Библиография

We use cookies. Read the Privacy and Cookie Policy

Библиография

Australian Federal Police (AFP), Annual Report 1995–1996, Canberra, 1996.

–, Annual Report 1994–1995, Canberra, 1995.

–, Annual Report 1993–1994, Canberra, 1994.

Bourne, Philip E., «Internet security; System Security», DEC Professional, vol. 11, June 1992.

Cerf, Vinton G., «Networks», Scientific American, vol. 265, september 1991.

Clyde, Robert A., «DECnet Security», DEC Professional, vol. 10, april 1991.

Commonwealth Attorney-General’s Department, Interim Report on Computer Crime (the gibbs Report), Canberra, 1988.

Commonwealth Director of Public Prosecution (DPP), Annual Report 1993–1994, Canberra, 1994.

Commonwealth Scientific and Industrial Research Organisation (CSIRO), Annual Report 1994–1995, Canberra, 1995.

Davis, Andrew W., «DEC Pathworks the mainstay in Macto-VAX connectivity», Mac Week, vol. 6, 3 August 1992.

Department of Foreign Affairs and Trade, Australian Treaty Series 1993, no. 40, Australian Government Publishing Service, Canberra, 1993.

Digital Equipment Corporation, Annual Report 1989, securities and Exchange Commission (SEC) Online (USA) Inc., 1989.

–, Quarterly Report for period ending 12.31.89, sec Online (USA).

Gezelter, Robert, «The DECnet TASK object; Tutorial», Digital Systems Journal, vol. 16, july 1994.

Gianatasio, David, «Worm Infestation hits 300 VAX/VMS systems worldwide via DECnet», Digital Review, vol. 6, 20 november 1989.

Haffner, Katie & Markoff John, Cyberpunk, Corgi Books (transworld), Moorebank NSW, 1994.

Halbert, Debora, «The Potential for Modern Communication Technology to Challenge Legal Discourses of Authorship and Property», Murdoch University E-Law Journal, vol. 1, no. 2.

Kelman, Alistair, «Computer Crime in the 1990s: a Barrister’s View», Paper for the Twelfth National Symposium on Economic Crime, September 1994.

Law Commission (UK) Working Paper, no. 110, 1988.

Lloyd, J. Ian & Simpson, Moira, Law on the Electronic Frontier, David Hume Institute, Edinburgh, 1996.

Longstaff, Thomas A., & Schultz, E. Eugene, «Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code». Computers & Security, vol. 12, february 1993.

Loundy, David J., «Information Systems Law and Operator Liability Revisited», Murdoch University E-Law Journal, vol. 1, no. 3, september 1994. mcmahon, john, «Practical DECnet Security», Digital Systems Journal, vol. 14, November 1992.

Melford, Robert J., «Network security; computer networks», Internal Auditor, institute of Internal Auditors, vol. 50, February 1993.

Natalie, D. & Ball, W, EIS Coordinator, North Carolina Emergency Management, «How North Carolina Managed Hurricane Hugo», EIS News, vol. 3, no. 11, 1988.

NorTel Australia Pty Ltd, Discovering Tomorrow’s Telecommunications Solutions, chatswood, nsw (n.d.).

Northern Telecom, Annual Report 1993, Ontario, 1993.

Slatalla, Mishelle & Quittner, Joshua, Masters of Deception, Harpercollins, New York, 1995.

Royal Commission into Aboriginal Death in Custody, Report of the Inquiry into the Death of Woman Who Died at Ceduna, Australian government Publishing Service, Canberra, 1990.

Scottish Law Commission Report on Computer Crime, no. 174, 1987.

SPAN Management Office, «Security guidelines to be followed in the latest worm attack», an Intranetwork Memorandum released by the SPAN Management Office, NASA, 30 October 1989.

Sterling, Bruce, The Hacker Crackdown, Penguin Books, Melbourne, 1994. [Книга доступна на http://lib.rus.ec/b/106013 (прим. сост. FB2)]

Stoll, Clifford, The Cuckoo’s Egg, pan books, London, 1991.

Tencati, Ron, «Information regarding the DECNET worm and protection measures», an Intranetwork Memorandum released by the SPAN Management Office, NASA, 19 October 1989.

–, «Network Security Suplemental Information – Protecting the DECNET Account», security advisory, released by SPAN, NASA/Goddard Space Flight Center, 1989.

The Victorian Ombudsman, Operation Iceberg; Investigation of Leaked Police Information and Related Matters, report of the Deputy Ombudsman (Police Complaints), L. V. North Government Printer, Melbourne, 1993.

«USA proposes international virus team», Computer Fraud &. Security Bulletin (Elsevier Advanced Technology Publication), August 1991.

Victoria Police, Operation Iceberg – Investigation and Recommendations into Allegations of Leaked Confidential Police Information, 1 june, memorandum from victoria Police Commander Bowles to Chief Commissioner Comrie (also available as Appendix 1 in the Victorian Ombudsman’s Operation Iceberg Report, tabled in Victorian Parliament, October 1993), 1993.

Vietor, Richard, Contrived Competition: Regulation and Deregulation in America, belknap/harvard university press, Cambridge, 1994.

Yallop, David, To the Ends of the Earth, corgi books (transworld), moorebank, nsw, 1994.