Bibliography

[ch12biblio01entry01] 1 John Rendleman. “Server 54, Where Are You?” InformationWeek. http://www.informationweek.com/story/IWK20010409S0001. October 2004.

[ch12biblio01entry02] 2 Sun Microsystems. “University of North Carolina Denies They Are Looking for Solaris 'Server 54'.” http://www.sun.com/smi/Press/sunflash/200105/sunflash.20010521.3.html. October 2004.

[ch12biblio01entry03] 3 Kevin Smith. “Do You Copy? Security Issues with Digital Copiers.” September 16, 2000. http://www.giac.org/practical/Kevin_Smith_GSEC.DOC. October 2004.

[ch12biblio01entry04] 4 Security Wire Perspectives, Vol. 6, No. 74, September 27, 2004.

[ch12biblio01entry05] 5 U.S. Department of Justice. “Former Cisco Accountants Plead Guilty to Wire Fraud via Unauthorized ...

Get Inside Network Perimeter Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.