duties in the
On-line World. Cambridge, MA: MIT Press, 1994.

Cavallini, J.S. and R.J. Aiken. Government Services Information Infrastructure Management.
Livermore, CA: Lawrence Livermore National Laboratory, Apr. 1995.               (NTIS No.
DE96002668/XAB)

“CBW: Chemical and Biological Warfare.” London Conference on CBW. Steven Rose, ed.
London: George G. Harrap, 1968.

“Cellular One Signs Agreement to Integrate Advanced Fraud Protection System to Protect
Greater Bay Area Customers: New RF Fingerprinting Technology Designed to Further Combat
the Fight Against Fraud.” Cellular One In The News. May 13, 1996. Online. Internet. Mar. 25,
1997. Available http://www.cellone-sf.com/lobandwidth/inthenews/may13_96.html

Center for Democracy and Technology. “Democratic Values for a Digital Age: First Annual
Report and 1996 Work in Progress.” Mar. 1996. Online. Internet. Feb. 19, 1997. Available
http://www.cdt.org/publications/annuals/96_report.html

Chakravarthy, Bala. “A New Strategy Framework for Coping with Turbulence.”            Sloan
Management Review Winter 1997: 69-82.

Chan, Pearleen. “EDI in Trade Facilitation.” GIIC Regional Meeting and International
Conference on National Information Infrastructure for Social and Economic Development in
Asia, November 28-30, 1995, United Nations Conference Centre, Bangkok, Thailand.

Chandler, Adrian and James A. Holland.      Information: Protection, Ownership and Rights.
London, UK: Blackstone Press, 1993.

Chapman, D. Brent and Elizabeth D. Zwicky. Building Internet Firewalls. Sebastopol, CA:
O’Reilly & Associates, 1995.

Chenoweth, M.E. The Civil Reserve Air Fleet: An Example of the Use of Commercial Assets to
Expand Military Capabilities During Contingencies, 1990.

Cheswick, William and Steven Bellovin. Firewalls and Internet Security: Repelling the Wily
Hacker. Reading, MA: Addison-Wesley, 1994.

Chmora, Andrew and Stephen B. Wicker, eds. Error Control, Cryptology, and Speech
Compression: Workshop on Information Protection, Moscow, Russia, December 6-9, 1993 :
Selected Papers. New York: Springer-Verlag, 1994.

Christmas, Paul. Network Security Manager. Oxford, UK: Elsevier Advanced Technology,
1992.




                                                                                               12
Clark, Howard W. and Saundra K Wallfesh. “Measuring Effectiveness of Theater Information
Warfare/Command and Control Warfare Campaigns.” FIESTACROW +95_ (Command and
Control
Warfare in Joint Operations track.), Association of Old Crows, San Antonio, TX, Apr. 1995.

Clarke, David J. and Rene Mendoza. Novell's Guide to Network Security. San Francisco, CA:
SYBEX, 1996.

Clutterbuck, Richard. Terrorism, Drugs, & Crime in Europe After 1992. London: Routledge,
1990.

Cobb, Stephen. The NCSA Guide to PC and LAN Security. New York: McGraw-Hill, 1996.

Cohen, Eliot. “What to do About National Defense.” Commentary Nov. 1994.

Cohen, Frederick B. Protection and Security on the Information Superhighway. New York: John
Wiley & Sons, 1995.

Cohen, Frederick B. A Short Course on Computer Viruses. 2nd ed. New York: John Wiley &
Sons, 1994.

Cole, Leonard A. Clouds of Secrecy: The Army’s Germ Warfare Tests over Populated Areas.
Totowa, NJ: Rowman & Littlefield, 1988.

Cole, Leonard A. The Eleventh Plague: The Politics of Biological and Chemical Warfare. New
York: W.H. Freeman, 1997.

Collins, Harry M. Artificial Experts: Social Knowledge and Intelligent Machines. Cambridge,
MA: MIT Press, 1990.

“CommerceNet.”             Online.        Internet.    Jul.    3,   1997.         Available
http://logic.standard.edu/cit/commercenet.html

“Commercial Systems Enhance Information Warfare Capability.” Signal Mar. 1997: 64.

COMPASS '96 Proceedings of the Eleventh Annual Conference on Computer Assurance, June
17-21, 1996, National Institute of Standards and Technology, Gaithersburg, Maryland.
COMPASS Sponsors: IEEE Aerospace and Electronics Systems Society, et al. Piscataway, NJ:
IEEE Service Center, 1996.

COMPSEC International 94 Proceedings. Oxford, UK: Elsevier Advanced Technology, 1994.

Tantam, M. Computer Abuse Investigator. Oxford, UK: Elsevier Advanced Technology, 1991.




                                                                                              13
Computer Security...into the Future: Proceedings: National Computer Security Conference, 1988
(11th). Upland, PA: DIANE, 1995.

Computer Security Applications, 8th Annual Conference. Los Alamitos, CA: IEEE Computer
Society Press, 1992.

Computer Security Applications, 9th Annual Conference. Los Alamitos, CA: IEEE Computer
Society Press, 1993.

Computer Security Applications, 10th Annual Conference. Los Alamitos, CA: IEEE Computer
Society Press, 1994.

Computer Security Applications, 11th Annual Conference. Los Alamitos, CA: IEEE Computer
Society Press, 1995.

Computer Security Applications, 12th Annual Conference. Los Alamitos, CA: IEEE Computer
Society Press, 1996.

Computer Security Foundations Workshop V. Los Alamitos, CA: IEEE Computer Society Press,
1992.

Computer Security Foundations Workshop VI. Los Alamitos, CA: IEEE Computer Society Press,
1993.

Computer Security Foundations Workshop, 7th, CSFW 94: Proceedings. Los Alamitos, CA:
IEEE Computer Society Press, 1994.

Computer Security Foundations Workshop, 8th, CSFW 95: Proceedings. Los Alamitos, CA:
IEEE Computer Society Press, 1995.

Computer Security Foundations Workshop, 9th: CSFW 96: Proceedings. Los Alamitos, CA:
IEEE Computer Society Press, 1996.

Computer Security Requirements: Guidance for Applying the Department of Defense Trusted
Computer System Evaluation Criteria in Specific Environments. Upland, PA: DIANE, 1995.

Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation
Criteria. Upland, PA: DIANE, 1993.

Computer Technology Research Corp. Staff. Enterprisewide Network Security: Effective
Implementation & International Standards. Charleston, SC: Author, 1994.

“Computer Virus Myths Home Page.” Nov. 27, 1996. Online. Internet. Feb. 19, 1997.
Available http://www.info-sec.com/viruses/infoseci.html-ssi




                                                                                                14
Constance, Paul. “Information Security Is a ‘Real Mess,’ DOD Expert Says.” Government
Computer News Jun. 10, 1996: 59.

Constance, Paul. “Multilevel Security? Not Now: National Security Agency to Focus on Two
Levels of Information Protection.” Government Computer News Jul. 15, 1996: 60.

Constance, Paul. “Tide Turns on Security Tsunami: Defense Information Systems Agency’s
$1.09 Billion Information Security Technical Services Contract.” Government Computer News
Sep. 18, 1995: 58.

Cook, Wyatt C. “Information Warfare: A New Dimension in the Application of Air and Space
Power.” 1994 CJCS (Chairman, Joint Chiefs of Staff) Strategy Essay Writing Contest Entry.

Cooley, Mike. Architect or Bee?: The Human Price of Technology. London: Hogarth Press,
1987.

Cope, Vern. The Oregon Earthquake Handbook: An Easy-to-Understand Information & Survival
Guide. 1993.

Cope, Vern. The Washington Earthquake Handbook: An Easy-to-Understand Information &
Survival Guide. 1994.

Copeland, Guy L. and Frederick G. Tompkins. A New Paradigm for the Development of U.S.
Information Security Policy. El Segundo, CA: Computer Sciences Corp., 1995.

Coplon, Glenn H. “Risk Sharing for Energy Emergency Preparedness” in American Defense
Preparedness Association, Defense Industry Decade for Disaster Preparedness, DRP 2000 1992-
1993 Special Report on Enhancing Industrial Base Preparedness: An Assessment of the Natural
Hazards Risk to Industry & Critical U.S. Facilities, 85-93.

Cornwall, Hugo. Datatheft: Computer Fraud, Industrial Espionage, and Information Crime.
London : Heinemann, 1987.

Costanzo, Chris. “Security Strikes a New Chord.” Bank Technology News Aug. 1996.

Council of State Governments. State Emergency Management Directors Handbook. Lexington,
KY, Author, 1995.

Coy, Peter. “Who’s Watching the Power Grid?” Business Week Jun. 17, 1996: 86-88.

Crawford, R., P. Kerchen, K. Levitt, et al. Automated Assistance for Detecting Malicious Code.
Livermore, CA: Lawrence Livermore National Laboratory, 1993. (NTIS No. DE93018106/XAB)

Crow, Patrick. “U.S. Industry, Government Efforts to Seek to Improve Pipeline Safety.” Oil &
Gas Journal Apr. 24, 1995: 23.




                                                                                                 15
Crypto AG. “Introduction to Secure E-Mail Systems.” Crypto HC-6500 Dec. 1994.

“CSI Staffing Study Shows Information Security Is on the Rise.” PR Newswire Feb. 12, 1997.

Cugini, Janet. “Common Criteria: On the Road to International Harmonization.” Computer
Standards & Interfaces, Sep. 15, 1995: 315-320.

Cukier, Kenneth. “Putting Commerce On-line.” CommunicationsWeek International Feb. 17,
1997: 4.

“Cyber Security: Protection of Banking Information.” Canadian Banker Nov. 21, 1996: 31.

“Cyberspace Security Bolstered by Pact.” Interactive Daily Feb. 2, 1996.

Dagle, J.E., J.G. DeSteese, M.T. Freund, et al. Assessment of Information Assurance for the
Utility Industry. Battelle Northwest report for the Electric Power Research Institute, Research
Project 8024-01, Dec. 1996.

Dahl, Andrew and Leslie Lesnick. Internet Commerce. Indianapolis, IN: New Riders, 1996.

Dando, Malcolm. Biological Warfare in the 21st Century. McLean, VA: Brassey’s, 1994.

Danzig, Richard. “Biological Warfare: A Nation at Risk--A Time to Act.” INSS Strategic Forum.
Washington, DC: National Defense University, Institute for National Strategic Studies.
Washington: GPO, 1996.

Datapro Information Services Group. A New Paradigm for the Development of U.S. Information
Security Policy; Appendix-Overview of Regulations Affecting Information Security Policy.
Delran, NJ: Author, 1997.

Datapro Reports on Information Security. Newsletter.

David, Jon. “The New Face of the Virus Threat.” Computers & Security Jan. 1996: 13-16.

Davis, Beth. “NCSA Tests Security: Agency Will Certify Firewalls That Protect Against
Attacks.” CommunicationsWeek International Jun. 17, 1996: 35.

Davis, Norman C. “An Information-Based Revolution in Military Affairs.” Strategic Review
Winter 1996: 43-53.

Davis, Peter T. Complete LAN Security and Control. New York: McGraw-Hill, 1994.

Davis, Peter T. and Barry D. Lewis. Computer Security for Dummies. Foster City, CA: IDG
Books Worldwide, 1996.




                                                                                                  16
Davis, Peter T., ed. Securing Client/Server Computer Networks. New York: McGraw-Hill,
1996.

Davis, Randy. Computer Security and Privacy for Dummies. Foster City, CA: IDG Books
Worldwide, 1996.

Defense Advanced Research Projects Agency (DARPA). “Electronic Power Distribution Case
Study, Defense Information Warfare Study.” Information Science and Technology 1995 (ISAT-
95) Summer Study briefing, 1995.

Defense Advanced Research Projects Agency (DARPA). ISAT-95 Defense Information Warfare
(DIW) Summer Study Final Report. 1995.

Defense Information Systems Agency (DISA).           Defensive Information Warfare (DIW)
Management Plan, 15 Aug. 1994, Version l.2, 4 sections and Appendices.

Defense Information Systems Agency (DISA). Planning Considerations for Defensive
Information Warfare (DIW) Information Assurance. Washington: GPO, 1993.

Defense Science Board. Report of the Defense Science Board Task Force on Information
Warfare - Defense (IW-D). Office of the Under Secretary of Defense for Acquisition and
Technology, Nov. 1996.

Defense Science Board. Summer Study Task Force Report. Information Architectures for the
Battlefield: Information in Warfare and Information Warfare. (DTIC No. AD-A285745, Oct.
1994 - Unclassified)

“Defense Technology.” The Economist Jun. 10, 1995:5-20.

DeLanda, Manuel. War in the Age of Intelligent Machines: An Analysis of the Relationship
Between Chaos Theory, Technology, and Warfare. New York: Zone Books, 1991.

DeMaio, Harry B. Information Protection and Other Unnatural Acts: Every Manager's Guide to
Keeping Vital Computer Data Safe and Sound. New York: Amacom, 1992.

Denning, Dorothy E. and Peter F. MacDoran. “Location-Based Authentication: Grounding
Cyberspace for Better Security.” Computer Fraud & Security Feb. 1996: 12-16.

Denning, Dorothy E. Manager’s Guide to Cyberspace Attacks and Countermeasures. San
Francisco, CA: Computer Security Institute (CSI), 1997.

Denning, Peter J., ed. Computers Under Attack: Intruders, Worms and Viruses. Reading, MA:
ACM Press, 1990.




                                                                                             17
Derrer, Douglas S. We Are All the Target: A Handbook of Terrorism Avoidance and Hostage
Survival. Annapolis, MD: Naval Institute Press, 1992.

“Desktop System Offers Integrated Data Security.” Signal Mar. 1997: 49-51.

Desmedt, Y. Breaking the Traditional Computer Security Research Barriers. Computer Security,
ESORICS 92: Second European Symposium on Research in Computer Security, Toulouse,
France, November 23-25, 1992, Proceedings. New York: Springer-Verlag, 1992.

Devargas, M. Network Security. Manchester, Eng.: NCC Blackwell, 1993.

Devost, Matthew G. “National Security in the Information Age.” Academic Thesis, May 1995.

Devost, Matthew G., Brian K. Houghton, and Neal A. Pollard. “Information Terrorism: Can You
Trust Your Toaster?”        Apr. 1996.      Online. Internet.  Oct. 15, 1996.      Available
http://www.infoterror.net/terrorism/itpaper.html

Dewdney, A.K. “Computer Recreations: Of Worms, Viruses, and Core War.”               Scientific
American Mar. 1989: 110-113.

Dierstein, Rudiger. “The Concept of Secure Information Processing Systems and Their Basic
Functions.” Computer Security and Information Integrity: Proceedings of the IFIP 6th ITSEC
Conference. Klaus Dittrick, Seppo Rautakivi, & Juhani Saari, eds. Amsterdam: North-Holland,
1991:134.

“A Different View of the Newt Controversy.” Feb. 04, 1997. Online. Internet. Feb. 19, 1997.
Available http://www.info-sec.com/abuse/infoseczi.html-ssi

DiNardo, Richard L. and Daniel J. Hughes.        “Some Cautionary Thoughts on Information
Warfare.” Airpower Journal Winter 1995.

Disaster Recovery Journal, 1996 Survey - Disaster Recovery Services, Apr., May, Jun. 1996.

“Disaster Recovery Planning.”          Online.    Internet.    Mar. 25, 1997.        Available
http://www.lsci.com/lsci/disaster.html

“Disaster! Rethinking Recovery Plans After the Kobe Quake.” Data Communications Jul. 1995:
47-48.

Donnelly, John. “Pentagon Allots Billions To Bust Information Warriors.” Defense Week Feb.
10, 1997.

Dougall, E. Graham, editor. Computer Security: Proceedings of the IFIP TC11 Ninth
International Conference on Information Security, Toronto, Canada, 12-14 May, 1993. New
York: North Holland, 1993.




                                                                                                  18
Douglass, Joseph D., Jr. and Neil C. Livingstone. America the Vulnerable: The Threat of
Chemical and Biological Warfare. Lexington, MA: Lexington Books, 1987.

Drake, William J. The New Information Infrastructure: Strategies for U.S. Policy. New York:
Twentieth Century Fund, 1995.

Drew, Dale. “Denial of Service on the Internet: A Data Dump on the SYN Attack.” Nov. 06,
1996. Online. Internet. Feb. 19, 1997. Available http://www.info-sec.com/denial/infosece.html-
ssi

“DTI (British Department of Trade and Industry) Launches Code of Practice on Information
Security Management.” North Sea Letter Oct. 6, 1993.

Dugan, Sean. “Cyber Sabotage.” InfoWorld Feb. 10, 1997: 57-58.

Dunlop, Charles L. “How we Lost the War of 2007.” The Weekly Standard 29 Jan. 1996.

Dunn, Darrell. “Dallas Semi(conductor) Makes Captain Marvel-Style Decoder Ring: Digitally
Records Security Info with Moment’s Touch.” Electronic Buyers’ News Sep. 11, 1995: 61.

Dutton, Ellen. LAN Security Handbook. New York: M&T Books, 1994.

Earls, Alan R.    “Easy Access: Vendors Disable Security Features Before Shipping.”
Computerworld Feb. 10, 1997: 79-80.

Eckert, C. “On Security Models.” Information Systems Security: Facing the Information Society
of the 21st Century. Sokratis K. Katsikas and Dimitris Gritzalis, eds. New York: Chapman &
Hall, 1996: 485-486.

