⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 http:^^www.columbia.edu^~cs1003^handouts^rfc1135

📁 This data set contains WWW-pages collected from computer science departments of various universities
💻 EDU^~CS1003^HANDOUTS^RFC1135
📖 第 1 页 / 共 5 页
字号:
   Gerrold, D., "When Harlie Was One", Ballentine Books, 1st Edition,   1972.   Gleissner, W., "A Mathematical Theory for the Spread of Computer   Viruses", Computers & Security, Vol. 8, No. 1, Pg. 35, 1 February   1989.   Greenberg, R., "Know thy Viral Enemy: It's More Important Than Ever   to Guard Your Data and Your System Against Infection by Computer   Viruses", Byte, Vol. 14, No. 6, Pg. 275, 1 June 1989.   Greenia, M., "Computer Security Information Sourcebook", Lexikon   Services, Sacramento, CA, 1989.   Harvard College, "Misuse of Computer Systems", Handbook for   Students", Pg. 85, Harvard College, 1987-1988.   Hawkins, C., "What Users Should Know About Computer Viruses",   Telecommunications, North American Edition, Vol. 23, No. 7, 1 July   1989.   Herrick, G., "Computer Viruses: Prevention is Better than Cure", TheReynolds                                                       [Page 23]RFC 1135           The Helminthiasis of the Internet       December 1989   Accountant's Magazine, Vol. 93, No. 992, Pg. 24, 1 March 1989.   Hertzoff, I., "Layer Your LAN", Security Management, Vol. 33, No. 9,   Pg. 201, 1 September 1989.   Highland, H., "Reports from the Victims", Computers & Security, Vol.   8, No. 2, Pg. 101, 1 April 1989.   Hispanic Business, "Consumer Showcase: Bits & Bytes: From   Thunderstorms to Disgruntled Employees to Computer Viruses, a Data   System's Vulnerability is Often Overlooked until Disaster Strikes",   Hispanic Business, Vol. 11, No. 8, Pg. 36, 1 August 1989.   Hoffer, J., and D. Straub, "The 9 to 5 Underground: Are You Policing   Computer Crimes?", Sloan Management Review, Vol. 30, No. 4, Pg. 35,   Summer 1989.   Hoffman, L., "Risk Analysis and Computer Security: Towards a Theory   at Last", Computers & Security, Vol. 8, No. 1, Pg 23, 1 February   1989.   Hospitals, "Information Management: Electronic Computer Viruses are   not Running Rampant in Hospital Information Systems, but Health Care   Executives are Entirely Too Lax About Computer System Security", Vol.   63, No. 11, Pg. 64, 5 June 1989.   Huband, F., and R. Shelton, Editors, "Protection of Computer Systems   and Software: New Approaches for Combating Theft of Software and   Unauthorized Intrusion", Papers presented at a workshop sponsored by   the National Science Foundation, 1986.   Hughes, W., "The Computer Fraud and Abuse Act of 1986, Congressional   Record (30 April 1986)", Washington, D.C., 30 April 1986.   Industry Week, "Computer Flu Is After You", Industry Week, Vol. 238,   No. 2, Pg. 39, 16 January 1989.   Information Executive, "Promoting Computer Ethics: The Next   Generation", Information Executive, Vol., 2, No. 4, Pg. 42, Fall   1989.   Information Hotline, "Plan to Combat Computer Viruses", Vol. 21, No.   8, Pg. 10, 1 October 1989.   Jamieson, R., and L. Graham, "Security and Control Issues in Local   Area Network Design, Computers & Security, Vol. 8, No. 4, Pg. 305, 1   June 1989.Reynolds                                                       [Page 24]RFC 1135           The Helminthiasis of the Internet       December 1989   Jander, M., "The Naked Network", Computer Decisions, Vol. 21, No. 4,   Pg. 39, 1 April 1989.   Joyce, E., "Time Bomb: Inside The Texas Virus Trial", Computer   Decisions, Vol. 20, No. 12, Pg. 38, 1 December 1988.   Keenan, T., "Emerging Vulnerabilities in Office Automation Security",   Computers & Security, Vol. 8, No. 3, Pg. 223, 1 May 1989.   Kellam-Scott, B., "Profile: Bellcore Computer and Network Security   Symposium", Bellcore Exchange, Vol. 5, No. 1, Pg. 24, 1 January 1989.   King, K., "Overreaction to External Attacks on Computer Systems Could   be More Harmful Than the Viruses Themselves", Chronicle of Higher   Education, Pg. A36, 23 November 1988.  