Computer
Crime and Security
Tracer Bullet 94-1 |
|
Unless otherwise noted, the Internet sites listed in this directory
are provided by organizations other than the Library of Congress.
These links are being offered as a convenience and for informational
purposes only; they do not constitute an endorsement or an approval
by the Library of Congress of any of the products, services, or opinions
of the corporation, organization or individual. The Library of Congress
bears no responsibility for the accuracy, legality, or content of
the external site or for that of subsequent links. Contact the external
site for answers to questions regarding its content.
High technology has become commonplace in today's environment,
and it is no surprise that it has also found its way into the
criminal domain. For a new breed of criminals, computers are rapidly
becoming the "weapon of choice." There are four major
categories of computer crime: internal computer crimes--trojan
horses, logic bombs, trap doors, worms, and viruses; telecommunications
crimes--phreaking and hacking; computer manipulation crimes that
result in embezzlement and fraud; and traditional thefts of hardware
and software. Not surprisingly, new computer crimes are stimulating
innovative ways to combat it, giving rise to a wide range of advanced
computer security systems and techniques as well as the rapid
development of computer-related laws and legislation.
This guide to materials about computer crime and security updates
and replaces TB 85-4. Not meant to be a comprehensive bibliography,
this Tracer Bullet is designed -- as the name of the series implies
-- to put the reader "on target."
TOP OF PAGE
Beekman, George. Computer security and risks. In his
Computer currents: navigating tomorrow's technology. Redwood
City, Calif., Benjamin/Cummings Pub. Co., c1994. p. 280-297.
QA76.5.B3653 1994 and Pamphlet box <SciRR>
Includes bibliographical references.
Cardinali, Richard. Anatomy of a bug: understanding
the computer virus. Computer education, no. 74, June 1993:
12-15.
QA76.27.C65 and Pamphlet box <SciRR>
Hartson, H. Rex. Computer security. In McGraw-Hill
encyclopedia of science and technology. v. 4. 6th ed. New York,
McGraw-Hill Book Co., c1987. p. 274-276.
Q121.M3 1987 <SciRR>
Parker, Donn B. Crime. In Encyclopedia of computer
science and technology. v. 6. New York, Marcel Dekker, Inc.,
c1977. p. 383-403.
QA76.15.E5 <SciRR>
TOP OF PAGE
Subject headings used by the Library of Congress,
under which books on computer security can be located in most card,
book, and online catalogs, include the following:
COMPUTERS--ACCESS CONTROL (Highly relevant)
COMPUTER SECURITY--UNITED STATES (Highly relevant)
See also the subdivision "Security Measures"
under names of individual computers, e.g. "IBM Computers--Security
Measures"
COMPUTER VIRUSES--UNITED STATES (Highly relevant)
COMPUTER CRIMES--UNITED STATES (Highly relevant)
COMPUTERS--LAW AND LEGISLATION (Highly relevant)
DATA PROTECTION (Highly relevant)
ELECTRONIC DATA PROCESSING DEPARTMENTS--SECURITY MEASURES (Relevant)
COMPUTER SECURITY--GOVERNMENT POLICY--UNITED STATES (Relevant)
COMPUTERS--ACCESS CONTROL--GOVERNMENT POLICY--UNITED STATES (Relevant)
CRYPTOGRAPHY (Related)
DATA BASE SECURITY (Related)
PRIVACY, RIGHT OF (Related)
TELECOMMUNICATION--LAW AND LEGISLATION--UNITED STATES (Related)
TOP OF PAGE
Caelli, William, Dennis Longley, and Michael Shain.
Information security handbook. Basingstoke, Hants, England,
Macmillan Publishers; New York, Stockton Press, 1991. 833 p.
QA76.9.A25C34 1991
Carroll, John Millar. Computer security. 2nd
ed. Boston, Butterworths, c1987. 446 p.
HF5548.2.C29 1987 <SciRR>
Bibliography: p. 431-436
Computers under attack: intruders, worms, and viruses.
Edited by Peter J. Denning. New York, ACM Press; Reading, Mass.,
Addison-Wesley, c1990. 554 p.
Includes bibliographical references.
QA76.9.A25C667 1990 <SciRR>
Defending secrets, sharing data: new locks and
keys for electronic information. Washington, Congress of the
U.S., Office of Technology Assessment, U.S. Govt. Print. Off., 1987.