Edwards, Morris. “Controlling Access: Firewalls for Information Security.” Communications
News
Oct. 1996: 78.

“Effects of the Next Cycle of Solar Interference.” Nov. 23, 1996. Online. Internet. Mar. 25,
1997. Available http://www.infowar.com/CIVIL_DE/civil_2.html-ssi

Elbra, R.A. Computer Security Handbook. Manchester: NCC Blackwell, 1992.

“Electronic Signature Software Emerges to Authenticate Electronic Commerce Transactions:
Offers Software that Integrates Cryptography & Biometrics in Signed Transactions Processing.”
Bank Systems + Technology July 1996.

Elliott, Raymond. Information Security in Higher Education. Boulder, CO: Cause, 1991.




                                                                                                 19
Eloff, Jan H.P. and von Solms, S. H., eds. Information Security: The Next Decade. New York:
Chapman & Hall, 1995.

Ember, Lois R. “Marines Offer Rapid Response to Chemical/Biological Terrorism.” Chemical
& Engineering News Jul. 1, 1996: 22-23.

Emmett, Peter C. “Information Mania--a New Manifestation of Gulf War Syndrome?” Royal
United Services Institute Journal (RUSIJ) Feb. 96: 19-26.

Emmett, Peter C. “Software Warfare: The Emerging Future.” Royal United Services Institute
Journal (RUSIJ) Dec. 1992.

Endersz, G. Research Topics in Information Security for Telecommunications. New Frontiers
for the European COST in Telecommunications-Symposium, Rome, Italy, October, 1992. Rome:
Fondazione Ugo Bordoni, 1992.

Endrijonas, Janet. Data Security. Rocklin, CA: Prima, 1995.

Endrijonas, Janet.  Rx PC: The Anti-Virus Handbook.              Blue Ridge Summit, PA:
Windcrest/McGraw-Hill, 1993.

“Enhancing Power Grid Reliability.” EPRI Journal Nov./Dec. 1996: 6-15.

“Ernst & Young Offers Guide to Better Information Security.” Presswire Oct. 21, 1996.

“Ernst & Young/InformationWeek’s Fourth Annual Information Security Survey.” Oct. 21, 1996.
Online. Internet. Mar. 19, 1997. Available http://www.infowar.com/infosec/infosecd.html-ssi

Essien, Eno. The Black Computer Survival Guide. Santa Clara, CA: Blackk Inkk Research
Group. 1992.

Essinger, James and Vivien Korn, eds. Controlling Computer Security: A Guide for Financial
Institutions. London: Financial Times Business Information, 1992.

Ettinger, J.E., ed. Information Security. New York: Chapman & Hall, 1993.

“EW Expands Into Information Warfare.” Aviation Week & Space Technology Oct. 10, 1994:
47-48.

Eward, Ronald E. “The Vulnerabilities of a Global Electronic Economy: The Transport Layer.”
5th International Conference on Information Warfare, Crystal City, VA, Sep., 5-6, 1996.

“Expert Warns of Lax Security on Web.” Dec. 26, 1996. Online. Internet. Feb. 19, 1997.
Available http://www.info-sec.com/internet/infosecw.html-ssi




                                                                                              20
Falvey, T.J. et al. Preliminary Report on Freight Rail Transportation. Draft. Washington:
President’s Commission on Critical Infrastructure Protection, Oct. 1996.

Farley, D.O., L. Eisenberg, and G. Dallek. “Assessing Emergency Medical Services in Los
Angeles County: A Research Agenda.” 1991.

Farley, D.O., L. Eisenberg, and G. Dallek. “The Effect of Urban Water Supply Reductions
During the 1987-1992 California Drought.” 1991.

Farley, Marc, Tom Stearns, and Matt Arnett. LAN Times: Guide to Security and Data Integrity.
New York: McGraw-Hill, 1996.

Farmer, Dan. “Shall We Dust Moscow? (A Semi-Statistical) Security Survey of Key Internet
Hosts & Various Semi-Relevant Reflections.” Dec. 18, 1996. Online. Internet. Feb. 19, 1997.
Available http://www.info-sec.com/internet/introduction.html

Farmer, Dan and Wietse Venema. “Improving the Security of Your Site by Breaking Into It.”
Online. Internet. May 29, 1997. Available http://www.alw.nih.gov/Security/Docs/admin-guide-
to-cracking.101.html

Fay, John, ed. Encyclopedia of Security Management. Boston: Butterworth-Heinemann, 1993.

Featherman, John. “Moses Meets Big Brother: The Ten Commandments of Privacy.” Bulletin of
the American Society for Information Science Feb./Mar. 1997: 26-27.

Feenberg, Andrew. Critical Theory of Technology. New York: Oxford University Press, 1991.

Feibel Werner. Novell's Guide to Network Security. Foster City, CA: IDG Books Worldwide,
1996.

Feingold, R.A. An Intuitive Exploration of Current Cryptography (and Recent Developments
and
Possibilities). Livermore, CA: Lawrence Livermore National Laboratory, Mar. 1994. (NTIS No.
DE96002272/XAB)

Feingold, R., H.R. Bruestle, T. Bartoletti, et al. Verifying the Secure Setup of Unix
Client/Servers and Detection of Network Intrusion. Livermore, CA: Lawrence Livermore
National Laboratory, Jul. 1995. (NTIS No. DE96000363/XAB)

Ferbrache, David. The Pathology of Computer Viruses. New York: Springer-Verlag, 1992.

Ferraiolo, David, Dennis M. Gilbert, and Nickilyn Lynch. Assessing Federal and Commercial
Information Security Needs, Nov. 1992. (NISTIR 4976)




                                                                                               21
Feudo, Christopher, V. The Computer Virus Desk Reference. Homewood, IL: Business One
Irwin, 1992.

Fialka, John J. War by Other Means: Economic Espionage in America. New York: Norton,
1997.

Fillion, Roger. Lawmakers Support Tougher Cell-Phone Privacy Laws.” Reuters Financial
Service Feb. 5, 1997.

Fineman, Howard. “Who Needs Washington?” Newsweek Jan. 27, 1997: 50-52.

“Firewall Configuration for TradeVPI 2.0 Software.” Online. Internet. May 16, 1997. Available
http://www.tradewave.com/support/jtsin/oasisreg/firewall.html

Fischer-Huebner, Simone and Kathrin Schier. “Risks on the Way to the Global Information
Society.” Information Systems Security: Facing the Information Society of the 21st Century.
Sokratis K. Katsikas and Dimitris Gritzalis, eds. New York: Chapman & Hall, 1996. 487-488.

Fites, Philip and Martin P.J. Kratz. Information Systems Security: A Practitioner’s Reference.
New York: Van Nostrand Reinhold, 1996.

Fites, Philip, Peter Johnston, and Martin P.J. Kratz. The Computer Virus Crisis. 2nd ed. New
York: Van Nostrand Reinhold, 1992.

Fites, Philip E., Martin P.J. Kratz, and Alan F. Brebner. Control and Security of Computer
Information Systems. Rockville, MD: Computer Science Press, 1989.

FitzGerald, Mary C. “Russian Views on Information Warfare.” Army May 1994: 57-60.

Fletcher, S.K. Information Surety for Today and Tomorrow. Albuquerque, NM: Sandia National
Laboratory, Jul. 1993. (NTIS No. DE93017647/XAB)

Flood, Barbara. “The Emotionality of Privacy.”        Bulletin of the American Society for
Information Science Feb./Mar. 1997: 7-8.

Flood, Barbara and William Lutz. “Creeping Peoplebases: Database Developments and Privacy
Loss.” Bulletin of the American Society for Information Science Feb./Mar. 1997: 5-6.

“Floodgate Now with ‘EZ-Stealth-Mailer.’ “ Jan. 29, 1997. Online. Internet. Feb. 19, 1997.
Available http://www.infowar.com/CIVIL_DE/civil_a.html-ssi

Foote, Sheila. “Nunn Suggests National Information Security Policy.” Defense Daily Oct. 18,
1996.

Forcht, Karen A. Computer Security Management. Danvers, MA: Boyd & Fraser, 1994.




                                                                                                 22
Ford, Warwick. Computer Communications Security: Principles, Standard Protocols, and
Techniques. Englewood Cliffs, NJ: Prentice Hall PTR, 1994.

Forester, Tom and Perry Morrison. Computer Ethics: Cautionary Tales and Ethical Dilemmas in
Computing. 2nd ed. Cambridge, MA: MIT Press, 1994.

Fowler, Joan. A Guide to Procurement of Trusted Systems: Computer Security Contract Data
Requirements List & Data Item Description Tutorial. , 1994.

Fox, Justin. “The Risk According to GARP: Audit Firm Devises Standards.” The American
Banker Mar. 25, 1996: 2.

“A Framework for Global Electronic Commerce.” Online. Internet. Mar. 25, 1997. Available
http://www.iitf.nist.gov/electronic_commerce.htm

Frank, H.    ARPA ISAT-95 Defensive Information Warfare Study.            Undated presentation
materials.

Franks, Frederick M., Jr. “Winning the Information War: Evolution and Revolution.” Advance
Planning Briefing for Industry. United States Army Communications-Electronics Command, Ft.
Monmouth, NJ. Symposium held May 11-12, 1994, Ocean Place Hilton Resort and Spa.

Frawley, Kathleen. “Testimony on Health Information Confidentiality.”           Bulletin of the
American Society for Information Science Feb./Mar. 1997: 22-25.

Frizzell, Joe, Ted Phillips, and Traigh Groover. “The Electronic Intrusion Threat to National
Security and Emergency Preparedness Telecommunications.” 1994 IEEE MILCOM, 2-5 October
1994, Ft. Monmouth, NJ Conference Paper. Vol. 2. Los Alamitos, CA: IEEE Computer Society
Press, 1994: 564-568.

“From ENN: Defensive Investigative Service Brochure - ‘Industrial Counter-Intelligence Trends.’
“    Jan. 18, 1997.     Online.    Internet. Mar. 19, 1997. Available http://www.info-
sec.com/access/inforsecz8.html-ssi

Fuller, Fred and G.I. Wilson. “Emerging Threat ...” Dec. 2, 1996. Online. Internet. Mar. 19,
1997. Available http://www.infowar.com/CIVIL_DE/civil_4.html-ssi

Fuller, Scott and Kevin Pagan. Intranet Firewalls: Planning & Implementing Your Network
Security Systems. Durham, NC: Ventana, 1996.

Furnell, S.M., J.P. Morrissey, P.W. Sanders, et al. “Applications of Keystroke Analysis for
Improved Login Security and Continuous User Authentication.” Information Systems Security:
Facing the Information Society of the 21st Century. Sokratis K. Katsikas and Dimitris Gritzalis,
eds. New York: Chapman & Hall, 1996. 283-294.




                                                                                                   23
Gable, Guy G. and William Caelli, eds. IT Security: The Need for International Cooperation:
Proceedings of the IFIP TC11 Eighth International Conference on Information Security, IFIP/Sec
'92, Singapore, 27-29 May 1992. New York : North-Holland, 1992.

Gander, Terry J. Jane’s NBC Protection Equipment. Alexandria, VA: Jane’s Information Group,
1996. 1-20.

Garfinkel, Simson. PGP: Pretty Good Privacy. Sebastopol, CA: O’Reilly & Associates, 1995.

Garfinkel, Simson and Gene Spafford. Practical UNIX and Internet Security.            2nd ed.
Sebastopol, CA: O'Reilly & Associates, 1996.

Garigue, Robert. “Information Warfare - Theory and Concepts” Report 4/95. Office of the
Assistant Deputy Minister - Defence Information Services. DND. Government of Canada

Garigue, Robert. “Information Warfare - Developing a Conceptual Framework”. Ver 2.1 -
Working Document. Doctoral Research. Decision Analysis Laboratory. Carleton University.
Canada. 1995-1996

Garigue, Robert. “On Strategy, Decisions and the Evolution of Information Systems”. Technical
Document. DSIS DND Government of Canada. 1992.

Gas Industry Standards Board, Future Technology Task Force. Implementation Guide for Gas
Industry Electronic Commerce Using the Internet. 3rd Draft, Sep. 11, 1996.

“Gas Management Information Provided by SCADA System.” Pipeline & Gas Journal Jul. 1994:
15-16.

Gates, Bill. The Road Ahead. New York: Viking, 1995.

Giarini, O. “The Consequences of Complexity in Economics: Vulnerability, Risk, and Rigidity
Factors in Supply.” The Science and Praxis of Complexity. Eds. Aida, et al. Tokyo: United
Nations University, 1984. 133-145.

Gilbert, Dennis M. A Study of Federal Agency Needs for Information Technology Security, May
1994. (NISTIR 5424)

Gilster, Paul. Finding It on the Internet: The Internet Navigator’s Guide to Search Tools and
Techniques. 2nd ed. New York: John Wiley & Sons, 1996. 358-359.

Glass, Brett. “How to Know Which Browser Is Looking at Your Web Site.” InfoWorld Dec. 2,
1996: 40.

“Global Network Commerce Rests on Trusted Cyberspace Security.” Signal Mar. 1997: 53-56.




                                                                                                 24
Glossary of Computer Security Terms. Upland, PA: DIANE, 1995.

Glynn, Patrick: “Quantum Leap.” The National Interest Spring 1995: 50-57.

“GNC Security Group Launches a New Approach to Information Security.” Presswire Oct. 11,
1996.

Goertzel, Karen. “Security Vulnerabilities in Open System Environments.” Information
Security: Concepts and Technologies. Proceedings of the 1994 AFCEA Europe Rome
Symposium & Exposition, 11-13 May 1994, Rome, Italy.

Gollmann, Dieter, ed. Computer Security: ESORICS 94: Third European Symposium on
Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994, Proceedings.
New York: Springer-Verlag, 1994.

Golvers, Luc. “A Model for Cost Control of Computer Security.” Information Security:
Concepts and Technologies. Proceedings of the 1994 AFCEA Europe Rome Symposium &
Exposition, 11-13 May 1994, Rome, Italy.

Goodell, Jeff. The Cyberthief and the Samurai: The True Story of Kevin Mitnick--And the Man
Who Hunted Him Down. New York: Dell, 1996.

Government Reports & Papers, Vol. 1. World Infrastructure Forum - Asia 1994, Jakarta, October
17-21, 1994. 1-38.

Graham, Dougall E. ed. Computer Security: Proceedings of the IFIP TC11 Ninth International
Conference on Information Security, Toronto, Canada, 12-14 May, 1993. New York: North
Holland, 1993.

Greenfield, Meg. “Back to the Future.” Newsweek Jan. 27, 1997: 96.

Greenia, Mark W. and Camille J. Anderson. Computer Security and Privacy: An Information
Sourcebook. Sacramento, CA: Lexikon Services, 1993.

Griffith, Thomas E., Jr. Strategic Attack of National Electrical Systems. Maxwell AFB, AL: Air
University, School of Advanced Airpower Studies.

Guide to Computer Security Regulations. Upland, PA: DIANE, 1994.

Guttman, Barbara and Edward Roback. An Introduction to Computer Security: The NIST
Handbook.
Gaithersburg, MD: National Institute of Standards and Technology. Upland, PA: DIANE, 1995.
Online. Internet. May 20, 1997. Available http://csrc.ncsl.nist.gov/nistpubs/800-12/




                                                                                                 25
Guttman, Barbara. Computer Security Considerations in Federal Procurements: A Guide for
Procurement Initiators, Contracting Officers, and Computer Security Officials. Gaithersburg,
MD: National Institute of Standards and Technology (NIST Special Publication 800-4).
Washington: GPO, 1992.

Hafner, Katie and John Markoff. Cyberpunk: Outlaws and Hackers on the Computer Frontier.
New York: Simon & Schuster, 1991.

Hamblen, Matt. “Don’t Always Trust Net Info: Security Managers Offer Net Warnings.”
Computerworld
Sep. 23, 1996: 77.

Hampel, Viktor E., Clifford Neuman, and John P. Barlow, eds. Information Protection and
Network Security: 24-26 October 1995, Philadelphia, Pennsylvania, sponsored by SPIE--The
International Society for Optical Engineering. Bellingham, WA: SPIE, 1996.

Hanka, R. “Aggregated Risk: A Measure of Vulnerability of an Electronic Health Record.”
Online.             Internet.             Feb.       19,    1997.             Available
http://www.medschl.cam.ac.uk/miu/Papers/aggregat.htm

Hansen, Teresa. “Maintenance Becomes Critical as Nation’s Power Plants Age.” Electric Light
& Power Feb. 1997: 13.

Hardy, Stephen M. “The New Guerrilla Warfare: Security for Military Computer Networks.”
Journal of Electronic Defense, Sep. 1996: 46.

Harris, Andy. “E-mail as a Transport of Computer-Based Threats.” Virus Bulletin Conference
Sep. 1996: 51-57.

Harvard Law School, Journal of Law and Technology

Harvard University Taubman Center for State and Local Government and the University of
Colorado Graduate School of Public Affairs. “The Public's Capital: A Forum on Infrastructure
Issues.” Governing Apr. 1992.

Hayaski, Masahiro and Kazuyuki Fukuda.             “Estimating the Restoration Speed of
Telecommunications Networks after Disasters.” 1996 IEEE International Conference on
Communications, ICC ‘96, June 23-27, 1996, Dallas, TX, Converging Technologies for
Tomorrow’s Applications, Conference Record, Vol. 1.

