Bibliography
[ch12biblio01entry01] 1 . “Server 54, Where Are You?” InformationWeek. http://www.informationweek.com/story/IWK20010409S0001. October 2004.
[ch12biblio01entry02] 2 . “University of North Carolina Denies They Are Looking for Solaris 'Server 54'.” http://www.sun.com/smi/Press/sunflash/200105/sunflash.20010521.3.html. October 2004.
[ch12biblio01entry03] 3 . “Do You Copy? Security Issues with Digital Copiers.” September 16, 2000. http://www.giac.org/practical/Kevin_Smith_GSEC.DOC. October 2004.
[ch12biblio01entry04] 4 Security Wire Perspectives, , No. 74, September 27, 2004.
[ch12biblio01entry05] 5 . “Former Cisco Accountants Plead Guilty to Wire Fraud via Unauthorized ...
Get Inside Network Perimeter Security, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.