187 p.
QA76.9.A25D44 1987
"Second component of OTA's assessment of
new communications technologies. The first component, The Electronic
supervisor: new technologies, new tensions, was published in September
1987."
Includes bibliographical references.
Supt. of Docs. no.: Y 3.T 22/2: D 36
TOP OF PAGE
Computer security products buyers guide. 1992-
San Francisco, Calif., Computer Security Institute. annual
QA76.9.A25B89 <SciRR Computer Shelf>
Hruska, Jan. Computer viruses and anti-virus warfare.
2nd rev. ed. New York, Ellis Horwood, 1992. 224 p.
QA76.76.C68H78 1992
Includes bibliographical references.
McAfee, John, and Colin Haynes. Computer viruses,
worms, data diddlers, killer programs, and other threats to your
system: what they are, how they work, and how to defend your PC,
Mac, or mainframe. New York, St. Martin's Press, c1989. 235
p.
QA76.76.C68M38 1989 <MRCRR>
Nechvatal, James. Public-key cryptography: computer
security. Gaithersburg, Md., U.S. Dept. of Commerce, National
Institute of Standards and Technology, Washington; U.S. Govt. Print.
Off., 1991. 162 p. (NIST special publication, 800-2)
QC100.U57 no. 800-2
Bibliography: p. 147-162.
Perry, Robert Louis. Computer crime. New York,
F. Watts, 1986. 65 p.
KF9350.Z9P47 1986
Bibliography: p. 61-62.
Examines legal and ethical problems involving
computer use, including piracy of hardware and software and the
theft of information and electronic funds.
Stang, David J. Network security. 6th ed. Washington,
International Computer Security Association, 1992. 298 p.
TK5105.5.S764 1992 <SciRR>
Includes bibliographical references.
See especially p. 49-82, "Regulations, Standards,
& Security," and p. 256-272, "Glossary of Networking
Terms."
Wack, John P., and Lisa J. Carnahan. Computer viruses
and related threats: a management guide. Gaithersburg, Md.,
U.S. Dept. of Commerce, National Institute of Standards and Technology;
Washington, U.S. Govt. Print. Off., 1989. 1 v. (various pagings)
(NIST special publication, 500-166. Computer systems technology)
QC100.U57 no. 500-166 <SciRR>
Bibliography: p. A1, B1-B2.
TOP OF PAGE
Abrams, Marshall D., and Harold J. Podell. Tutorial
computer and network security. Washington, IEEE Computer Society
Press; Los Angeles, Calif., c1987. 430 p.
Bibliography: p. 425-430.
QA76.9.A25A27 1987
See especially p. 413-424 "Glossary"
and p. 429-430, "Recommended Readings."
BloomBecker, Buck. Spectacular computer crimes:
what they are and how they cost American business half a billion
dollars a year! Homewood, Ill., Dow Jones-Irwin, c1990. 242
p.
HV6773.2.B55 1990
Forester, Tom, and Perry Morrison. Computer ethics:
cautionary tales and ethical dilemmas in computing. 2nd ed.
Cambridge, Mass., MIT Press, c1994. 347 p.
QA76.9.M65F67 1994
Bibliography: p. 307-331.
Hafner, Katie, and John Markoff. Cyberpunk: outlaws
and hackers on the computer frontier. New York, Simon &
Schuster, c1991. 368 p.
QA76.9.A25H34 1991
Bibliography: p. 347-351.
Landreth, Bill. Out of the inner circle: the true
story of a computer intruder capable of cracking the nation's most
secure computer systems. Redmond, Wash., Tempus Books; New York,
distributed in the U.S. by Harper & Row, c1989. 230 p.
HF5548.37.L36 1989
Levy, Steven. Hackers: heroes of the computer revolution.
Garden City, N.Y., Anchor Press/Doubleday, 1984. 458 p.
QA76.6.L469 1984
Bibliography: p. 441-444.
Lundell, Allan. Virus! the secret world of computer
invaders that breed and destroy. Chicago, Contemporary Books,
c1989. 189 p.
QA76.76.C68L86 1989
Bibliography: p. 176.
Mungo, Paul, and Bryan Clough. Approaching zero:
the extraordinary underworld of hackers, phreakers, virus writers,
and keyboard criminals. New York, Random House, 1992. 247 p.
HV6773.M86 1992
Bibliography: p. 245-247.