Haynes, Colin. The Computer Virus Protection Book. San Francisco, CA: SYBEX, 1990.

Held, Gil. Understanding Data Communications. New York: Macmillan, 1996.




                                                                                               26
“Healthcare Explores Technologies to Address Security Issues.” Electronic Claims Processing
Report Apr. 17, 1995.

Heldman, Robert K. and Thomas A. Bystrzycki. The Telecommunications Information
Millennium: A Vision and Plan for the Global Information Society. New York: McGraw-Hill,
1995.

Hendry, Mike. Practical Computer Network Security. Boston: Artech House, 1995.

Herskovitz, Don. “IW: The Attack Has Begun; Information Warfare; Unauthorized Access to the
Computer Files of the Dept. of Defense.” Journal of Electronic Defense Dec. 1996: 62.

Hess, R.W., B.M. Mitchell, E.C. River, et al. Feasibility of Using Interstate Highway Right-of-
way to Obtain a More Survivable Fiber-Optics Network. 1988.

Hewish, Mark. Surviving CBW, Detection and Protection: What You Don’t Know Can Kill
You.” International Defense Review, Mar. 1, 1997: 30.

Heymann, David L. “Controlling Epidemic Diseases.” World Health Nov. 21, 1996: 9.

Higgins, Clay E. Utility Security Operations Management: For Gas, Water, Electric, and Nuclear
Utilities. Springfield, IL: Charles C. Thomas, 1989.

Higgins, Kelly J. “How Vulnerable Is Your Network? - A Distributed Network is Not Necessarily
Safer for Business.” CommunicationsWeek International Mar. 4, 1996: 43.

Highland, Harold J. Computer Virus Handbook. Oxford, UK: Elsevier Advanced Technology,
1990.

Hinman, David B. “Security at the Power Source.” Security Management Jun. 1993: 22-27.

Hobby, Jason. “Cyber Leeches.” Computer Weekly Dec. 5, 1996: 46-47.

Hochberg, J.G., K.A. Jackson, J.F. McClary, et al. Addressing the Insider Threat. Los Alamos,
NM: Los Alamos National Laboratory, 1993. (NTIS No. DE93012626/XAB)

Hoffman, B. R. The Potential Terrorist Threat to Commercial Nuclear Facilities. Santa Monica,
CA: RAND, 1988.

Hoffman, Bruce. Responding to Terrorism Across the Technological Spectrum. Santa Monica,
CA: RAND, 1994.

Hoffman, Lance J., Ali A. Faraz, Steven L. Heckler, et al. Cryptography: Policy and Technology
Trends, Dec. 1, 1993.




                                                                                                  27
Hoffman, Lance J. Rogue Programs: Viruses, Worms and Trojan Horses. New York: Van
Nostrand Reinhold, 1990.

Honey, Gerard. Electronic Protection and Security Systems: A Handbook for Installers and
Users. Boston: Newnes, 1996.

Hopman, Conrad. “Terrorists with Neutron Bombs?” Online. Internet. Feb. 19, 1997.
Available http://www.newciv.org/worldtrans/BOV/BOV/BV-175.HTML

Hosmer, Hilary H. “New Security Paradigms: Orthodoxy and Heresy.” Information Systems
Security: Facing the Information Society of the 21st Century. Sokratis K. Katsikas and Dimitris
Gritzalis, eds. New York: Chapman & Hall, 1996. 61-73.

“How We Invaded a Fortune 500 Company.” Fortune Feb. 3, 1997: 58-61.

Howard, Garry S. Introduction to Internet Security. Rocklin, CA: Prima, 1995.

Hruska, Jan. Computer Viruses and Anti-Virus Warfare. Englewood Cliffs, NJ: Prentice Hall
PTR, 1993.

Hu, Wei. DCE Security Programming. Sebastopol, CA: O’Reilly & Associates, 1995.

Hughes, Larry J., Jr. Actually Useful Internet Security Techniques. Indianapolis, IN: New
Riders, 1995.

Hughes, Larry J., Jr. “Security on the World Wide Web.” Firewalls & Internet Security
Conference 96, January 25-26, 1996, Arlington, VA: Conference Proceedings. Carlisle, PA:
NCSA, 1996.

Hundley, Richard O. and Robert H. Anderson. “Emerging Challenge: Security and Safety in
Cyberspace.” IEEE Technology and Society Magazine Winter 1995/1996: 19-28.

Hunteman, W.J., N.R. Zack, and C.D. Jaeger. Computer Information Security Design
Approaches for Complex 21/Reconfiguration Facilities. Los Alamos, NM: Los Alamos National
Laboratory, 1993. (NTIS No. DE93018547/XAB)

Hust, Gerald. Taking Down Telecommunications. Maxwell AFB, AL: Air University, School of
Advanced Airpower Studies, Sep. 1994. (NTIS No. ADA2852036/XAB)

Hutcherson, Norman B.       Command and Control Warfare: Putting Another Tool in the
Warfighter's Database.      Maxwell AFB, AL: AU Press, Sep. 1994.        (NTIS No.
ADA2860054/XAB)

Hutt, Arthur E., Seymour Bosworth, and Douglas B. Hoyt, eds. Computer Security Handbook.
3rd ed. New York: John Wiley & Sons, 1995.




                                                                                                  28
Huxsoll, David L. Cheryl D. Parrott, and William C. Patrick III. “Medicine in Defense Against
Biological Warfare.” JAMA Aug. 4, 1989: 677-679.

Hydrocarbon Processing. Dec. 1996. Vol. 75, No. 12. :

Icove, David, Karl Seger, and William VonStorch. Computer Crime: A Crimefighter’s
Handbook. Sebastopol, CA: O’Reilly & Associates, 1995.

Iida, Makoto. “Private Sector Initiative for IT Development.” GIIC Regional Meeting and
International Conference on National Information Infrastructure for Social and Economic
Development in Asia, November 28-30, 1995, United Nations Conference Centre, Bangkok,
Thailand.

“Index of Malicious Software.” Seminar & Workshop: Computer Virus: New Threats and
Protective Measures, Cultural Centre Auderghem, Brussels (Belgium), September 24-25, 1991.
Brussels: European Institute for Computer Anti-Virus Research (EICAR), 1991.

Industry Canada, Information Technologies and Telecommunications Sector, Communications
Development and Planning Branch Spectrum, Privacy and the Canadian Information Highway,
Ottawa, Ontario, 1994.

“Information Risk Assessment, Risk Analysis and Risk Management: The IRR Research Model.”
Computer Audit Update Feb. 1992.

Information Security & Virus Prevention, Vols. I & II: Conference Handbook. Upland, PA:
DIANE, 1993.

“Information Security in Evolving Enterprise Networks.” Telesis Sep. 1996: 47.

“Information Security Market to Top $13B.” Electronic Buyer’s Guide July 29, 1996: 56.

Information Security Oversight Office: Report to the President, 1992. Upland, PA: DIANE, 1993.

Information Security Oversight Office: Report to the President, 1993. Upland, PA: DIANE, 1994.

Information Security Oversight Office: Report to the President, 1994. Upland, PA: DIANE, 1995.

Information Security Oversight Office: Report to the President, 1995. Upland, PA: DIANE, 1996.

Information Security Program Regulation: U. S. Department of Defense. Upland, PA: DIANE,
1994.

Information Security: Opportunities for Improved OMB Oversight of Agency Practices. Upland,
PA: DIANE, 1996.




                                                                                                 29
Information Systems Security Association. Guideline for Information Valuation. Glenview, IL:
Author, 1990.

Information Warfare in the Age of Chaos: Preparing for 2020. Upland, PA: DIANE, 1996.

INFOSEC Handbook: An Information Systems Security Reference Guide. 2nd ed. San Jose,
CA: ARCA, 1993.

Ingram, Gregory K. “Infrastructure and Economic Growth--the Connection.” Speech prepared
for the World Infrastructure Forum - Asia 1994, Jakarta, October 17-21, 1994.

INPUT. Federal Computer Security Market, 1992-1997. Vienna, VA: INPUT, 1992.

Institute of Electrical and Electronic Engineers. IEEE Standard Terms for Reporting and
Analyzing Outage Occurrences and Outage States of Electrical Transmission Facilities, IEEE Std
859-1987, approved Jun. 1987.

Institute of Electrical and Electronics Engineers.     12th Annual Conference on Computer
Assurance. New York: IEEE Standards, 1997.

International Atomic Energy Agency. Expansion Planning for Electrical Generating Systems: A
Guidebook, Technical Report Series No. 241, STI/DOC/10/241, Vienna, Austria, 1984.

International Chamber of Commerce. ICC Position Paper on International Encryption Policy.
Paris, 1994.

International Conference on Information Warfare, Crystal City, VA, Sep. 5-6, 1996.

“Internet Explores Multilevel Communication Security Realm.” Signal Mar. 1997: 45-48.

“IP-Watcher Risks: Vulnerabilities Exploited.” Online. Internet. Feb. 19, 1997.
Available http://engarde.com/software/ipwatcher/risks/vulnerabilities.html

“IP-Watcher Risks: Vulnerability of the Internet.” Online. Internet. Feb. 19, 1997.
Available http://engarde.com/software/ipwatcher/risks/internet.html

Jackson, Keith M. and Jan Hruska, eds.         Computer Security Reference Book.        Boston:
Butterworth-Heinemann, 1994.

Jacobson, Robert V. The PC Virus Control Handbook: A Technical Guide to Detection,
Identification, Disinfection and Investigation: Includes Model Policy and Procedures. 2nd ed.
San Francisco, CA: Miller Freeman, 1992.




                                                                                                  30
Jaffar, Joxan and Roland H. Yap. Concurrency & Parallelism, Programming, Networking, &
Security: Second Asian Computing Science Conference, Asian '96, Singapore, December 2-5,
1996: Proceedings. Springer-Verlag, 1996.

Jakobsson, Marekus and Moti Yung. “Revocable and Versatile Electronic Money.” Proceedings
of the 3rd ACM Conference on Computer and Communications Security in New Delhi, India,
Mar. 14-16, 1996. New York, ACM: 76-87.

Janardhan, N. “Facilitating International Trade Through Electronic Commerce.” GIIC Regional
Meeting and International Conference on National Information Infrastructure for Social and
Economic Development in Asia, November 28-30, 1995, United Nations Conference Centre,
Bangkok, Thailand.

Jensen, Owen. “Information Warfare: Principles of Third Wave War.” Airpower Journal Winter
1994: 35-43.

Johnson, Craig L. “Information Warfare - Not a Paper War.” Journal of Electronic Defense Aug.
1994: 55-58.

Johnson, Deborah G. and Helen Nissenbaum, eds.         Computers, Ethics and Social Values.
Englewood Cliffs, NJ: Prentice Hall, 1995.

Johnson, Deborah G. Computer Ethics. Englewood Cliffs, NJ: Prentice Hall, 1994.

Johnson, Deborah G. “Ethics Online.” Communications of the ACM Jan. 1997: 60-65.

Johnson, Kirk. “Where Electronic Money Talks as Fast as It Moves: Secaucus Corridor Emerges
as Nerve Center in the Melding of Computers and Capitalism.” New York Times Feb. 18, 1997:
1.

Joint Security Commission (JSC). Redefining Security: A Report to the Secretary of Defense and
the Director of Central Intelligence. Feb. 28, 1994. Online. Internet. May 7, 1997. Available
http://www.spb.gov/html/jscrprt.html

Jones, Caspers. The Global Economic Impact of the Year 2000 Software Problem - Version 4.
Burlington, MA: Software Productivity Research, 1996.

Jones, Richard H. “U.S. Should Modernize Its Aviation Information Systems to Stop Crime.”
Aviation Week and Space Technology Apr. 2, 1990: 61.

“JTSIN.” (Joint Transmission Services Information Network) Online. Internet. May 7, 1997.
Available http://www.bsginc.com/default/jtsin.htm

JTSIN FERC. “Information from the JTSIN FERC Compliance Committee.” Oct. 25, 1996.
Online. Internet. May 7, 1997. Available http://www.tradewave.com/support/jtsin/sptFCC.html




                                                                                                 31
Jung-Duk, Kim. “You Need to Have a Plan for Information Security.” Business Korea Jun.
1996: 36-38.

Kabay, Michel E. Information Systems Security Pocket Guide. Westmount, Quebec: Jinbu,
1992.

Kabay, Michel E. The NCSA Guide to Enterprise Security: Protecting Information Assets. New
York: McGraw-Hill, 1996.

Kahin, Brian and James Keller, eds. Public Access to the Internet. Cambridge, MA: MIT Press,
1995.

Kahin, Brian and Janet Abbate, eds. Standards Policy for Information Infrastructure. Cambridge,
MA: MIT Press, 1995.

Kalakota, Ravi and Andrew B. Whinston. Frontiers of Electronic Commerce. Reading, MA:
Addison-Wesley, 1996.

Kane, Pamela. PC Security and Virus Protection Handbook: The Ongoing War Against
Information Sabotage. New York: M&T Books, 1994.

Kane, Pamela. V.I.R.U.S. Protection: Vital Information Resources Under Siege. New York:
Bantam Books, 1989.

Kanellos, Michael. “Decryption Power to a Third Party? -- Is Key Recovery the Answer?”
Computer Reseller News Feb. 24, 1997: 57.

Kaplan, Ray. “The Art of Security Assessment.” The 22nd Computer Network & Security
Conference, November 7-8, 1995, Washington, DC: Conference Proceedings, Vol. 2. San
Francisco, CA: Computer Security Institute (CSI), 1995.

Karolak, Dale Walter. Software Engineering Risk Management. Los Alamitos, CA: IEEE
Computer Society Press, 1996.

Kassicieh, Sul and John Zepper. “Technology Transfer in Sandia’s Scientific Area: The
Engineering Sciences Technology Information Environment Systematic Approach to Security,
Privacy and Appropriate Access.” Proceedings of the 28th Annual Hawaii International
Conference on Systems Sciences--1995:
689-695.

Kaufman, Charles, Radia Perlman, and Mike Speciner.             Network Security: Private
Communication in a Public World. Englewood Cliffs, NJ: Prentice Hall PTR, 1995.




                                                                                                  32
Kaufman, Charles, Radia Perlman, and Mike Speciner. Private Communications in a Public
World. Englewood Cliffs, NJ: Prentice Hall PTR, 1995.

Kephart, Jeffrey O., Steve R. White, and David M. Chess. “Computers and Epidemiology.”
IEEE Spectrum May 1993: 20-26.

Kerr, Deborah. “Public Key Mystery.” Computerworld Sep. 9, 1996: 93-94.

Kerstetter, Jim. “Writing Is on the Browser for Commerce Authentication.” PC Week Apr. 8,
1996: 62.

Kim, Kwangjo and Tsutomu Matsumoto, eds. Advances in Cryptology--ASIACRYPT '96;
International Conference on the Theory and Applications of Cryptology and Information
Security, Kyongju, Korea, November 3-7, 1996: proceedings. New York : Springer-Verlag, 1996.

Kimmins, John, Charles Dinkel, and Dale Walters. Telecommunications Security Guidelines for
Telecommunications Management Network. Gaithersburg, MD: National Institute of Standards
and Technology. Washington: GPO, 1995.

Kissinger, Henry A. “A World We Have Not Known.” Newsweek Jan. 27, 1997: 74-81.

Klaus, Christopher. “Identifying Network Security Vulnerabilities.” Firewalls & Internet
Security Conference 96, January 25-26, 1996, Arlington, VA: Conference Proceedings. Carlisle,
PA: NCSA, 1996.

Klion, Jerome. Practical Electronic Reliability Engineering: Getting the Job Done from
Requirement Through Acceptance. New York: Van Nostrand Reinhold, 1992.

Kluepfel, Henry M. “A Recipe for Hacker Heartburn.” Security Management Jan. 1995: 40-44.

Kluepfel, Hank. “Countering Non-lethal Information Warfare: Lessons Learned on Foiling the
Information Superhighwayman of the North American Public Switched Telephone Network.”
Online. Internet. Feb. 19, 1997. Available http://www.infowar.com/civil_de/kluepfel.html-ssi

Kluepfel, Henry M. “Securing a Global Village and its Resources.” IEEE Communications
Magazine Sep. 1994:82-89.

Knowles, Anne. “Risky Business: Secure Internet Use.” PC Week Oct. 9, 1995: 19.

Kou, Weidong. Networking Security and Standards. Boston: Kluwer Academic, 1997.

Kraft, Michael E. and Norman J. Vig, eds. Technology and Politics. Durham, NC: Duke
University Press, 1988.

Kraus, George F. Jr. “Information Warfare in 2015.” US Naval Institute Proceedings Aug. 1995.




                                                                                                33
Kuhn, D. Richard. “Sources of Failure in the Public Switched Telephone Network.” IEEE
Computer Apr. 1997.                Online. Internet.     Jul. 2, 1997.        Available
http://hissa.ncsl.nist.gov/kuhn/pstn.html

Kupperman, Robert H. and Jeff Kamen. “The Tough Approach to Countering Terror.” Los
Angeles Times Aug. 13, 1989: 1.

Kutler, Jerry and Wendy S. Mead. “Web Possibilities Make Security People Insecure.” The
American Banker Feb. 27, 1997: 13.

