O'Reilly logo

Network Defense and Countermeasures: Principles and Practices, Second Edition by William Easttom II

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix A. References

Chapter 1

100th Congress. Computer Security Act of 1987. Public Law 100-235. www.epic.org/crypto/csa/csa.html (accessed June 2004).

CERT. Denial of Service Attacks. www.cert.org/tech_tips/denial_of_service.html (accessed August 2003).

CNN/Technology. Hacker Accesses 5.6 Million Credit Cards. February 18, 2003. www.cnn.com/2003/TECH/02/17/creditcard.hack/index.html (accessed 15 December 2004).

Computer Security Institute. Cyber Crime Bleeds U.S. Corporations, Survey Shows; Financial Losses from Attacks Climb for Third Year in a Row. April 7, 2002. www.gocsi.com/press/20020407.jhtml; jsessionid=J5CTJV4ZKSD3MQSNDBGCKHSCJUMEKJVN?_requestid=219439 (accessed 15 December 2004).

DefCon II. Wardriving Statistics. Las Vegas, NV. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required