Sterling, Bruce. The hacker crackdown: law and
disorder on the electronic frontier. New York, Bantam Books,
1992. 328 p.
HV6773.2.S74 1992
Stoll, Clifford. The cuckoo's egg: tracking a spy
through the maze of computer espionage. New York, Doubleday,
c1989. 326 p.
UB271.R92H477 1989
Bibliography: p. 325-326.
Wrobel, Leo Anthony. Writing disaster recovery
plans for telecommunications networks and LAN. Boston, Artech
House, c1993. 138 p.
TK5102.5.W77 1993
TOP OF PAGE
Computer Viruses
Burger, Ralf. Computer viruses and data protection. Grand
Rapids, Mich., Abacus, c1991. 353 p.
QA76.76.C68B88 1991 <SciRR> <MRCRR>
Ferbrache, David. A pathology of computer viruses.
London; New York, Springer-Verlag, c1992. 299 p.
QA76.76.C68F45 1991 <SciRR>
Bibliography: p. 283-290.
See especially p. 272-278, "Appendix 14 -
Contact Points".
Fites, Philip E., Peter Johnston, and Martin P. J.
Kratz. The computer virus crisis. 2nd ed. New York, Van Nostrand
Reinhold, c1992. 399 p.
QA76.76.C68F57 1992 <SciRR> <MRCRR>
Bibliography: p. 375-385.
Leiss, Ernst L. Software under siege: viruses and
worms. Oxford, Eng., Elsevier Advanced Technology, c1990. 132
p.
QA76.76.C68L45 1990
Bibliography: p. 125-130.
Louw, Eric, and Neil M. Duffy. Managing computer
viruses. Oxford; New York, Oxford University Press, 1992. 171
p.
QA76.76.C68L68 1992 <MRCRR>
Bibliography: p. 123-133.
Roberts, Ralph. Compute!'s Computer viruses.
Greensboro, N.C., Compute! Books, c1988. 170 p.
QA76.76.C68R62 1988 <SciRR>
Rogue programs: viruses, worms, and Trojan horses.
Edited by Lance J. Hoffman. New York, Van Nostrand Reinhold, c1990.
384 p.
Includes bibliographical references.
QA76.76.C68R64 1990 <MRCRR>
Stang, David J. Field guide to computer viruses.
2nd ed. Washington, Virus Research Center of the International Computer
Security Association, c1992. 567 p.
QA76.76.C68S734 1992
Networks
Davies, Donald Watts, and W. L. Price. Security
for computer networks: an introduction to data security in teleprocessing
and electronic funds transfer. 2nd ed. Chichester, Eng.; New
York, Wiley, c1989. 377 p.
TK5105.D43 1989
Includes bibliographical references.
Davis, Peter T. Complete LAN security control.
New York, Windcrest/ McGraw-Hill, c1994. 330 p.
TK5105.7.D384 1994
Bibliography: p. 280-291.
Devargas, M. Network security. Manchester,
Eng., NCC Blackwell, c1993. 152 p.
QA76.9.A25D5 1993
Includes bibliographical references.
Muftic, Sead, and Per Christoffersson. Security
mechanisms for computer networks. Chichester, Eng., Ellis Horwood;
New York, Halsted Press, 1989. 195 p.
QA76.9.A25M84 1989
Bibliography: p. 182-189.
Peltier, Thomas R. Policies & procedures for
data security: a complete manual for computer systems and networks.
San Francisco, Miller Freeman Inc., c1991. 168 p.
QA76.9.A25P47 1991
Bibliography: p. 157.
Purser, Michael. Secure data networking. Boston,
Artech House, c1993. 241 p.
TK5105.5.P87 1993
Bibliography: p. 233-235.
See p. 233-235 for a list of relevant standards
from ANSI, CCITT, CCMA, ISO, and other standards organizations.
Schweitzer, James A. Protecting information on
local area networks. Boston, Butterworths, c1988. 138 p.
TK5105.7.S39 1988
Bibliography: p. 107-108.
Security in communications networks: conference
transcript, 9th September 1986, London. London, IBC Technical
Services, c1986. 144 p.
TK5102.5S39 1986
Includes bibliographical references
Laws and Legislation
American Bar Association. Task Force on Computer Crime.
Report on computer crime. Washington, The Task Force, 1984.
51, 12, 6 p.