Also in: Educom Bulletin, Vol.   23, No. 4, Pg. 5, Winter 1988   Kluepfel, H., "Computer Use and Abuse: Computer Systems and Their   Data are Vulnerable to Error, Omission, and Abuse", Security   Management, Vol. 33, No. 2, Pg. 72, 1 February 1989.   Kocher, B., "A Hygiene Lesson", Communications of the ACM, Vol. 32,   No. 6, Pg. 3, January 1989.   Kosko, J., "Computer Security Experts Advise Steps to Reduce the Risk   of Virus Attacks", Virus Discussion List, 22 September 1989.   Kruys, J., "Security of Open Systems", Computers & Security, Vol. 8,   No. 2, Pg. 139, 1 April 1989.   Lapsley, P., "'We are Under Attack. . .' (The Internet 'Worm': a   Chronology)", UNIX Review, Vol. 7, No. 1, Pgs. 69-70, 72-73, January   1989.   Lerner, E., "Computer Virus Threatens to Become Epidemic", Aerospace   America, Vol. 27, No. 2, Pg. 14, 1 February 1989.   Lewyn, M., and D. Carroll, "'Scary' Virus Clogs Top Computers", USA   Today, Section A, Col. 2, Pg. 1, 4 November 1988.   Lim, B., "Protection of Computer Programs Under the Computer Program   Protection Law of the Republic of Korea", Harvard International Law   Journal, Vol. 30, No. 1, Pg. 171, Winter 1989.   Lu, W., and M. Sundareshan, "Secure Communication in Internet   Environments: A Hierachical Key Management Scheme for End-to-End   Encryption", IEEE Transactions on Communications, Vol. 37, No. 10,   Pg. 1014, 1 October 1989.Reynolds                                                       [Page 25]RFC 1135           The Helminthiasis of the Internet       December 1989   Lunt, T., "Access Control Policies: Some Unanswered Questions",   Computers & Security, Vol. 8, No. 1, Pg. 43, 1 February 1989.   Lynn, M., "Ethical Responsibility Key to Computer Security", The   Educational Record, Vol. 70, No. 2, Pg. 36, Spring 1989.   Machalow, R., "Security for Lotus Files", Computers in Libraries,   Vol. 9, No. 2, Pg. 19, 1 February 1989.   Maher, J., and J. Hicks, "Computer Viruses: Controller's Nightmare",   Management Accounting, Vol. 71, No. 4, Pg. 44, 1 October 1989.   Markoff, J., "Author of Computer 'Virus' is Son of U.S.  Electronic   Security Expert", Pgs. A1, A7, The New York Times, 5 November 1988.   Markoff, J., "Computer Experts Say Virus Carried No Hidden Dangers",   The New York Times, 9 November 1988.   Markoff, J., "Computer Snarl: A 'Back Door' Ajar", Pg. B10, The New   York Times, 7 November 1988.   Markoff, J., "Learning to Love the Computer Whiz", The New York   Times, 8 November 1988.   Markoff, J., "The Computer Jam: How It Came About", The New York   Times, 9 November 1988.   Markoff, J., "U.S. is Moving to Restrict Access to Facts About   Computer Virus", Pg. A28, The New York Times, 11 November 1988.   Markoff, J., "'Virus' in Military Computers Disrupts Systems   Nationwide", The New York Times, 4 November 1988.   Marshall, E., "The Worm's Aftermath", Science, Vol. 242, Pg. 1121, 25   November 1988.   Martin, M., and R. Schinzinger, "Ethics in Engineering", McGraw Hill,   2nd Edition, 1989.   Martin, N., "Revenge of the Nerds", The Washington Monthly, Vol. 20,   No. 12, Pg. 21, 1 January 1989.   McAfee, J., "The Virus Cure", Datamation, Vol. 35, No. 4, Pg. 29, 15   February 1989.   McEwen, J., "Dedicated Computer Crime Units", Report Contributors: D.   Fester and H. Nugent, Prepared for the National Institute of Justice,   U.S. Department of Justice, by Institute for Law and Justice, Inc.Reynolds                                                       [Page 26]RFC 1135           The Helminthiasis of the Internet       December 1989   under contract number OJP-85-C-006, Washington, D.C., 1989.   Menkus, B., "It's Time to Rethink Data Processing Fire Protection",   Computers & Security, Vol. 8, No. 5, Pg. 389, 1 August 1989.   Menkus, B., "The Computer Virus Situation is not Encouraging",   Computers & Security, Vol. 8, No. 2, Pg. 115, 1 April 1989.   