Endnotes
[1] Rittinghouse, John W., William M. Hancock, Cybersecurity Operations Handbook First ed. 2003 New York Digital Press
[2] See http://isc.sans.org/trends.html.
[3] Computer Security Institute. “2002 CSI/FBI Computer Crime and Security Survey.” Richard Power, 2003, at http://www.gocsi.com.
[4] Internet Fraud Complaint Center. “IFCC Annual Internet Fraud Report, January 1, 2001 to December 31, 2001,” at http://www1.ifccfbi.gov/strategy/statistics.asp.
[5] Garner Bryan A.,, Black’s Law Dictionary 7th ed. 1999 Cleveland, OH: West Group,
[6] Ibid.
[7] Ibid.
[8] Wells Joseph T., Gilbert Geis, Fraud Examiners Manual, 3rd ed. Vol. 1 1998 Fraud Examiners Manual, 3rd ed., Vol 1. Association of Certified Fraud Examiners, Inc
[9] See ...
Get Wireless Security: Know It All now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.