HV6773.A44 1984
Includes bibliographical references.
Bequai, August. Technocrimes. Lexington, Mass.,
Lexington Books, c1987. 192 p.
HV6773.B48 1987
Bibliography: p. 181.
Branscomb, Anne W. Rogue computer program--viruses,
worms, Trojan horses, and time bombs: prank, prowess, protection
or prosecution? Cambridge, Mass., Program on Information Resources
Policy, Harvard University, Center for Information Policy Research,
c1989. 83 p. (Incidental paper, 1-89-3 (Sept. 1989))
KF390.5.C6B68 1989
Errata slip inserted.
Bibliography: p. 75-83.
The Computer and the law. Compiled and edited
by Irving J. Sloan. London, New York, Oceana Publications, 1984.
141 p. (Legal almanac series, no. 83)
KF9350.C64 1984
Computer crime: electronic fund transfer systems
and crime. Prepared by Kent W. Colton and others. Washington,
U.S. Dept. of Justice, Bureau of Justice Statistics, U.S. Govt.
Print. Off., 1982. 182 p.
HV6769.C64 1982
"Prepared for the Bureau of Justice Statistics,
U.S. Department of Justice by Public Systems Evaluation, Inc., and
supported by grant number 80-BJ-CX-0026."
Bibliography: p. 125-137.
Supt. of Docs. no.: J 29.2:El 2
Guide to the prosecution of telecommunication fraud
by the use of computer crime statutes. Chicago, Section of Science
and Technology,
American Bar Association, c1989. 33 p.
KF9350.Z9G85 1989
Perry, William E. Understanding computer crime.
Editor, Joyce W. Masterson. Dallas, Tex., Chantico Pub. Co., c1986.
75 p. (Critical technology report, no. C-11-86)
HV6773.2.P47 1986
Bibliography: p. 72-75.
Prevention and prosecution of computer and high
technology crime. Stanley S. Arkin and others. New York, M.
Bender, 1988- 1 v. (loose-leaf)
KF9350.P74 1988
United States. Congress. House. Committee on the Judiciary.
Subcommittee on Criminal Justice. Computer virus legislation:
hearing before the Subcommittee on Criminal Justice of the Committee
on the Judiciary, House of Representatives, One Hundred First Congress,
first session, on H.R. 55 and H.R. 287 ... November 8, 1989. Washington,
U.S. Govt. Print. Off., 1990. 128 p.
KF27.J859 1989b
Includes bibliographical records.
TOP OF PAGE
Cobb, Stephen. The Stephen Cobb complete book
of PC and LAN security. Blue Ridge Summit, Pa., Windcrest; TAB,
Software Dept. [distributor], c1992. 556 p.
TK5105.7.C62 1990 <SciRR>
Bibliography: p. 546.
Computer virus desk reference. Homewood, Ill.,
Business One Irwin. 1992- annual.
QA76.76.C68C66 <SciRR>
Haynes, Colin. The computer virus protection handbook.
San Francisco, SYBEX, c1990. 192 p. + 1 computer disk (5 1/4 in.)
QA76.76.C68H39 1990 <SciRR> <MRCRR>
System requirements for computer disk (ViruScan
and Virus simulation suite): IBM PC or clone; DOS; floppy or hard
disk system.
For computer disk see <MRCRR>.
Highland, Harold Joseph. Computer virus handbook.
Oxford, Eng., Elsevier Advanced Technology, c1990. 375 p.
QA76.76.C68H54 1990
Includes bibliographical references.
Levin, Richard B. The computer virus handbook.
Berkeley, Osborne McGraw-Hill, c1990. 411 p.
QA76.76.C68L48 1990 <MRCRR>
Parker, Donn B. Computer crime: criminal justice
resource manual. Report contributors, David C. Smith, Geoffrey
W. Turner, Sanford Sherizan [i.e. Sherizen]. 2nd ed. Washington,
U.S. Dept. of Justice, National Institute of Justice, Office of
Justice Programs, 1989. 221 p.
HV6773.P36 1989 <SciRR>
Bibliography: 137-138.
Supt. of Docs. no.: J 28.23:C 73/4
See especially p. xiii-xx, "Glossary of technical
terms."
Stang, David J. ICSA's computer virus handbook.
2nd ed. Washington, Virus Research Center of the International Computer
Security Association, c1992. 224 p.