Menkus, B., "The Employee's Role in Protecting Information Assets",   Computers & Security, Vol. 8, No. 6, Pg. 487, 1 October 1989.   Menkus, B., "Understanding Password Compromise", Computers &   Security, Vol. 7, No. 6, Pg. 549, 1 December 1989.   Menkus, B., "U.S. Government Agencies Belatedly Address Information   System Security Issues", Computers & Security, Vol. 7, No. 4, Pg.   361, 1 August 1988.   Meredith, D., "Cornell Panel Concludes Morris Responsible for   Computer Worm", Cornell Chronicle, April 1989.   Miller, Jr., K., "Computer Viruses", Business and Economic Review,   Vol. 35, No. 4, Pg. 36, 1 June 1989.   Mizock, M., "Ethics--The Guiding Light of Professionalism", Data   Management, Vol. 24, No. 8, August 1986.   Modern Railroads, "How to Outwit Computer 'Hackers'", Modern   Railroads, Vol. 44, No. 3, Pg. 40, 1 February 1989.   Moir, D., "Maintaining System Security", Dr. Dobb's Journal of   Software Tools for the Pro, Vol. 14, No. 6, Pg. 75, 1 June 1989.   Munro, N., "Big Guns Take Aim at Virus", Government Computer News,   Vol. 7, No. 24, Pgs. 1, 100, November 1988.   National Computer Security Center, "Proceedings of the Virus Post-   Mortem Meeting", NCSC, St. George Meade, MD, 8 November 1988.   National Institute of Standards and Technology, "Computer Viruses and   Related Threats: A Management Guide", NIST Special Publication 500-   166, August 1989.   Neumann, P., Editor, "Forum of Risks to the Public in Computers and   Related Systems", Vol. 7, No. 69, ACM Committee on Computers and   Public Policy, 3 November 1988.   Newhouse News Service, "Congressmen Plan Hearings on Virus", TheReynolds                                                       [Page 27]RFC 1135           The Helminthiasis of the Internet       December 1989   Seattle Times, Pg. B2, 27 November 1988.   NSF Network Service Center (NNSC), "Internet Computer Virus Update",   NSFNET, Cambridge, MA, 4 November 1988.   Ostapik, F., "The Effect of the Internet Worm on Network and Computer   Security", Connextions, Vol. 3, No. 9, Pgs. 16-17, September 1989.   Ostrow, R., and T. Maugh II, "Legal Doubts Rise in Computer Virus   Case", Los Angeles Times, Part I, Col. 1, Pg. 4, 9 November 1988.   Page, B., "A Report on the Internet Worm", University of Lowell,   Computer Science Department, 7 November 1988.   Palmore, T., "Computer Bytes: Viruses and Vaccines", TechTrends, Vol.   34, No. 2, Pg. 26, 1 March 1989.   Parker, D., "Fighting Computer Crime", Scribner, New York, 1983.   PC Week, "'Worm' Attacks National Network", Pg. 8, 7 November 1988.   Perry, W., "Why Software Defects So Often Go Undiscovered",   Government Computer News, Vol. 7, No. 24, Pg. 85, 21 November 1988.   Peterson, I., "Worming into a Computer's Vulnerable Core", Science   News, Volume #134, 12 November 1988.   Phelps, E., "Bug Bytes", Security Management, Vol. 33, No. 9, Pg. 85,   1 September 1989.   Presstime, "Contagious Communication", Presstime, Vol. 11, No. 3,   March 1989.   Radai, Y., "The Israeli PC Virus", Computers & Security, Vol. 8, No.   2, Pg. 111, 1 April 1989.   Reese, L., "Of MICE and Men", Security Management, Vol. 33, No. 9,   Pg. 89, 1 September 1989.   Resource Management, "Computer Viruses: Background and   Recommendations for Keeping Software Healthy are Detailed", Resource   Management, Pg. 8, 1 July 1989.   Richards, T., and R. Knotts, "Top Management's View of Computer   Related Fraud", Sig Security, Audit & Control Review, Vol. 6, No. 4,   Pg. 34, Winter 1989.   Rivera, A., "Computer Viruses: A Different Perspective", DataReynolds                                                       [Page 28]RFC 1135           The Helminthiasis of the Internet       December 1989   Processing & Communications Security, Vol. 13, No. 1, Winter 1989.   Rowe, J., Shelton, C., and M. Krohn, "Avoiding Computer Viruses",   Business Education Forum, Vol. 44, No. 2, Pg. 17, 1 November 1989.   Royko, M., "Here's How to Stop Computer Vandals", Chica

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -