Endnotes

[1] Rittinghouse, John W., William M. Hancock, Cybersecurity Operations Handbook First ed. 2003 New York Digital Press

[2] See http://isc.sans.org/trends.html.

[3] Computer Security Institute. “2002 CSI/FBI Computer Crime and Security Survey.” Richard Power, 2003, at http://www.gocsi.com.

[4] Internet Fraud Complaint Center. “IFCC Annual Internet Fraud Report, January 1, 2001 to December 31, 2001,” at http://www1.ifccfbi.gov/strategy/statistics.asp.

[5] Garner Bryan A.,, Black’s Law Dictionary 7th ed. 1999 Cleveland, OH: West Group,

[6] Ibid.

[7] Ibid.

[8] Wells Joseph T., Gilbert Geis, Fraud Examiners Manual, 3rd ed. Vol. 1 1998 Fraud Examiners Manual, 3rd ed., Vol 1. Association of Certified Fraud Examiners, Inc

[9] See ...

Get Wireless Security: Know It All now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.