Lafferty, Brad, et al. “The Effect of Media Information on Enemy Capability: a Model for
Conflict.” Proteus: a Journal of Ideas Spring 1994.

Lammer, Victoria, ed. Survivor’s Guide to Computer Viruses: Virus Bulletin ‘93. Abingdon,
Oxon, UK: Virus Bulletin, 1993.

Lewonoski, Mark C. “Information War” in Essays on Strategy IX. Washington: National
Defense University Press, 1992.

Lander, Ronald and James E. Roughton. “The Security Professional in Cyberspace.” Security
Management Jan. 1996: 38-44.

Landreth, Bill. Out of the Inner Circle: A Hacker’s Guide to Computer Security. Bellevue, WA:
Microsoft Press, 1984.

Lane, Charles. Draft report for the Committee on Governmental Affairs, U.S. Senate. Feb. 1989.

Lawrence, J.D. Safety and Security Issues in Developing and Operating in Intelligent
Transportation Systems. Livermore, CA: Lawrence Livermore National Laboratory, 1995.
(NTIS No. DE96001748/WTS)

Lea, Martin, ed. Contexts of Computer-Mediated Communication.             New York: Harvester
Wheatsheaf, 1992.

Lee, Vincent. “Flood of Information: Jeff’s System Tracks Pump Stations.” Times-Picayune Jul.
6, 1995: B1.

Lehr, William. Quality and Reliability of Telecommunications Infrastructure... Hillsdale, NJ: L.
Erlbaum Associates, 1995.

Lessig, Lawrence. “The Path of Cyberlaw.” Yale Law Review #104, 1995.




                                                                                                   34
Letvinchik, Frank S. “Avoiding Disaster: Contingency Strategies That Minimise Vulnerability
And Put You On The Fast Track to Recovery.” First Annual Pan-Asian Information Technology
Security Summit ‘95, 26-28 June 1995, Singapore: Proceedings.

Leveson, Nancy G. Safeware: System Safety and Computers. Reading, MA: Addison-Wesley,
1995.

Levin, Richard. The Computer Virus Handbook. New York: McGraw-Hill, 1990.

Lewis Chester Group. “The Complete Glossary of Insurance Coverage Explanations.” Jan. 21,
1997.
Online. Internet. Feb. 19, 1997. Available http://www.lcgroup.com/explanations/

“Rep. Leach Asks GAO to Examine Security of Fedwire Systems.” Dow Jones News Apr. 04,
1997.

Lewis, Harold W. Technological Risk. New York: W.W. Norton, 1990.

Libicki, Martin C. The Mesh and the Net: Speculations on Armed Conflict in a Time of Free
Silicon. Washington, DC: National Defense University, Institute for National Strategic Studies.
Washington: GPO, 1994.

Libicki, Martin C. What is information warfare? Washington, DC: National Defense University,
Institute for National Strategic Studies. Washington: GPO, 1995.

Libicki, Martin C. and James A. Hazlett. “Do We Need an Information Corps?” Joint Force
Quarterly Autumn 1993.

Lindsay, David T. and W.L. Price, eds. Information security: proceedings of the IFIP TC11
Seventh International Conference on Information Security--Creating Confidence in Information
Processing, IFIP/Sec '91, Brighton, UK, 15-17 May 1991. New York: North-Holland, 1991.

Littman, Jonathan. “Hacked, Cracked & Phreaked.” PC Week Jan. 27, 1997: 1,16.

Llewellyn, Brian, ed. Standards for Electronic Security Tagging A Feasibility Study. London:
Book Industry Communication, 1995.

Locsin, Jerry. “SCADA/EMS Study Reflects Changing Industry.” Electric Light & Power Sep.
1994: 35-37.

Logan, Michael. “Planning Response to and Information Disaster.” Presentation at the 5th
International Conference on Information Warfare, September 5-6, 1996.

Lohr, Steve. “A New Battlefield: Rethinking Warfare in the Computer Age.” New York Times
Sep. 30, 1996.




                                                                                                  35
Longley, Dennis, Michael Shain, and William Caelli. Information Security: Dictionary of
Concepts, Standards, and Terms. Macmillan Information Systems Series. Basingstoke,
Hampshire (UK): Macmillan, 1992.

Loshin, Pete. Electronic Commerce: On-line Ordering and Digital Money. Rockland, MA:
Charles River Media, 1995.

Louw, Eric and Neil Duffy. Managing Computer Viruses. New York: Oxford University Press,
1992.

Lovell, Stanley P. Of Spies & Stratagems. Englewood Cliffs, NJ: Prentice Hall, 1963. 25.

Lowe, Sue J. Enterprisewide Network Security: Effective Implementation and International
Standards. Charleston, SC: Computer Technology Research, 1994.

Lu, Stacey. “For Financial Printers, It Is Adapt or Die.” New York Times Jan. 6, 1997: 7.

Lum, Zachary A. “Linking the Senses.” Journal of Electronic Defense Aug. 1994: 33-38.

Lundell, Allan. Virus!: The Secret World of Computer Invaders That Breed and Destroy.
Chicago: Contemporary Books, 1989.

Luoma, William M. “Netwar: The Other Side of Information Warfare,” 8 Feb. 1994, a paper
submitted to the Faculty of the Naval War College in partial satisfaction of the requirements of
the Department of Joint Military Operations.

Lutz, W.E. “Monitoring Your Movements.” Bulletin of the American Society for Information
Science Feb./Mar. 1997: 8-10.

Macko, Steve. “NSA Director Warns of Cyber Threat...” Online. Internet. Feb. 19, 1997.
Available http://www.infowar.com/CIVIL_DE/civil_e.html-ssi

Macksey, Kenneth. For Want of a Nail: The Impact on War of Logistics and Communications.
McLean, VA: Brassey’s, 1990.

Madron, Thomas W. Network Security in the ‘90s: Issues and Solutions for Managers. New
York: John Wiley & Sons, 1992.

Madsen, Wayne. “Government-Sponsored Computer Warfare and Sabotage.” Computers &
Security May 1992: 233-236.

Madsen, Wayne. Handbook of Personal Data Protection. New York: Stockton Press, 1992.




                                                                                                   36
Mallozzi, Cos. “Facing the Danger Zone in Crisis Communications.” Risk Management Jan.
1994: 34-42.

Management Guides: “ Open Systems” , “ Human Computer Interaction” , “Information
Security” , “Document Interchange” and “ Network Management.” Manchester, UK: NCC
Blackwell, 1992.

Mann, Bill. “Stopping You Watching Me.” Internet World Apr. 1997: 42-46.

Mann, Edward. “Desert Storm: The First Information War.” Airpower Journal Winter 1994.

Marcella, Albert Jr. and Sally Chan. EDI Security, Control and Audit. Boston: Artech House,
1993.

Market Intelligence Staff. U. S. Telecommunications Network Security & Reliability Equipment
& Service Markets. New York: Frost & Sullivan, 1995.

McCorkell, Peter L. “Regulation of Credit Data.” Credit World Jan./Feb. 1994: 12-14.

McDonald, John C. “Public Network Integrity--Avoiding a Crisis in Trust.” IEEE Journal on
Selected Areas in Communications Jan. 1994: 5-12.

McGrath, Peter. “The Web: Infotopia or Marketplace?” Newsweek Jan. 27, 1997: 82-84.

McGregor, Don. “Cracking Passwords...An Interesting Post and Great Link.” Feb. 01, 1997.
Online. Internet. Feb. 19, 1997. Available http://www.infowar.com/CIVIL_DE/civil_b.html-ssi

McKenna, James T. “Tighter Security Urged For Defense Computers.” Aviation Week and
Space Technology Jan. 20, 1997: 60.

Meadows, C. An Outline of a Taxonomy of Computer Security Research and Development.
Proceedings of New Security Paradigms Workshop II, 22-24 September 1992 & 3-5 August
1993, Little Compton, RI. New York: ACM, 1993.

Meckler, Laura. “Stolen Identities.” Online.         Internet.   Sep. 30, 1997.        Available
http://www.infowar.com/class_1/class1_3.html-ssi

Melzer, Andrew M., Jerry Weinberger, and M. Richard Zinman, eds. Technology in the Western
Political Tradition. Ithaca, NY: Cornell University Press, 1993.

Menezes, Alfred, Paul Van Oorschot, and Scott Vanstone, eds.           Handbook of Applied
Cryptography. Boca Raton, FL: CRC Press, 1996.

Miccolis, Jerry A. “Toward a Universal Language of Risk.” Risk Management Jul. 1996: 45.




                                                                                                   37
“Microsoft Explorer Hoax.” Dec. 04, 1996. Online. Internet. Feb. 19, 1997.
Available http://www.info-sec.com/viruses/infosecl.html-ssi

Miller, Steven E. Civilizing Cyberspace: Policy, Power, and the Information Superhighway.
Reading, MA: Addison-Wesley, 1996.

Mitchell, Bridger M. and Tenzing Donyo. Utilization of the U.S. Telephone Network. Santa
Monica, CA: RAND, 1994.

Mizuno, Yukio. “The World of Electronic Commerce.” GIIC Regional Meeting and
International Conference on National Information Infrastructure for Social and Economic
Development in Asia, November 28-30, 1995, United Nations Conference Centre, Bangkok,
Thailand.

Moher, Richard K. “Computer Crime: Tips on Securing and Recovering Electronic Data.” New
York Law Journal Dec. 17, 1996: 5.

Molander, Roger C., Andrew S. Riddle, and Peter A. Wilson. Strategic Information Warfare: A
New Face of War, Report Number MR-661.0-OSD. Santa Monica, CA: RAND, Nov. 1995.

Molloy, Maureen. “Police Arrest Teens for Wreaking Havoc on Publisher’s Voice Mail.”
Network World Nov. 12, 1990: 6.

Monk, Tina. Personal Computer Security Guide. Oxford, UK: Elsevier Advanced Technology,
1992.

Morgan, Richard A. “Military Use of Commercial Communication Satellites: A New Look at the
Outer Space Treaty and 'Peaceful Purposes.' “ Journal of Air Law and Commerce Fall 1994: 239-
326.

Morris, Chris et al. Weapons of Mass Destruction: Nonlethality, Information Warfare, and
Airpower in the Age of Chaos. Upland, PA: DIANE, 1995.

Morris, Chet, Janet Morris, and Thomas Baines. “Weapons of Mass Protection: Nonlethality,
Information Warfare, and Airpower in the Age of Chaos.” Airpower Journal Spring, 1995.

Morris, James R. “The Business of Managing Risk.” Information Security: Concepts and
Technologies. Proceedings of the 1994 AFCEA Europe Rome Symposium & Exposition, 11-13
May 1994, Rome, Italy.

Mortgage Bankers Association of America. 1995 National Technology in Mortgage Banking
Conference Proceedings. 1995.

Moskowitz, Ira S. and Myong H. Kang. “Covert Channels--Here to Stay?” COMPASS ‘94,
Proceedings of the Ninth Annual Conference on Computer Assurance, Jun. 27, 1994-Jul. 1, 1994,




                                                                                                38
National Institute of Standards and Technology, Gaithersburg, MD. Piscataway, NJ: IEEE, 235-
243.

Mukherjee, Biswanath, L.Todd Heberlein, and Karl N. Levitt. “Network Intrusion Detection.”
IEEE Networks May/Jun. 1994: 26-41.

Muller, Gerhardt. Intermodal Freight Transportation. 3rd ed. Greenbelt, MD: Intermodal
Association of North America and the Eno Transportation Foundation, 1996.

Mungo, Paul and Bryan Clough. Approaching Zero: The Extraordinary Underworld of Hackers,
Phreakers, Virus Writers, and Keyboard Criminals. New York: Random House, 1992.

Munro, Neil. The Quick and the Dead: Electronic Combat and Modern Warfare. New York: St.
Martin’s Press, 1991.

Murayama, Yuko. “A Multimedia Communication Threat from Subliminal Messages.” SCIS ‘97
The 1997 Symposium on Cryptography and Information Security. Fukuoka, Japan, January 29-
February 1, 1997.

Naisbitt, John. Megatrends. New York: Warner Books, 1982.

Naisbitt, John. Megatrends 2000. New York: Morrow, 1990.

National Communications System. The Electronic Intrusion Threat to National Security and
Emergency Preparedness Telecommunications. 2nd ed. Office of the Manager, National
Communications System, Dec. 5, 1994.

National Computer Security Association (NCSA). NCSA Firewall Policy Guide. Carlisle, PA:
Author, 1995.

National Computer Security Association (NCSA). NCSA Virus Study: Complete Results and
Analysis. Carlisle, PA: Author, 1996.

National Computer Security Association (NCSA).         NCSA’s Corporate Computer Virus
Prevention Policy Model. Carlisle, PA: Author, 1995.

National Computer Security Association (NCSA). “Security Issues in Internet Commerce.”
1996. Online. Internet. Jun. 30, 1997. Available http://www.ncsa.com/library/inetsec2.html

National Computer Security Center (NCSC). A Guide to Procurement of Trusted Systems: An
Introduction to Procurement Initiators on Computer Security Requirements. Upland, PA:
DIANE, 1993.

National Computer Security Center (NCSC). Trusted Computer System Evaluation Criteria,
DOD-STD-025, 1975.




                                                                                               39
National Computing Centre (NCC). “Thirty Steps to Information Security.” Computer Fraud &
Security Aug. 1, 1996: 6.

National Fraud Information Center. “Porno Surprise.” Feb. 4, 1997. Online. Internet. Feb. 19,
1997.
Available http://www.fraud.org/february97.htm

National Industrial Security Program Operating Manual (NISPOM). 1994.

National Institute of Standards and Technology. Proceedings of the Workshop on the Federal
Criteria for Information Technology Security, Ellicott City, MD, June 2-3, 1993. Gaithersburg,
MD: Author, 1993.

National Institute of Standards and Technology/National Computer Security Center
(NIST/NCSC). Information Systems Security: Solutions for Today - Concepts for Tomorrow.
Proceedings of the 12th National Computer Security Conference, NIST/NCSC, Baltimore, MD,
October 1989. Gaithersburg, MD: Author, 1989.

National Institute of Standards and Technology/National Computer Security Center
(NIST/NCSC).
Information Systems Security: Standards - The Key to the Future. Proceedings of the 13th
National Computer Security Conference, NIST/NCSC, Baltimore, MD, 1990. Gaithersburg,
MD: Author, 1990.

National Institute of Standards and Technology/National Computer Security Center
(NIST/NCSC).
Information Systems Security: Requirements & Practices. Proceedings of the 14th National
Computer Security Conference, NIST/NCSC, Baltimore, MD, 1991. Gaithersburg, MD: Author,
1991.

National Institute of Standards and Technology/National Computer Security Center
(NIST/NCSC).
Information Systems Security: Building Blocks to the Future. Proceedings of the 15th National
Computer Security Conference, NIST/NCSC, Baltimore, MD, October 3-16, 1992.
Gaithersburg, MD: Author, 1992.

National Institute of Standards and Technology/National Computer Security Center
(NIST/NCSC).
Information Systems Security: User Choices. Proceedings of the 16th National Computer
Security Conference, NIST/NCSC, Baltimore, MD, 1993. Gaithersburg, MD: Author, 1993.

National Institute of Standards and Technology/National Computer Security Center
(NIST/NCSC).




                                                                                                 40
Communicating Our Discipline Strategies for the Emerging Infrastructures. Proceedings of the
17th National Computer Security Conference, NIST/NCSC, Baltimore, MD, October 11-14,
1994. Gaithersburg, MD: Author, 1994.

National Institute of Standards and Technology/National Computer Security Center
(NIST/NCSC). Proceedings of the 19th National Computer Security Conference, NIST/NCSC,
Baltimore, MD, October 22-25, 1996. Gaithersburg, MD: Author, 1996.

National Performance Review. “The Best Kept Secrets in Government - Digest Version.” Sep.
1996.

National Petroleum Council (NPC). Background Information. Washington: Author, 1996.

National Petroleum Council (NPC). Future Issues: A View of U.S. Oil and Natural Gas to 2020.
Washington: Author, 1995.

National Petroleum Council (NPC). Industry Assistance to Government: Methods for Providing
Petroleum Industry Expertise During Emergencies. Washington: Author, 1991.

National Petroleum Council (NRC). Issues for Interagency Consideration: A Supplement to the
NPC Report: Future Issues - A View of U.S. Oil and Natural Gas to 2020. Washington: Author,
1996.

“National Registry Teams with Unisys Federal to Bring Biometric Network Security to the
NASA SEWP II Contract.” PR Newswire Sep. 22, 1997.

National Research Council (NRC). Computers at Risk: Safe Computing in the Information Age.
Washington: National Academy Press, 1991.

National Research Council (NRC). Computing and Communications in the Extreme: Research
for Crisis Management and Other Applications. Washington: National Academy Press, 1996.

National Research Council (NRC). Cryptography’s Role in Securing the Information Society.
Washington: National Academy Press, 1991.

National Research Council (NRC). Growing Vulnerability of the Public Switched Networks:
Implications for National Security Emergency Preparedness. Committee on Review of
Switching, Synchronization and Network Control in National Security Telecommunications,
Board on Telecommunications and Computer Applications, Commission on Engineering and
Technical Systems. Washington: National Academy Press, 1989.

National Research Council (NRC). Unpredictable Certainty. Information Infrastructure through
2000. Washington: National Academy Press, 1996.




