"Unleash your creativity and unlock your potential with MsgBrains.Com - the innovative platform for nurturing your intellect." » English Books » ,,Underground: Hacking, Madness, and Obsession on the Electronic Frontier'' by Suelette Dreyfus🌏🗺️

Add to favorite ,,Underground: Hacking, Madness, and Obsession on the Electronic Frontier'' by Suelette Dreyfus🌏🗺️

Select the language in which you want the text you are reading to be translated, then select the words you don't know with the cursor to get the translation above the selected word!




Go to page:
Text Size:

——, Annual Report 1993-1994, Canberra, 1994.

Bourne, Philip E., `Internet security; System Security', DEC

Professional, vol. 11, June 1992.

Cerf, Vinton G., `Networks', Scientific American, vol. 265, September 1991.

Clyde, Robert A., `DECnet security', DEC Professional, vol. 10, April 1991.

Commonwealth Attorney-General's Department, Interim Report on Computer

Crime (The Gibbs Report), Canberra, 1988.

Commonwealth Director of Public Prosecutions (DDP), Annual Report 1993-1994, Canberra, 1994.

Commonwealth Scientific and Industrial Research Organisation (CSIRO),

Annual Report 1994-1995, Canberra, 1995.

Davis, Andrew W., `DEC Pathworks the mainstay in Mac-to-VAX connectivity', MacWeek, vol. 6, 3 August 1992.

Department of Foreign Affairs and Trade, Australian Treaty Series 1993, no. 40, Australian Government Publishing Service, Canberra, 1993.

Digital Equipment Corporation, Annual Report 1989, Securities and

Exchange Commission (SEC) Online (USA) Inc., 1989.

——, Quarterly Report for period ending 12.31.89, SEC Online (USA).

Gezelter, Robert, `The DECnet TASK object; Tutorial', Digital Systems

Journal, vol. 16, July 1994.

Gianatasio, David, `Worm infestation hits 300 VAX/VMS systems worldwide via DECnet', Digital Review, vol. 6, 20 November 1989.

Haffner, Katie & Markoff, John, Cyberpunk, Corgi Books (Transworld),

Moorebank NSW, 1994.

Halbert, Debora, `The Potential for Modern Communication Technology to

Challenge Legal Discourses of Authorship and Property', Murdoch

University E-Law Journal, vol. 1, no. 2.

Kelman, Alistair, `Computer Crime in the 1990s: A Barrister's View',

Paper for the Twelfth International Symposium on Economic Crime,

September 1994.

Law Commission (UK) Working Paper, no. 110, 1988.

Lloyd, J. Ian & Simpson, Moira, Law on the Electronic Frontier, David

Hume Institute, Edinburgh, 1996.

Longstaff, Thomas A., & Schultz, E. Eugene, `Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code', Computers & Security, vol. 12, February 1993.

Loundy, David J., `Information Systems Law and Operator Liability Revisited', Murdoch University E-Law Journal, vol. 1, no. 3, September 1994.

McMahon, John, `Practical DECnet security', Digital Systems Journal, vol. 14, November 1992.

Melford, Robert J., `Network security; computer networks', Internal

Auditor, Institute of Internal Auditors, vol. 50, February 1993.

Natalie, D. & Ball, W, EIS Coordinator, North Carolina Emergency Management, `How North Carolina Managed Hurricane Hugo', EIS News, vol. 3, no. 11, 1988.

NorTel Australia Pty Ltd, Discovering Tomorrow's Telecommunications

Solutions, Chatswood, NSW (n.d.).

Northern Telecom, Annual Report 1993, Ontario, 1993.

Slatalla, Michelle & Quittner, Joshua, Masters of Deception,

HarperCollins, New York, 1995.

Are sens

Copyright 2023-2059 MsgBrains.Com