                                                                                               41
National Security Agency.    Information Systems Security Products and Services Catalog.
Washington: GPO, 1993.

National Security Telecommunications Advisory Committee (NSTAC). An Assessment of the
Risk to the Security of the Public Network, Network Security Information Exchange. Dec. 1995.

National Security Telecommunications Advisory Committee (NSTAC), Information Assurance
Task Force (IATF). Electric Power Information Assurance Risk Assessment. Draft Report, Oct.
1996.

National Telecommunications Information Systems Security Information Center (NTISSIC).
Infosec Glossary.

“NCSA Sponsors World’s First Biometrics Consortium.” Presswire Nov. 25, 1996.

Nef, Jorge. “Human Security and Mutual Vulnerability: An Exploration into the Global Political
Economy of Development and Underdevelopment.” International Development Research
Centre, Ottawa,
Canada, 1995. Online. Internet. May 7, 1997. Available http://www.idrc.ca/books/focus/795/

Negroponte, Nicolas. Being Digital. New York: Knopf, 1995.

Negroponte, Nicolas. “Been Digital--What’s the Next Big Thing?” Forbes Dec. 2, 1996: 174-
175.

Nelson, Andrew. “The Art Of Information Warfare, “ Private Publication by the Author, 1995.
75.

Nemzow, Martin. Building CyberStores: Installation, Transaction Process Management. New
York: McGraw-Hill, 1997.

NERAC. Computer Crime: Latest Citations from the INSPEC Database. Tolland, CT: Author,
1993.

NERAC. Computer Data Centers: Disaster Planning: Latest Citations from the NTIS Computer
Database. Tolland, CT: Author, 1993.

NERAC. Computer Information Security and Protection: Latest Citations from the NTIS
Bibliographic Database. Tolland, CT: Author, Sep. 1993.

NERAC. Computer Security: Tempest Certified Equipment: Latest Citations from the NTIS
Computer Database. Tolland, CT: Author, Dec. 1993.

NERAC. Computer Viruses and Computer Software Vaccines for Software Protection: Latest
Citations from the (NTIS) Computer Database. Tolland, CT: Author, May 1993.




                                                                                                 42
NERAC. Digital Communication Systems: Coding and Decoding: Latest Citations from the
Compendex Database. Tolland, CT: Author, Jun. 1993.

NERAC. Multilevel Security: Computers and Data Networks: Latest Citations from the NTIS
Bibliographic Database. Tolland, CT: Author, Nov. 1993.

NERAC. Software Security and Piracy: Latest Citations from the INSPEC Database. Tolland,
CT: Author, Nov. 1993.

Network Reliability and Interoperability Council. Network Reliability: The Path Forward. Feb.
1996. Online. Internet. Feb. 19, 1997. Available http://www.fcc.gov/oet/info/orgs/nrc/

Neuman, Johanna. “The Media’s Impact on International Affairs, Then and Now.” SAIS Review
Winter-Spring 1996: 109-123.

Neumann, Peter G. Computer Related Risks. Reading, MA: Addison-Wesley, 1995.

New Riders Development Group Staff. Encyclopedia of Computer Security. Indianapolis, IN:
New Riders, 1995.

New Riders Development Group Staff.           Network Security with Windows NT Server.
Indianapolis, IN: New Riders, 1995.

“New Security Threats Rest in ‘Cyber Terrorism.’ “ Sacramento Bee. Feb. 03, 1997. Online.
Internet. Feb. 19, 1997. Available http://www.infowar.com/CIVIL_DE/civil_c.html-ssi

Newman, Nathan. “How Private Business Almost Derailed the Internet ...and How They Still
May.” E-Node. Dec. 15, 1996. Online. Internet. Feb. 19, 1997. Available http://www.info-
sec.com/internet/infosecu.html-ssi

Newman, Nathan. “Why Microchips Create Megabanks.” E-Node. Oct. 10, 1996. Online.
Internet. Feb. 19, 1997. Available http://www.info-sec.com/access/infosec9.html-ssi

“NII Security: The Federal Role.” National Information Infrastructure Security Issues Forum,
Jun. 5, 1996. Online. Internet. Mar. 25, 1997. Available http://nsi.org/Library/Compsec/nii.txt

“NIST Has Guidelines for Secure Telecommunications Management Network.” Telecom &
Network Security Review Dec. 1, 1996. (NIST Special Publication 800-13)

Nordic Council of Ministers. Information Security in Nordic Countries. Copenhagen: Nordic
Council of Ministers, 1993.

Norlander, Lena, Anders Norqvist, Roger Roffey, et al. A Briefing Book on Biological Weapons.
Umea, Sweden: FOA, National Defence Research Establishment, 1995.




                                                                                                  43
Norris, Ed. “Introduction to the Electronic Underground.” The 22nd Computer Network &
Security Conference, November 7-8, 1995, Washington, DC: Conference Proceedings, Vol. 2.
San Francisco, CA: Computer Security Institute (CSI), 1995.

North American Electric Reliability Council (NERC).     Glossary of Terms.    Princeton, NJ:
Author, 1996.

North American Electric Reliability Council (NERC). Reliability Assessment 1996-2005: The
Reliability of Bulk Electric Systems in North America. Princeton, NJ: Author, 1996.

North American Electric Reliability Council (NERC). 1996 Summer Assessment: Reliability of
Bulk Electricity Supply. Princeton, NJ: Author, 1996.

North American Electric Reliability Council (NERC). 1996/97 Winter Assessment: Reliability of
Bulk Electric Systems. Princeton, NJ: Author, 1996.

North American Electric Reliability Council (NERC). 1995/96 Winter Assessment: Reliability of
Bulk Electricity Supply. Princeton, NJ: Author, 1995.

North American Electric Reliability Council (NERC). System Disturbances: Review of Selected
1995 Electric System Disturbances in North America. Princeton, NJ: Author, 1996.

North American Electric Reliability Council (NERC). Transmission Transfer Capability: A
Reference Document for Calculating and Reporting the Electric Power Transfer Capability of
Interconnected Systems. Princeton, NJ: Author, 1995.

North American Electric Reliability Council (NERC). Available Transfer Capability Definitions
and Determination: A Framework for Determining Available Transfer Capabilities of the
Interconnected Transmission Networks for a Commercially Viable Electricity Market. Princeton,
NJ: Author, 1996.

North American Electric Reliability Council (NERC). Reliability Concepts. Princeton, NJ:
Author, 1985.

North American Electric Reliability Council (NERC). Assessment of the Reliability of
Electricity Supply and Delivery Systems in North America. Princeton, NJ: Author, 1996.

North American Electric Reliability Council (NERC). NERC 2000: The Future Role of the
North American Electric Reliability Council. Princeton, NJ: Author, 1993.

North American Electric Reliability Council (NERC). 1995 Annual Report: North American
Electric Reliability Council. Princeton, NJ: Author, 1996.




                                                                                                44
North American Electric Reliability Council (NERC). Control Area Concepts and Obligations.
Princeton, NJ: Author, 1992.

North American Electric Reliability Council (NERC). Report on Electric Utilities’ Response to
the Cold Wave of January 1994. Princeton, NJ: Author, 1994.

North American Electric Reliability Council (NERC). Regional Reliability Criteria: Summary of
Regional Criteria and Guides for Planning Reliable Bulk Electric Systems. Princeton, NJ:
Author, 1994.

North American Electric Reliability Council (NERC). System Reliability: Joint Action by All
Utilities, presentation to PCCIP by Michehl R. Gent, President, NERC, Dec. 12, 1996.

North American Electric Reliability Council (NERC). Planning of the Bulk Electric Systems.
Princeton, NJ: Author, 1995.

North American Electric Reliability Council (NERC). Security Process Task Force Final Report
to the NERC Engineering Committee and Operating Committee. Princeton, NJ: Author, 1996.

North American Electric Reliability Council (NERC). Future Role of NERC Task Force II,
Future Course of NERC-II White Paper, report to NERC Board of Trustees, Aug. 30, 1996.

“NRI Demonstrates Biometric Secure Authentication for Intranets/The Global Internet at
ComNet ‘97.” PR Newswire Feb. 3, 1997.

“NRI Launches Economical Fingertip Scanners That Make Biometric Personal Identification
Practical for Commercial Applications.” PR Newswire Sep. 9, 1996.

NSC (Network Systems Corporation). “How Secure Is Your Data?” Network Systems Security
Brief. Minneapolis, MN: Network Systems Corporation , 1995.

Nye, Joseph S. Jr., and William A. Owens. “Americas Information Edge.” Foreign Affairs Mar.-
Apr. 1996: 20-36.

O’Mahoney, Donal. “Security Considerations in a Network Management Environment.” IEEE
Network, May/Jun. 1994: 12-17.

“OASIS Starts Slow, But Should Improve with Time.” Electrical World Feb. 1997: 5.

“OECD Guidelines for the Security of Information Systems.” Online. Internet. Feb. 19, 1997.
Available http://www.oecd.org/dsti/iccp/legal/secur-en/.html

Olsen, Karen and John Tebbutt. The Impact of the FCC’s Open Network Architecture on NS/EP
Telecommunications Security.     Gaithersburg, MD: National Institute of Standards and
Technology (NIST Special Publication 800-11). Washington: GPO, 1995.




                                                                                                45
“Open Access Information System Goes Commercial.” Coal Age Feb. 1997: 25.

Opplinger, Rolf. Authentication Systems for Secure Networks. Boston: Artech House, 1996.

Ostrovsky, Rafail and Moti Yung. “How to Withstand Mobile Virus Attacks.” Proceedings of
the Tenth Annual ACM Symposium on Principles of Distributed Computing, University of
Ottawa, Montreal Quebec, Canada, Aug. 19-21, 1991. New York: ACM Press, 1991: 51-59.

OURS (Open User Recommended Solutions). Recommendations for Providing Secure Business
Services Over External Networks. Chicago, IL: Author, 1996.

“Outlink Updates ‘The Firewall Report’: The Most Detailed Profiles of Firewall Products and
Supplies.” PR Newswire Jan. 9, 1997.

Ownbey, Pamela J., Frank D. Schaumburg, and Peter C. Klingeman. “Ensuring the Security of
Public Water Supplies.” Journal of the American Water Works Association Feb. 1988: 30-34.

Pabrai, Uday O. and Vijay K. Gurbani. Internet and TCP/IP Network Security: Securing
Protocols and Applications. New York: McGraw-Hill, 1996.

Pace, Scott, Gerald Frost, Irving Lachow, et al. “The Global Positioning System: Assessing
National Policies.” Santa Monica, CA: RAND, 1996. Online. Internet. Feb. 19, 1997.
Available http://www.rand.org/publications/MR/MR614/

Paige, Emmett, Jr. “Electromagnetic Spectrum: Key to Success in Future Conflicts.” Nov. 26,
1996.          Online.         Internet.         Mar.     19,     1997.           Available
http://www.infowar.com/CIVIL_DE/civil_3.html-ssi

Palmer, I.C. and G.A. Potter. Computer Security Risk Management. New York: Van Nostrand
Reinhold, 1990.

Parker, Donn B. Computer Crime: Criminal Justice Resource Manual. 2nd ed. Washington:
U.S. Dept. of Justice, National Institutes of Justice, 1989.

Parker, Richard L. “Risk Assessment of NACISA Information System Interconnection
Alternatives: INFOSEC Requirements, Options, and Recommendations.” Information Security:
Concepts and Technologies. Proceedings of the 1994 AFCEA Europe Rome Symposium &
Exposition, 11-13 May 1994, Rome, Italy.

Parkes, Christopher. “California Aims to Set Deregulation Trend.” The Financial Post Jun. 5,
1997: 34.

Patrick, R. L. A Critical Look at Earthquake Preparations in the Los Angeles Basin. Santa
Monica, CA: RAND, 1990.




                                                                                               46
Paylor, M.A. Risk Assessment of LAN Communications. Monterey, CA: Naval Postgraduate
School, Sep. 1992. (NTIS No. ADA2573277/XAB)

Pearce, J. LeRoy. “Convergence of Military & Civilian Vulnerabilities.” InfoWarCon:
International Conference on Information Warfare: Defining the European Perspective,
Proceedings, Brussels 96. Upland, PA: DIANE, 1996.

Peltier, Tom. “Introduction to Risk Analysis.” The 22nd Computer Network & Security
Conference, November 7-8, 1995, Washington, DC: Conference Proceedings, Vol. 2. San
Francisco, CA: Computer Security Institute (CSI), 1995.

Peltier, Tom. Manager’s Guide to Information Security Awareness.          San Francisco, CA:
Computer Security Institute (CSI), 1997.

Pember, Margaret E. “Information Disaster Planning: An Integral Component of Corporate Risk
Management.” Records Management Quarterly Apr. 1996: 31.

“Pentagon Mulls Possible Role of GPS in Information Security.” Defense Daily Feb. 6, 1996.

“Pentagon Steps Up Fight Against Computer Hackers.” Armed Forces Newswire Service Nov.
25, 1996.

Peterson, Ivars. “Bits of Uncertainty: Blazing a Quantum Trail to Absolute Secrecy.” Science
News
Feb. 10, 1996: 90-92.

Peterson, Ivars.  “Chinks in Digital Armor: Exploiting Faults to Break              Smart-card
Cryptosystems.” Science News Feb. 1, 1997: 78-79.

Petska-Juliussen, Karen and Egil Juliussen. The 8th Annual Computer Industry Almanac. Dallas,
TX: Computer Industry Almanac, 1996.

Pfleeger, Charles F. Security in Computing. Englewood Cliffs, NJ: Prentice Hall, 1989.

Phillips, Ted. “The Electronic Intrusion Threat On Public Networks.” Firewalls & Internet
Security Conference 96, January 25-26, 1996, Arlington, VA: Conference Proceedings. Carlisle,
PA: NCSA, 1996.

Pieprzyk, Josef and Jennifer Seberry, eds. Information Security and Privacy: First Australian
Conference, ACISP '96, Wollongong, NSW, Australia, June 24-26, 1996: Proceedings. New
York: Springer-Verlag, 1996.

Pipkin, Donald L. Halting the Hacker: A Practical Guide to Computer Security. Upper Saddle
River, NJ: Prentice Hall PTR, 1997.




                                                                                                 47
“PKZip Trojan Horse...Distribute to Your Security Personnel.” Online. Internet. Feb. 19, 1997.
Available http://www.info-sec.com/viruses/infosecb.html-ssi

Polk, William T. and Lawrence E. Bassham III. A Guide to the Selection of Anti-virus Tools and
Techniques. Gaithersburg, MD: National Institute of Standards and Technology (NIST Special
Publication 800-5). Washington: GPO, 1992.

Polk, William T. and Lawrence E. Bassham III. Security Issues in the Database Language SQL.
Gaithersburg, MD: National Institute of Standards and Technology. Washington: GPO, 1993.

Pollard, Neal. “Computer Terrorism & the Information Infrastructure.” InfoWarCon:
International Conference on Information Warfare, Proceedings. Upland, PA: DIANE, 1995.

Porter, Michael E. “The Competitive Advantage of Nations.” Harvard Business Review Mar.-
Apr. 1990: 73-93.

Posch, Reinhard, ed. Communications and Multimedia Security. New York: Chapman & Hall,
1995.

Power, Kevin. “GAO Chides OMB on Security.” Government Computer News Oct. 21, 1996:
57.

Power, Kevin. “OMB Tells Agencies to Train Users in Computer Security; Edict also Requires
Agencies to Create and Test System Backup Provisions.” Government Computer News Mar. 15,
1993: 65.

Power, Richard. CSI Special Report on Information Warfare. San Francisco, CA: Computer
Security Institute (CSI), 1995.

Power, Richard. Current and Future Danger: A CSI Primer on Computer Crime and Information
Warfare. San Francisco, CA: Computer Security Institute (CSI), 1995.

Preneel, Bart, Rene Govaerts, and Joos Vandewalle, eds. Computer Security and Industrial
Cryptography: State of the Art and Evolution: ESAT course, Leuven, Belgium, May 21-23, 1991.
Lecture notes in computer science, 741. New York: Springer-Verlag, 1993.

Pressman, Aaron. “SYN-Flooding: Fix for :Latest Internet Hacker Attack Released.” Oct. 2,
1996.          Online.            Internet.         Feb.    19,  1997.           Available
http://www.naispa.org/resources/listserv_archive/msg00000.html

Preston, Darrell. “In Southwest, State Legislatures Maps Utilities’ Post-Deregulation Terrain;
Trends in the Region: Electric Utilities, Facing Competition, Look to Lawmakers.” The Bond
Buyer Nov. 19, 1996: 1.




                                                                                                 48
Price Waterhouse (Firm). The Complete Computer Virus Handbook. London: Pitman, 1990.

Privacy Rights Clearinghouse. “Privacy Survival Guide: How to Take Control of Your Personal
Information.” Bulletin of the American Society for Information Science Feb./Mar. 1997: 11-13.

Proceedings of the Seminar on Responding to the Consequences of Chemical and Biological
Terrorism, July 11-14, 1995, Uniformed Services University of Health Sciences, Bethesda, MD.
Rockville, MD: The Office, 1996.

“PSA (Public Securities Association) Creates Task Force on Electronic Securities Info.”
Operations Management Jan. 29, 1996: 4.

Purser, Michael. Secure Data Networking. Boston: Artech House, 1993.

Ramesh, V.C. “Information Matters: Beyond OASIS.” Electricity Journal Mar. 1997: 78-82.

“Raptor Announces Secure Business Practices Strategy: Comprehensive Strategy Tackles Next
Generation Information Security.” PR Newswire Jul. 15, 1996.

Rauscher, Karl F.      “Gray Box Risk Assessment for Telecommunications Software
Modifications.” 1996 IEEE International Conference on Communications, ICC ‘96, June 23-27,
1996, Dallas, TX, Converging Technologies for Tomorrow’s Applications, Conference Record,
Vol. 1.

Reed, Alan. Computer Risk Manager. 3rd ed. Oxford, UK: Elsevier Advanced Technology,
1994.

Reed, David. “Where Did You Get That Name Where Indeed!” Precision Marketing Nov. 27,
1995: 20-22.

Reiter, M., K. Birman, and Renesse R. Van. Fault-Tolerant Key Distribution. Ithaca, NY:
Cornell University, Jan. 1993.

Reliability and Vulnerability Working Group, Telecommunications Policy Committee,
Information
Infrastructure Task Force, NII Risk Assessment: A Nation’s Information at Risk, Feb. 29, 1996.

“Researcher Warns of More Internet Security Flaws.” Dec. 17, 1996. Online. Internet. Feb. 19,
1997. Available http://www.info-sec.com/internet/infosecr.html-ssi

Review of Telephone Network Reliability & Service Quality Standards. Upland, PA: DIANE,
1994.

Rhee, Man Young. CDMA Cellular Mobile Communications & Network Security. Upper
Saddle River, NJ: Prentice Hall PTR, 1997.




                                                                                                 49
Rhode, William E. “What is Info War?” US Naval Institute Proceedings Feb. 1996.

Riley, Kevin J. and Bruce R. Hoffman. Domestic Terrorism: A National Assessment of State and
Local Law Enforcement. Santa Monica, CA: RAND, 1995.

Rinaldi, Steven M..   Beyond the Industrial Web: Economic Synergies and Targeting
Methodologies. Maxwell AFB, AL: Air University, School of Advanced Airpower Studies.

Roberts, Ralph. Compute!’s Computer Security. Greensboro, NC: Computer! Books, 1989.

Robinson, James. “Technology, Change, and the Emerging International Order.” SAIS Review,
Winter-Spring 1995: 153-173.

Robinson, Mike. Securicor 3Net. 1996 Networking China ‘96 Conference, September 10-13,
1996, Beijing, PRC.

Rodier, Guenael. “WHO Response to Epidemics: World Health Organization’s Response to
Outbreak of Ebola haemorrhagic Fever in Zaire.” World Health Jan. 11, 1997: 7.

Rodriguez, Karen. “Figuring Out Electronic Commerce.” CommunicationsWeek International
Apr. 8, 1996: 31-32.

Ronfeldt, David F. Cyberocracy, Cyberspace, and Cyberology: Political Effects of the
Information Revolution. Santa Monica, CA: RAND, 1991.

Roos, John G. “Info Tech Info Power.” Armed Forces Journal International Jun. 1994: 31-36.

Rose, Lance. Netlaw: Your Rights in the Online World. Berkeley, CA: Osborne McGraw-Hill,
1995.

Rotenberg, Marc. 1995 EPIC Cryptography and Privacy Sourcebook: Documents on Encryption
Policy, Wiretapping and Information Warfare. Washington: Electronic Privacy Information
Center, 1995.

Rothfeder, Jeffrey. Privacy for Sale: How Computerization Has Made Everyone’s Private Life an
Open Secret. New York: Simon & Schuster, 1992.

Rothrock, John. “Information Warfare: Time for Some Constructive Skepticism.” American
Intelligence Journal Spring-Summer 1994.

Russell, Deborah and G.T. Gangemi, Sr. Computer Security Basics. Sebastopol, CA: O’Reilly &
Associates, 1991.




                                                                                                50
Ruthberg, Zella G. and Harold F. Tipton, eds. Handbook of Information Security Management.
Boston: Auerbach, 1993.

Ruthberg, Zella G. Handbook of Information Security Management: 1994-95 Handbook.
Boston: Warren Gorham & Lamont, 1995.

Ryan, Donald E. “Implications of Information-Based Warfare.” Joint Force Quarterly Autumn-
Winter 1994-1995.

Saarelainen, Markku J. “Information Warfare and Its Impacts on Commercial Enterprises.”
Online. Internet. Feb. 19, 1997. Available http://www.infowar.com/CIVIL_DE/civil_5.html-ssi

Sakaiya, Taichi. The Knowledge-Value Revolution: Or a History of the Future. Kodansa, 1991.

“Safeguarding Data Provides Network, Computer Security.” Signal Jan. 1997: 37-40.

Saltman, R.G. Electronic Documents: Selected Papers and Results. Gaithersburg, MD: National
Institute of Standards and Technology, Aug. 1993. Washington: GPO, 1993.

Samarajiva, Rohan. “Consumer Protection in the Decentralized Network: A Mapping of the
Research and Policy Terrain.” A Proposed Chapter in Private Networks and Pubic Objectives,
Eli Noam, ed. Columbia Institute for Tele-Information, New York, NY.

“Sandia Imaging Systems, AT&T-Bell Labs Jointly Demonstrate Biometric Verification System
Using DataGlyphs.” PR Newswire, Oct. 27, 1995.

Schaub, James L. and Ken D. Biery, Jr. The Ultimate Computer Security Survey. Boston:
Butterworth-Heinemann, 1995.

Schaub, James L. and Ken D. Biery, Jr. The Ultimate Financial Security Survey. Boston:
Butterworth-Heinemann, 1995.

Schaub, James L. and Ken D. Biery, Jr. The Ultimate Security Survey. Boston: Butterworth-
Heinemann, 1994.

Schaub, James L. and Toni Ames. The Ultimate Telecommunications Security Survey. Boston:
Butterworth-Heinemann, 1995.

Schneider, Michael W. “Electromagnetic Spectrum Domination: 21st Century Center of Gravity
or Achilles Heel?”

Schneier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd ed.
New York: John Wiley & Sons, 1996.




                                                                                              51
Schneier, Bruce. E-Mail Security: How to Keep Your Electronic Messages Private. New York:
John Wiley & Sons, 1995.

Schneier, Bruce. “Encryption on the Internet: PGP and PEM.” The 22nd Computer Network &
Security Conference, November 7-8, 1995, Washington, DC: Conference Proceedings, Vol. 2.
San Francisco, CA: Computer Security Institute (CSI), 1995.

Schneier, Bruce. “Why Cryptography Is Harder Than It Looks.” RISKS Forum, 08 Nov. 1996.
Online. Internet. Feb. 19, 1997. Available http://www.info-sec.com/crypto/infosecf.html-ssi

Schrader, K.J. “The Army's Role in Domestic Disaster Support: An Assessment of Policy
Choices,” 1993.

Schuler, Douglas and Aki Namioka, eds.        Participatory Design: Principles and Practices.
Hillsdale, NJ: Erlbaum, 1993.

Schwartau, Winn. Information Warfare: Chaos on the Electronic Superhighway. New York:
Thunder's Mouth Press, 1994.

Schwartau, Winn. Information Warfare: Protecting Your Personal Security in the Computer Age.
New York: Thunder's Mouth Press, 1996.

Schwartau, Winn and Chris Goggans. The Complete Internet Business Toolkit. New York: Van
Nostrand Reinhold, 1996.

Schwartz, Peter. “Warrior in the Age of Intelligent Machines,” Wired Apr. 1995: 138-139.

Schwartzstein, Stuart. The Information Revolution and National Security: Dimensions and
Directions. Washington: Center for Strategic and International Studies, 1996.

Schweitzer, James A. Managing Information Security: Administrative, Electronic, and Legal
Measures to Protect Business Information. 2nd ed. Boston : Butterworth, 1990.

Schweitzer, James A. Protecting Business Information: A Manager’s Guide.              Boston :
Butterworth-Heinemann, 1996.

Science Application International Corporation (SAIC). “Planning Considerations for Defensive
Information Warfare - Information Assurance.” Dec. 16, 1993.

Sclove, Richard E. Democracy and Technology. New York: The Guilford Press, 1995.

Scott, William B. “Lidar System to Detect Biological Warfare Agents.” Aviation Week & Space
Technology Nov. 13, 1995: 44.




                                                                                                 52
“Security of Infrastructure Questioned: Telco Says Accusation about Network Hub Is Hype.”
Mar. 24, 1997.

Segal, Gerald. “Asians in Cyberia.” The Washington Quarterly Summer 1995: 5-16.

“Secure Wireless Initiative Targets Satellite, Cellular.” Signal Mar. 1997: 52.

Security Policy Board. White Paper on Information Infrastructure Assurance. Dec. 1995.

Shaffer, Steven L. and Alan R. Simon. Network Security. Boston: AP Professional, 1994.

Sherizen, Sanford. Information Security in Financial Institutions: How to Reduce the Risk of
Computer Crime. Dublin, Ireland: Lafferty Publications, 1990.

Shimomura, Tsutomu with John Markoff. Take-down: The Pursuit and Capture of Kevin
Mitnick, America’s Most Wanted Computer Outlaw--by the Man Who Did It. New York:
Hyperion, 1996.

Sibert, Olin. “Threat-Resistant Electronic Commerce.” InfoWarCon 1995: International
Conference on Information Warfare, Proceedings, September 7-8, 1995, Arlington, VA. Upland,
PA: DIANE, 1995.

Simmons, G.J., ed. Contemporary Cryptology: The Science of Information Integrity. New York:
IEEE Press, 1992.

Simmons, D.G. and R. Wilkins. Network Event Recording Device: An Automated System for
Network Anomaly Detection and Notification. Draft. Los Alamos, NM: Los Alamos National
Laboratory, 1994.

Simon, Alan R. and Steven L. Shaffer. Network Security. Boston: AP Professional, 1994.

Simonds, Fred. Network Security: Data and Voice Communications. New York: McGraw-Hill,
1996.

Simonson, Ed. “Telecommunication Risk Assessment vs. Computer Security Assessment.” The
22nd Computer Network & Security Conference, November 7-8, 1995, Washington, DC:
Conference Proceedings, Vol. 2. San Francisco, CA: Computer Security Institute (CSI), 1995.

Sims, Christopher. “UK: Royal Guarantees Against Hackers.” Jan. 24, 1997. Online. Internet.
Feb. 20, 1997. Available http://www.info-sec.com/internet/infoseczg.html-ssi

“Sionix’s New SCADA System Fights Waterborne Parasites.” Business Wire Sep. 24, 1996.

Siyan, Karanjit and Chris Hare. Internet Firewalls and Network Security. 2nd ed. Indianapolis,
IN: New Riders, 1996.




                                                                                                 53
Sizer, Richard, ed. Security and Control of Information Technology in Society: Proceedings of
the IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in
Society on Board M/S Ilich and Ashore at St. Petersburg, Russia, 12-17 August 1993. New York:
North-Holland, 1994.

Skelton, R. and A. Kader. An Information Security Assessment of the Electric Power Utility
Industry. Electric Power Research Institute Strategic Research and Development Briefing Paper,
Sep. 1996.

Slade, Robert. “Robert Slade’s Guide to Computer Viruses.” 2nd ed. New York: Springer-
Verlag, 1996.

Slater, Ken. Information Security in Financial Services. Groves Dictionaries, 1991.

Slatalla, Michelle and Joshua Quittner. Masters of Deception: The Gang that Ruled Cyberspace.
New York: Harper Collins, 1995.

Slovic, Paul. “Perceived Risk, Trust, and Democracy.” Risk Analysis, 1993: 675-682.

Smith, Kevin B. “The Crisis and Opportunity of Information War.”

Smith, George C. The Virus Creation Labs: A Journey into the Underground. Show Low, AZ:
American Eagle, 1994.

Smith, James M. “Disaster Avoidance and Recovery.” Government Computer News Jun. 19,
1995: 67-69.

Smith, Martin R. Commonsense Computer Security: Your Practical Guide to Information
Protection. 2nd ed. New York: McGraw-Hill, 1993.

Solomon, Alan and Dmitry O. Gryaznov. Dr. Solomon’s Virus Encyclopaedia. Aylesbury,
Buckinghamshire, UK: S&S International, 1995.

“Someone Could Be Watching: Protect Your Privacy Online.” PR Newswire Jan. 13, 1997.

Spafford, Eugene H., Kathleen A. Heaphy, and David J. Ferbrache. Computer Viruses: Dealing
with Electronic Vandalism and Programmed Threats. Arlington, VA: ADAPSO, 1989.

“Special Report on the U.S. President’s Infrastructure Protection Task Force (IPTF).” The
Journal of Infrastructural Warfare.    Online.      Internet.   Jul. 25, 1997.    Available
http://www.iwar.org/

Stahl, Stephanie with Clinton Wilder. “Seals of Approval for E-Commerce--Focus is on Security
and Fraud.” InformationWeek Aug. 5, 1996: 22.




                                                                                                 54
Stahlkopf, Karl. Technical Reliability Issues. Presentation before the Secretary of Energy
Advisory Board Electric System Reliability Task Force, Jan. 16, 1996.

Stallings, William. Mecklermedia’s Official Internet World Internet Security Handbook. Foster
City, CA: IDG Books Worldwide, 1995.

Stallings, William. Network and InterNetwork Security. Englewood Cliffs, NJ: Prentice Hall
PTR, 1995.

Stallings, William, Peter Stephenson, et al. Implementing Internet Security. Indianapolis, IN:
New Riders, 1995.

Stang, David J. NCSA’s Computer Virus Handbook. Mechanicsburg, PA: NCSA, 1992.

Stang, David J. Network Security. Washington: International Computer Security Association,
1992.

Stang, David J. and Sylvia Moon. Network Security Secrets. Foster City, CA: IDG Books
Worldwide, 1993.

Star, Susan Leigh, ed. The Cultures of Computing. Oxford: Blackwell, 1995.

“State Regulators Set to Tackle Securities Cyber Fraud.” Wall Street Letter Aug. 7, 1995: 5.

“State-of-the-Art Biometric Identification Software Now Available for Windows ® NT Operating
System.” PR Newswire Aug. 6, 1996.

Stein, George. US Information Warfare. Alexandria, VA: Jane’s Information Group, 1996.

Stein, George J. “Information Warfare.” Airpower Journal Spring 1995.

Stephenson, Peter R. Global Network Security. Pitman: M & T, 1996.

Stetson, Douglas M. “Achieving Effective Medical Information Security: Understanding the
Culture.” Bulletin of the American Society for Information Science Feb./Mar. 1997: 17-21.

Stinson, Douglas R. Cryptography: Theory and Practice. Boca Raton, FL: CRC Press, 1995.

Stix, Gary. “Fighting Future Wars.” Scientific American Dec. 1995: 92-98.

Stoll, Clifford. The Cuckoo's Egg: Tracing a Spy through the Maze of Computer Espionage.
New York: Doubleday, 1989.




                                                                                                 55
Stoll, Clifford. Silicon Snake Oil: Second Thoughts on the Information Highway. New York:
Doubleday, 1995.

“Stop Agonizing--Implement an E-Mail Privacy Policy.” Electronic Messaging News Nov. 24,
1993.

Strassmann, Paul. “What’s the Best IS Defense? Being Prepared.” Computerworld Feb. 10,
1997: 70.

Strassmann, Paul A. The Politics of Information Management. New Canaan, CT: Information
Economics Press, 1995.

Street, John. Politics and Technology. New York: Guilford Press, 1992.

Struble, Daniel. “What is Command and Control Warfare?”           Naval War College Review
Summer 1995: 89-98.

Strutt, John E., John Patrick, and Nigel Custance. A Risk Assessment Methodology for Security
Advisors. 29th Annual 1995 IEEE International Carnahan Conference on Security Technology,
Sanderstead, Surrey, United Kingdom, October 1995.

Sullivan, Gordon R. and James M. Dubik. War in the Information Age. Carlisle, PA: Army War
College's Strategic Studies Institute.

Superville, Darlene. “Scientists Warn of Risks Posed by Heavy Reliance on Computers.”
Associated Press Feb. 11, 1997.

Supplemental Comments of the Supporting PJM Companies for Technical Conference on
Comparability for Power Pools. Sponsoring PJM companies presented before the Federal Energy
Regulatory Commission, Docket No. RM95-8-000 and Docket No. RM94-7-001, Nov. 30, 1995.

Sussman, Vic. “Policing the Digital World: Electronic Advances May Strain Some Basic
Constitutional Principles.” U.S. News & World Report, Dec. 6, 1996: 68-70.

Swett, Charles. “Strategic Assessment: The Internet.” Apr. 17, 1995. Online. Internet. Jun. 30,
1997. Available http://www.parascope.com/ds/swett.txt

Swift, F. Report of the Hacker Attack Working Group, August 1994. Livermore, CA: Lawrence
Livermore National Laboratory, Feb. 1995. (NTIS No. DE95015201/XAB)

Symposium on Electromagnetic Security for Information Protection, Rome, Italy, November 21-
22, 1991: SEPI '91 Proceedings. Rome: Fondazione Ugo Bordoni, 1992.

Szafranski, Richard. “A Theory of Information Warfare: Preparing for 2020.” Airpower Journal
Spring 1995.




                                                                                                  56
Tarsala, Michael. “Online Security Is Swiss Cheese, Survey Finds.” Jan. 21, 1997. Online.
Internet. Feb. 19, 1997. Available http://www.info-sec.com/access/infoseczb.html-ssi

Taylor, Paul. “Cyberspace Threat Not Taken Lightly.” Financial Times Sep. 19, 1996: 16.

 “Technology and the Transformation of the Electricity Industry.” EPRI Journal Nov.-Dec. 1996:
22-30.

“Telemetering/SCADA.” Public Works Apr. 15, 1995: C77.

“Terrorism: More Than an Air Safety Issue.” Aviation Week & Space Technology Sep. 16, 1996:
102.

“Terrorist Use of Chemical Weapons.” Online. Internet.            Apr. 25, 1997.     Available
http://groucho.la.asu.edu/~godber/research/cwpaper.html

Texas Comptroller of Public Accounts. “Infrastructure” Austin, TX: Author, 1994.

Texas Dept. of Information Resources. Information Resources Security and Risk Management :
Policy, Standards, and Guidelines. Austin, TX: Dept. of Information Resources, 1993.

Texas State Department of Highways and Public Transportation.         Strategic Mobility Plan:
Identifying
Transportation Requirements 1990-2009. Austin, TX, Feb. 1989.

Thelan, James C. and William Gabris. “Model Calculates Gas Quality for Pipe Line Network
Remote RTUs: Use of Supervisory Control and Data Acquisition System in Complex
Transmission System.” Pipe Line & Gas Industry Oct. 1995: 27.

 “This is What a Real Virus Warning Looks Like.” Dec. 13, 1996. Online. Internet. Feb. 19,
1997. Available http://www.info-sec.com/viruses/infoseco.html-ssi

Tompkins, Fred. Information Security Risk Management.          Delran, NJ: Datapro Research
Corporation, 1986.

Thompson, Amy and Sherry Harowitz.         “Taking a Reading on E-mail Policy.”       Security
Management Nov. 1996: 55-59.

“Tighter Security for Electronic Information.” EPRI Journal Nov.-Dec. 1996: 16-21.

Tiley, W. Edward. Personal Computer Security. Foster City, CA: IDG Books Worldwide, 1996.




                                                                                                 57
Tirschwell, Peter. “Pacific Carriers, Bucking Trend, Move Toward Deregulation Despite
Congress’ Inaction, Lines Are Mapping More Open Courses.” Journal of Commerce Sep. 12,
1996: 1A.

Toffler, Alvin and Heidi Toffler. Powershift: Knowledge, Wealth & Violence at the Edge of the
21st Century. New York: Bantam, 1990.

Toffler, Alvin and Heidi Toffler. War and Anti-War: Survival at the Dawn of the 21st Century.
Boston: Little Brown, 1993.

Toigo, Jon W. Disaster Recovery Planning: For Computers and Communication Resources.
New York: John Wiley & Sons, 1996.

Toigo, Jon W. Disaster Recovery Planning: Managing Risk and Catastrophe in Information
Systems. Englewood Cliffs, NJ: Yourdon Press, 1989.

Tollar, Eric S. “Risk Assessment in Telecommunications of CCS (Common Channel Signaling)
Networks.” 1996 IEEE International Conference on Communications, ICC ‘96, June 23-27,
1996, Dallas, TX, Converging Technologies for Tomorrow’s Applications, Conference Record,
Vol. 1.

Tracey, Brian. “Spending on Security Systems Outpaces Overall Corporate Technology
Outlays.” The American Banker June 12, 1996: 10.

Tracy, Richard and William Stewart. “Protecting Military Computer Networks from Internet
Threats.” The New Information Age: Reality or Myth? Proceedings of the 16th AFCEA Europe
Brussels Symposium & Exposition, 18-20 October 1995, Brussels, Belgium.

Trautman, W. B. Regulating Communication Technology: The Case of Automated Teller
Machine Networks. Santa Monica, CA: RAND, 1989.

“Trident Data Systems Launches Comprehensive Information Protection Program.” Business
Wire Nov. 11, 1996.

Tripp, B. Survey of the Counterintelligence Needs of Private Industry. Washington, DC:
National Counterintelligence Center and U.S. Department of State Overseas Security Advisory
Council, 1995.

Trusted Information Systems, Inc. and Software Publishers Association. Encryption Products
Database Statistics Dec. 1994.

Tuttle, Ray. “Utility Deregulation Powerful Trend.” Tulsa World Oct. 13, 1996: E5.

“U.S. Encryption Envoy Seeks Industry Cooperation.” Reuters: European Business Report Jan.
28, 1997.




                                                                                                58
United Nations. Commission on Crime and Criminal Justice. United Nations Manual on the
Prevention and Control of Computer-related Crime. New York. Author, 1995.

United States Advisory Council on the National Information Infrastructure.       A Nation of
Opportunity:
Realizing the Promise of the Information. Jan. 1996.

United States Council for International Business. Private Sector Leadership: Policy Foundations
for a
National Information Infrastructure (NII). Jul. 1994.

United States. Bureau of the Census.        Statistical Abstract of the United States: 1996.
Washington: GPO, 1996.

United States. Coast Guard. Marine Safety Office, Portland, Maine. “Safety Alert: GPS
Navigation System Use.” Megapulse, Inc. Megazine, [Online serial], 1:1. Online. Internet.
Feb. 19, 1997. Available http://www.megapulse.com/megazine.html

United States. Cong. Congressional Budget Office. New Directions for the Nation's Public
Works. Washington: GPO, 1988.

United States. Cong. House. Computer Outages at the Federal Aviation Administration's Air
Traffic Control Center in Aurora, Illinois, Hearing before the Subcommittee on Aviation of the
Committee on Transportation and Infrastructure, 104th Cong., 1st sess. Washington: GPO, 1995.

United States. Cong. House. Computer Security Act of 1987 Report / prepared by the
Subcommittee on Technology and Competitiveness; transmitted to the Committee on Science,
Space, and Technology, 102nd Cong., 2 sess. Washington: GPO, 1992.

United States. Cong. House. Computer Security at the Drug Enforcement Agency: Hearing
Before the Government Information, Justice, and Agriculture Subcommittee, Committee on
Government Operations, 102nd Cong., 2nd sess. Washington: GPO, 1992.

United States. Cong. House. Telephone network reliability: Hearings Before the Subcommittee
on Telecommunications and Finance of the Committee on Energy and Commerce, 102nd
Congress, including H.R. 4789, a bill to amend the Communications Act of 1934 ... October 1,
1991, April 7 and May 13, 1992. Washington: GPO, 1992.

United States. Cong. Office of Technology Assessment. Delivering the Goods: Public Works
Technologies, Management, and Financing. OTA-SET-477. Washington: GPO, 1991.

United States. Cong. Office of Technology Assessment. Electronic Enterprises: Looking to the
Future. OTA-TCT-600578. Washington: GPO, 1994.




                                                                                                  59
United States. Cong. Office of Technology Assessment. Information Security and Privacy in
Network Environments. OTA-TCT-606. Washington: GPO, 1994.

United States. Cong. Office of Technology Assessment. Issue Update on Information Security
and Privacy in Network Environments. OTA-BP-ITC-147. Washington: GPO, 1995.

United States. Cong. Office of Technology Assessment. Making Government Work: Electronic
Delivery of Government Services. OTA-TCT-578. Washington: GPO, 1993.

United States. Cong. Office of Technology Assessment. Physical Vulnerability of Electric
Systems To Natural Disasters and Sabotage. OTA-E-453. Washington: GPO, 1990.

United States. Cong. Office of Technology Assessment. Protecting Privacy in Computerized
Medical Information. Washington: GPO, 1993.

United States. Cong. Office of Technology Assessment. Technology Against Terrorism:
Structuring Security. OTA-ISC-511. Washington: GPO, 1992.

United States. Cong. Office of Technology Assessment. U.S. Oil Import Vulnerability: The
Technical Replacement Capability, OTA-E-503. Washington: GPO, 1991.

United States. Cong. Office of Technology Assessment. Wireless Technologies and the National
Information Infrastructure. Washington: GPO, 1995.

United States. Cong. Senate. Committee on Governmental Affairs. Draft Committee Report on
the Vulnerability of Networks for Communication and Energy Distribution to Terrorist Attack.
Feb. 1989.

United States. Cong. Senate. Judiciary Committee, Subcommittee on Terrorism, Technology
and Government Information. “Jerry Berman: Testimony on the right to free speech, free
association, and privacy on the Internet in the aftermath of Oklahoma City,” May 11, 1995.

United States. Cong. Senate. Permanent Subcommittee on Investigations, Staff Statement,
Hearings on Security in Cyberspace, Jun. 5, 1996.

United States. Cong. Senate. Statement as Delivered by Louis J. Freeh. Hearings on Economic
Espionage, Before the Senate Select Committee on Intelligence and Senate Committee on the
Judiciary, Subcommittee on Terrorism, Technology and Government Information, Federal Bureau
of Investigation, Feb. 28, 1996.

United States. Cong. Senate. Subcommittee on Government Information and Regulation of the
Committee on Governmental Affairs. A Lesson of the Gulf War: National Security Requires
Computer Security. Hearings. 102nd Cong., 1st sess. Washington: GPO, 1992. |June 19,
1991|102-575|.




                                                                                               60
United States. Dept. of Commerce. Global Information Infrastructure: Agenda for Cooperation.
Washington: GPO, 1995.

United States. Dept. of Defense. Joint Staff. Information Warfare: Legal, Regulatory, Policy and
Organizational Considerations for Assurance. 2nd ed. Washington: Joint Chiefs of Staff, 1995.

United States. Dept. of Defense. Office of Secretary of Defense. Proliferation: Threat and
Response. Washington: GPO, 1996.

United States. Dept. of Defense. Under Secretary of Defense for Acquisition and Technology.
Report of the Defense Science Board Summer Study Task Force on Information Architecture for
the Battlefield. Oct. 1994.

United States. Dept. of Energy. The Electric Power Outages in the Western United States, July 2-
3, 1996. Report to the President, Aug. 1996. (DOE/PO-0050)

United States. Dept. of Energy. Implications of the Electric Outages of July-August 1996 in the
Western United States. D. Meyer presentation materials, Sep 1996.

United States. Dept. of Energy. Mitigation of Natural Gas Systems Emergencies. Report
submitted by New York: Brookhaven National Laboratory, Jun. 1988.

United States. Dept. of Energy. Office of Emergency Operations. The National Electric
Reliability Study: Final Report. DOE/EP-0004, Apr. 1981.

United States. Dept. of Energy. Office of Emergency Operations. The National Electric
Reliability Study: Technical Reports. DOE/EP-0005, Apr. 1981.

United States.   Dept. of Energy.         Office of Emergency Planning and Operations.
Telecommunications Electric Service Priority Restoration Initiative: An Introduction for
Telecommunications Industry, Electric Utility Industry and State Officials. DOE/OE-0002, Feb.
1993.

United States. Dept. of Energy. Working Group on Energy Facility Siting. Draft Report of the
Working Group on Energy Facility Siting to the Secretary. Washington: GPO, 1993.

United States. Dept. of the Interior. Water Quality Monitoring to be Increased Under President
Clinton's New Environmental Initiative. Press release, Sep. 5, 1996.

United States. Dept. of Transportation. Volpe Center. Emerging Issues in Transportation
Information Infrastructure Security, Conference Proceedings Summary. May 21, 1996.

United States. Energy Information Administration (EIA). An Analysis of FERC’s Final
Environmental Impact Statement for Electricity Open Access and Recovery of Stranded Costs,
Sep. 1996. (DOE/EIA Service Report, SR/OIAF/96-03)




                                                                                                   61
United States. Energy Information Administration (EIA). Annual Energy Outlook 1996 with
Projections to 2015, Jan. 1996. (DOE/EIA-0383)

United States. Energy Information Administration (EIA). Annual Energy Outlook 1997 With
Projections to 2015, Dec. 1996. (DOE/EIA-0383(97))

United States. Energy Information Administration (EIA). Annual Energy Review 1995, Jul.
1996. (DOE/EIA-0384(95))

United States. Energy Information Administration (EIA). Annual Report to Congress 1995, Jul.
1996. (DOE/EIA-0173(95))

United States. Energy Information Administration (EIA). The Changing Structure of the Electric
Power Industry 1970-1991, Mar. 1993. DOE/EIA-0562), Mar. 1993

United States. Energy Information Administration (EIA). Cost of Quality of Fuels for Electric
Utility Plants 1994, DOE/EIA-0191(94), Jul. 1995.

United States. Energy Information Administration (EIA). Cost of Quality of Fuels for Electric
Utility Plants 1995 Tables, DOE/EIA-0191(95), Jul. 1996.

United States. Energy Information Administration (EIA). Electric Power Annual 1995, Vol. I,
DOE/EIA-0348(95)/1, Jul. 1996.

United States. Energy Information Administration (EIA). Electric Power Annual 1995, Vol. II,
DOE/EIA-0348(95)/2, Jul. 1996.

United States. Energy Information Administration (EIA). Electric Power Monthly, DOE/EIA-
0226(96/11, Nov. 1996.

United States. Energy Information Administration (EIA).         Electric Sales and Revenue,
DOE/EIA-0540(95), Dec. 1996.

United States. Energy Information Administration (EIA). Electric Trade in the United States
1992, DOE/EIA-0531(92), Sep. 1994.

United States.   Energy Information Administration (EIA).        Electricity Generation and
Environmental Externalities: Case Studies, DOE/EIA-0598, Sep. 1995.

United States. Energy Information Administration (EIA). Energy Policy Act Transportation Rate
Study: Interim Report on Coal Transportation, DOE/EIA-0597, Oct. 1995.

United States. Energy Information Administration (EIA). Financial Impacts of Nonutility Power
Purchases on Investor-Owned Electric Utilities, DOE/EIA-0580, Jun. 1994.




                                                                                                 62
United States. Energy Information Administration (EIA). Financial Statistics of Major U.S.
Investor-Owned Electric Utilities 1994, DOE/EIA-0437(95)/1, Dec. 1996.

United States. Energy Information Administration (EIA). Inventory of Power Plants in the
United States 1994, DOE/EIA-0095(94), Oct. 1995.

United States. Energy Information Administration (EIA).     Issues in Midterm Analysis and
Forecasting 1996, DOE/EIA-0607(96), Sep. 1996.

United States. Energy Information Administration (EIA). Monthly Energy Review, DOE/EIA-
0035(96/11), Nov. 1996.

United States. Energy Information Administration (EIA). Natural Gas 1995: Issues and Trends.
DOE/EIA-0560 (95). Nov. 1995.

United States. Energy Information Administration (EIA). Natural Gas Annual 1995. DOE/EIA-
0131 (95). Nov. 1996.

United States. Energy Information Administration (EIA). Nuclear Power Generation and Fuel
Cycle Report 1996, DOE/EIA-0436(96), Oct. 1996.

United States. Energy Information Administration (EIA). Performance Issues for a Changing
Electric Power Industry, DOE/EIA-0586, Jan. 1995.

United States. Energy Information Administration (EIA).     Petroleum - An Energy Profile.
DOE/EIA-0545 (91). Aug. 1991.

United States. Energy Information Administration (EIA). Privatization and Globalization of
Energy Markets, DOE/EIA-0609, Oct. 1996.

United States. Energy Information Administration (EIA). Renewable Energy Annual 1995,
DOE/EIA-0603(95), Dec. 1995.

United States. Energy Information Administration (EIA). A Review of FERC’s Final
Environmental Impact Statement for Electricity Open Access and Recovery of Stranded Costs,
DOE/EIA Service Report, SR/OIAF/96-02. Jul. 1996.

United States. Energy Information Administration (EIA). Short-term Energy Outlook: Quarterly
Projections, Fourth Quarter 1996, DOE/EIA-0202(96/4Q), Oct. 1996.

United States. Energy Information Administration (EIA). U.S. Crude Oil, Natural Gas, and
Natural Gas Liquid Resources, Annual Report 1995, DOE/EIA-0216 (95), Nov. 1996.




                                                                                               63
United States. Environmental Protection Agency. TSCA (Toxic Substance Control Act)
Confidential Business Information Security Manual. Washington: Author, 1993.

United States. Executive Office of the President. National Plan for Telecommunications Support
in Non-wartime Emergencies. Washington: Office of Science and Technology Policy, Jan. 1992.

United States. Federal Aviation Administration (FAA). Criminal Acts Against Civil Aviation.
Recurring yearly.

United States. Federal Aviation Administration (FAA). FAA Statistical Handbook of Aviation,
Calendar Year 1994. (DTIC No. AD-A321764, 1994 - Unclassified)

United States. Federal Aviation Administration (FAA). Federal Aviation Administration Large
and Medium Hubs - 1994. 1994.

United States. Federal Communications Commission. “Report and Order and Further Notice of
Proposed Rule Making: Revision of the Commissions Rules to Ensure Compatibility with
Enhanced 911 Emergency Calling Systems.” CC Docket No. 94-102, Jun. 26, 1996.

United States. Federal Energy Regulatory Commission (FERC). 1995 Annual Report.

United States. Federal Energy Regulatory Commission (FERC). Office of Electric Power
Regulation. “Comparable Open Access Transmission,” Briefing, Jun. 1996.

United States. Federal Energy Regulatory Commission (FERC). Office of Electric Power
Regulation. Power Pooling in the United States, FERC-0049, Dec. 1981.

United States.      Federal Highway Administration.        America's Challenge for Highway
Transportation in the 21st Century, Interim Report of the Future National Highway Program Task
Force. Washington: GPO, 1988.

United States. Federal Highway Administration. Status of the Nation's Surface Transportation
System: Condition and Performance, 1995. Report to Congress. A Summary. 1996.

United States. General Accounting Office. Aviation Safety: Data Problems Threaten FAA
Strides on Safety Analysis System. Chapter Report GAO/AIMD-95-27, Feb. 8, 1995.

United States. General Accounting Office. Aviation Security: Development of New Security
Technology Has Not Met Expectations. Chapter Report GAO/RCED-94-142, May 19, 1994.

United States. General Accounting Office. Aviation Security: FAA Can Help Ensure That
Airports' Access Control Systems Are Cost Effective. Letter Report GAO/RCED-95-25, Mar. 3,
1995.




                                                                                                 64
United States. General Accounting Office. Aviation Security: Immediate Action Needed to
Improve Security. Fultz, Keith O. Assistant Comptroller General, Testimony Before the
Committee on Commerce, Science, and Transportation, U.S. Senate. GAO/T-RCED/NSIAD-96-
237, Aug. 1, 1996.

United States. General Accounting Office.      Communications Privacy: Federal Policy and
Actions.
GAO/OSI-94-2, Nov. 1993.

United States. General Accounting Office. Computer Security: DEA Is Not Adequately
Protecting Sensitive Drug Enforcement Data: Report to the Chairman, Government Information,
Justice, and Agriculture Subcommittee, Committee on Government Operations, House of
Representatives. Shipping List No. 93-0134-M, 1992.

United States. General Accounting Office. Computer Security: Hackers Penetrate DOD
Computer Systems. GAO/T-IMTEC-92-5, Nov. 20, 1991.

United States. General Accounting Office. Computer Security: Unauthorized Access to a NASA
Scientific Network. GAO/IMTEC-90-2, Nov. 1989.

United States. General Accounting Office. Computer Security: Virus Highlights Need for
Improved Internet Management. GAO/IMTEC-89-57, Jun. 1989.

United States. General Accounting Office. Disaster Management: Improving the Nation’s
Response to Catastrophic Disasters. GAO/RCED-93-186, Jul. 23, 1993.

United States. General Accounting Office. Economic Espionage: The Threat to US Industry.
GAO/T-OSI-92-6, Apr. 1992.

United States. General Accounting Office. Electricity Supply: Efforts Under Way to Improve
Federal Electrical Disruption Preparedness. Report to the Chairman, Subcommittee on Oversight
and Investigations, Committee on Energy and Commerce, U.S. House of Representatives,
GAO/RCED-92-125, Apr. 1992.

United States. General Accounting Office. Federal Power: Outages Reduce the Reliability of
Hydroelectric Power Plants in the Southeast. Victor S. Rezendes. Testimony before the
Subcommittee on Water and Power Resources, House Committee on Resources. GAO/T-RCED-
96-180, Jul. 25, 1996.

United States. General Accounting Office. Information Security: Computer Attacks at
Department of Defense Pose Increasing Risks: Report to Congressional Requesters. (a.k.a. GAO
Report on Pentagon Computer Security.) GAO/AIMD-96-84, May 1996.

United States. General Accounting Office. Information Superhighway: An Overview of
Technology Challenges. GAO/AIMD-95-23, Jan. 23, 1995.




                                                                                                65
United States. General Accounting Office. Need to Assess Federal Role in Regulating and
Enforcing Pipeline Safety. Report by the Comptroller General. GAO/RCED-84-102. Jul. 10,
1984.

United States. General Accounting Office. Railroad Safety: Continued Emphasis Needed for an
Effective Track Safety Inspection Program. GAO/RCED-94-56. Apr. 22, 1994.

United States. General Accounting Office. Reshaping Surface Transportation Programs. Dec.
1989.

United States. General Accounting Office. Tax Systems Modernization Concerns Over Security
and Privacy Elements of the Systems Architecture: Report to the Chairman, Committee on
Governmental Affairs, U.S. Senate. Shipping List No. 93-0694-M, Sep. 1992.

United States. General Accounting Office. Telecommunications: Interruptions of Telephone
Service. GAO/RCED-93-79FS, Mar. 1993.

United States. General Accounting Office. Water Quality: A Catalog of Related Federal
Programs. GAO/RCED-96-173. Jun. 19, 1996.

United States. Joint Chiefs of Staff, Information Warfare Division. Information Warfare: Legal,
Regulatory, Policy and Organizational Considerations for Assurance. Joint Pub. 1. 2nd ed.
Washington, DC: National Defense University, Jul. 4, 1996. Online. Internet. Feb. 19, 1997.
Available http://www.infowar.com/mil_c4i/joint/joint.html-ssi

United States. National Security Council. Annual Report to Congress on Foreign Economic
Collection and Industrial Espionage. Washington: GPO, 1995.

United States. Office of the Federal Register, National Archives and Records Administration.
United States Government Manual 1995/1996. Washington: GPO, 1995.

United States. President’s National Security Telecommunications Advisory Committee,
Information Assurance Task Force. Electric Power Information Assurance Risk Assessment.
Draft. Oct. 1996.

United States. Public Health Service. Making a Powerful Connection: the Health of the Public
and the National Information Infrastructure. Jul. 6, 1995.

United States. Security Policy Board. White Paper on Information Infrastructure Assurance.
Jan. 3, 1996.

United States. Social Security Administration. “Electronic Service Delivery,” December 30,
1996. Federal Register. Online. Dialog. Mar. 12, 1997.




                                                                                                  66
United States. Vice President's Commission on Aviation Safety and Security. Recommendations
Summary. Sep. 5, 1996.

United States. The White House, Office of the Vice President. “Statement of the Vice President
on Export Controls for Commercial Encryption Products,” Oct. 1, 1996.

University of Denver College of Law. Transportation Law Journal.

“Utilities Pave Way for Secure E-commerce.” Communications News August 1996: 10.

“Utilities Plan New AM/FM EMS/SCADA Systems.” Electric Light & Power Sep. 1993: 19.

Van Creveld, Martin L.      The Transformation of War.       New York: Maxwell Macmillan
International, 1991.

van Wyk, Kenneth R. “Macros Under the Microscope.” Infosecurity News. Jan/Feb. 1997.
Online. Internet. May 1, 1997. Available http://www.infosecnews.com/article5.htm

Vaughn, R.W. Computer Security Concepts and Issues in Information Technology Management
(370) Curriculum. CA: Monterey, Naval Postgraduate School, Sep. 1992. (NTIS No.
ADA2574499/XAB)

Vardy, Jill. “Canada: No Computers, No Data.” Feb. 05, 1997. Online. Internet. Feb. 19, 1997.
Available http://www.info-sec.com/access/infoseczk.html-ssi

Varlejs, Jana, ed. Safeguarding Electronic Information: Law and Order on the Internet and Other
Computer Security Quandaries. Rutgers University, School of Communication, Information, and
Library Studies. Jefferson, NC: McFarland, 1995.

Vaughn, Karen I. “Economic Policy for an Imperfect World.” Southern Economic Journal Apr.
1996: 832-845.

Violino, Bob. “Information Security Becomes an Auditing Issue: Big Six Firms Play a Role in
Assessing Risk to Data.” InformationWeek Oct. 28, 1996: 113.

Violino, Bob and Beth Davis. “Security--Window of Vulnerability--Outside Security Breaches
Are Rising, Mainly Because of the Net, But Companies Are Starting to Respond.”
InformationWeek Mar. 10, 1997: 14.

“Virus Catalogue.” Seminar & Workshop: Computer Virus: New Threats and Protective
Measures, Cultural Centre Auderghem, Brussels (Belgium), September 24-25, 1991. Brussels
(Belgium): European Institute for Computer Anti-Virus Research (EICAR), 1991.




                                                                                                  67
“Visa and Mastercard Combine Security Specifications for Card Transactions on the Internet into
One Standard: Move Expected to Accelerate Development of Electronic Commerce and Bolster
Consumer Confidence in the Security of Cyberspace Transactions.” PR Newswire Feb. 1, 1996.

von Solms, Sebastiaan and David Naccache.        “On Blind Signatures and Perfect Crimes.”
Computers and Security. 1992: 581-583.

von Solms, S. H. “Information Security on the Electronic Superhighway.” Information Systems
Security: Facing the Information Society of the 21st Century. Sokratis K. Katsikas and Dimitris
Gritzalis, eds. New York: Chapman & Hall, 1996. 153-166.

Wake Forest Law Review Spring 1995.

Wallace, Jonathan and Mark Mangan. Sex, Laws, and Cyberspace. New York: Henry Holt,
1996.

Ware, W.A. The New Faces of Privacy. Santa Monica, CA: RAND, 1993.

Ware, W.A. Policy Considerations for Data Networks. Santa Monica, CA: RAND, 1994.

Ware, W.H. Privacy Dimensions of Medical Record Keeping. Santa Monica, CA: RAND, 1994.

Ware, W.H. Statement on Escrowed Key Proposals. Presented to the Subcommittee on
Technology, Environment and Aviation, U.S. House of Representatives. Santa Monica, CA:
RAND, 1994.

Warman, Adrian R. Computer Security Within Organisations. Macmillan Information Systems
Series.
Basingstoke, Hampshire (UK): Macmillan, 1993.

“Warning to Crypto and Banking Communities: A Serious Weakness of DES.” Nov. 21, 1996.
Online. Internet. Feb. 20, 1997. Available http://www.info-sec.com/crypto/infosech.html-ssi

Warwick, Shelly. “Privacy and Policy.” Bulletin of the American Society for Information
Science Feb./Mar. 1997: 14-15.

Warwick, Trevor. “Cell Phone RFI Crashes Server.” Nov. 27, 1996. Online. Internet. Feb. 19,
1997. Available http://www.info-sec.com/abuse/infosecj.html-ssi

“Washington Goes on the Defensive.” Jan. 17, 1997. Online.           Internet.   Feb. 19, 1997.
Available http://www.infowar.com/CIVIL_DE/civil_6.html-ssi

“Water Utility SCADA Uses Microwave Communications.” Water Engineering & Management
Apr. 1995: 28-29.




                                                                                                  68
Waters, Susan B. “Rekindling the Public Trust.” Association Management Jun. 1996: 20-22.

Wayner, Peter. Disappearing Cryptography. Boston: AP Professional, 1996.

“Web Hackers May Threaten Bank Accounts-Magazine.” Online. Internet. Feb. 20, 1997.
Available http://www.info-sec.com/internet/internet_2.html-ssi

“Web-Based One-Stop Information Security Solution.” Software Industry Report Feb. 3, 1997:
7.

Webster, William. “Can We Stop the Super-Terrorists?: Here’s What We Must Do Now.”
Reader’s Digest Jan. 1997: 93-96.

Wecker, Stephen B. Error Control, Cryptology & Speech Compression: Workshop on
Information Protection, Moscow, Russia, December 6-9, 1993. New York: Springer-Verlag,
1994.

Wee, Liang Chee. Antecedents and Consequences of Competitive Intelligence: Conceptual
Framework and Empirical Evidence. Ann Arbor, MI: UMI Dissertation Abstracts, 1993.

Weise, Elizabeth. “DOS and SYN Flooding.” Dec. 17, 1996. Online. Internet. Feb. 19, 1997.
Available http://www.info-sec.com/denial/infosecs.html-ssi

Wentz, F. Stan and Victoria P. Thompson. “Gaining User Community Acceptance of MLS.”
Information Security: Concepts and Technologies. Proceedings of the 1994 AFCEA Europe
Rome Symposium & Exposition, 11-13 May 1994, Rome, Italy.

“Western Infrastructures Face Rogue Data Stream Onslaught.” Signal Jan. 1997: 31-34.

Western Interstate Energy Board. Options for Maintaining and Enhancing Electric System
Reliability. Prepared for the Western Governor’s Association’s Task Force on Electric Industry
Restructuring: Competition and Reliability and for the Reliability Work Group of the Committee
on Regional Electric Power Cooperation. Jan. 15, 1997.

Western Systems Coordinating Council. Disturbance Report for the Power System Outage that
Occurred on the Western Interconnection August 10, 1996, Oct. 18, 1996.

Wheatley, Gary F. and Richard E. Hayes. Information Warfare and Deterrence.
National Defense University Directorate of Advanced Concepts, Technologies, and Information
Strategies. Washington: Institute for National Strategic Studies, 1996.

Wheelwright, Geoff. “No Peeking: Internet Security Firms Try to Foil Hackers with Passwords,
Codes, ‘Firewalls’ and Face Prints.” The Financial Post Oct. 28, 1995: C19.

“When Waves Collide: Future Conflict.” Joint Force Quarterly Spring 1995.




                                                                                                 69
White, Gregory B., Eric A. Fisch, and Udo W. Pooch. Computer System and Network Security.
Boca Raton, FL: CRC Press, 1996.

White, Liam. “UK: Copy-cats Threaten Internet Security.” Jan. 24, 1997. Online. Internet.
Feb. 19, 1997. Available http://www.info-sec.com/internet/infoseczf.html-ssi

Wicks, Wendy, ed. “Government Information and Policy: Changing Roles in a New
Administration.” (National Federation of Abstracting and Information Services, report, 1994)

Wilcox, Richard H. and Patrick J. Garrity, eds. America’s Hidden Vulnerabilities: Crisis
Management in a Society of Networks, A Report of the Panel on Crisis Management of the CSIS
Science and Technology Committee, The Center for Strategic and International Studies,
Georgetown University, Washington, DC, 1984.

Winkler, Ira. “Assignment Espionage: How a Penetration Test from the Inside Broke the
Security of a $5 Billion Company.” Online.    Internet.   Feb. 19, 1997. Available
http://www.infosecnews.com/article4.htm

Winkler, Ira. Corporate Espionage. Rocklin, CA: Prima Publishing, 1997.

Wirick, David W. et al. Information Risk in Emerging Utility Markets: The Role of
Commission-sponsored Audits. National Regulatory Research Institute (Ohio State University).
Columbus, OH: National Regulatory Research Institute, Ohio State University, 1996.

Wong, Kenneth Kiu and Steve Watt. Managing Information Security: A Non-technical
Management Guide. Oxford, UK: Elsevier Advanced Technology, 1990.

Wood, Charles Cresson and A.A.Garcia. Computer         Security: A Comprehensive Controls
Checklist. New York: Wiley Interscience, 1987.

Wood, Charles Cresson. Effective Information Security Management. Oxford, UK : Elsevier
Advanced Technology, 1991.

Wood, Charles Cresson. Information Security Policies Made Easy. Sausalito, CA: Baseline
Software, 1996.

Wood, Charles Cresson. “When Should You Perform a Risk Assessment?” Computer Fraud &
Security Bulletin Jun. 1993: 6-8.

Woodall, Jack. “Stalking the Next Epidemic: ProMED Tracks Emerging Diseases.” Public
Health Reports Jan. 11, 1997: 78.

Woollacott, Matthew and Lynda Radosevich. “Web Spoofing New Security Threat.” InfoWorld
Jan. 6, 1997: 33-34.




                                                                                               70
Wright, Benjamin. The Law of Electronic Commerce: EDI, E-mail, and Internet. 2nd ed.
Boston: Little, Brown, 1995.

Wriston, Walter B. The Twilight of Sovereignty: How the Information Revolution Is
Transforming Our World. Scribners, 1992.

Wrobel, Leo A. Disaster Recovery Planning for Telecommunications. Boston: Artech House,
1990.

Yedinsky, Philip. “Taking the Gamble Out of Risk: The Role of Risk Modeling.”         Risk
Management Dec. 1996, 37.

Young, Adam and Moti Yung. “Cryptovirology: Extortion-Based Security Threats and
Countermeasures.” Proceedings: 1996 IEEE Symposium on Security and Privacy, May 6-8,
1996, Oakland, CA. Los Alamitos, CA: IEEE Computer Society Press, 1996.

Yzaguirre, Raul. Testimony Before the Subcommittee on Emigration, Committee on the
Judiciary. U.S. House of Representatives, June 29, 1995.

Zaganiaris, A., M. Tahkokorpi, M. Kalervo, et al. “Methodology for Risk Assessment and
Techno-Economic Evaluation of Optical Access Networks.” ECOC’ 94. 20th European
Conference on Optical Communication, 25-29 Sep. 1994, Firenze, Italy.

Zhong, Yi X. “Information Infrastructure: Benefits, Risks, and Strategy.” Proceedings. 1996
International Conference on Information Infrastructure ICII’96-Beijing, April 25-28, 1996.

Zied Al M., John Farserotu, and Patrick Kern. “Augmenting Military Networks with Public
ISDN/SATCOM Services: A Security Risk Profile.” Information Security: Concepts and
Technologies. Proceedings of the 1994 AFCEA Europe Rome Symposium & Exposition, 11-13
May 1994, Rome, Italy.

Ziegler, Bart. “IBM Figures the Human Body Is the Ultimate Modem.” Nov. 18, 1996. Online.
Internet. Sep. 30, 1997. Available http://www.infowar.com/class_1/class1_n.html-ssi

Zuckerman, Amy. “Internet Security?” Traffic World Nov. 11, 1996: 40.




                                                                                              71

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:13
posted:5/3/2009
language:English
pages:71