QA76.76.C68I37 1992
Rev. ed. of Computer viruses, 1991.
Bibliography: p. 197-199.
TOP OF PAGE
Conference Papers Index (1978- )
Z7403.C84 <SciRR A&I>
Directory of Published Proceedings. Series SEMT:
Science / engineering / medicine / technology. (1965- )
Z7409.D56 <SciRR A&I>
Index to Scientific & Technical Proceedings
(1978- )
Z7403.I4 <SciRR A&I>
Proceedings in Print (1964- )
Z7503.A2P7 <SciRR A&I>
TOP OF PAGE
Aerospace Computer Security Applications Conference.
Proceedings. Washington, IEEE Computer Society Press, 1985-
annual.
QA76.9.A25A38a
Computer Security Foundations Workshop (6th, 1993,
Franconia, N.H.). Computer Security Foundations Workshop VI:
proceedings: Franconia, New Hampshire, June 15-17, 1993. Sponsored
by the IEEE Computer Society. Los Alamitos, Calif., IEEE Computer
Society Press, c1993. 163 p.
QA76.9.A25C638 1991
Includes bibliographical references.
European Symposium on Research in Computer Security
(2nd, 1992, Toulouse, France). Computer security, ESORICS 92:
Second European Symposium on Research in Computer Security, Toulouse,
France, November 23-25, 1992: proceedings. Y. Deswarte, G. Eizenberg,
J.-J. Quisquater, eds. Berlin; New York, Springer-Verlag, c1992.
450 p. (Lecture notes in computer science, 648).
QA76.9.A25E98 1992
Includes bibliographical references.
IFIP TC11 International Conference on Information
Security (8th, 1992, Singapore). IT security: the need for international
cooperation: proceedings of the IFIP TC11 Eighth International Conference
on Information Security, IFIP/Sec '92, Singapore, 27-29 May 1992.
Edited by Guy G. Gable, William J. Caelli. Amsterdam; New York,
North-Holland, 1992. 495 p. (IFIP transactions. A, Computer science
and technology, A-15)
QA76.9.A25I45 1992
Includes bibliographical references.
International Carnahan Conference on Security Technology.
Proceedings. Lexington, KY, OES Publications, 1933- annual.
TH9701.I56a
IEEE Computer Society Symposium on Research in
Security and Privacy. Proceedings. Los Alamitos, Calif., IEEE
Computer Society Press, 1986 - annual.
QA76.9.A25S94a
Symposium on Computer Security: Threats and Countermeasures
(1990: Rome, Italy). Symposium on Computer Security: Threats
and Countermeasures: Rome, Italy, November 22-23, 1990: proceedings.
Rome, Italy, Fondazione Ugo Bordoni, 1991. 207 p.
QA76.9.A25S936 1990
Includes bibliographical references.
Workshop LANSEC '89 (1989, Karlsruhe, Germany). Local
area network security: Workshop LANSEC '89, European Institute for
System Security (E.I.S.S.), Karlsruhe, FRG, April 3-6, 1989: proceedings.
T. A. Berson, T. Beth (eds.). Berlin, New York, Springer-Verlag,
c1989. 152 p. (Lecture notes in computer science, 396)
TK5105.7.W65 1989
Includes bibliographical references.
World Conference on Computer Security, Audit, and
Control (9th, 1992, London, England). Proceedings of Compsec
International 1992. Oxford, Eng., Elsevier Advanced Technology,
c1992. 494 p.
QA76.9.A25W68 1992
Includes bibliographical references
TOP OF PAGE
Beasley Library. Computers and the law: an annotated
bibliography of materials in the Beasley Library of the University
of Western Australia. Compiled by Paul Genoni. Perth, Library of
the University of Western Australia, c1984. 48 p.
Includes bibliographical references.
K564.C6A12 1984
Annotated listing of all books on computers and
the law held in the Beasley Library of the University of Western
Australia.
Best, Reba A., and D. Cheryn Picquet. Computer
crime, abuse, liability, and security: a comprehensive bibliography,
1970-1984. Jefferson, N.C., McFarland, c1985. 155 p.
Z5703.4.C63B47 1985
Best, Reba A., and D. Cheryn Picquet. Computer
law and software protection: a bibliography of crime, liability,
abuse, and security, 1984 through 1992. Jefferson, N.C.; London,
McFarland, 1993. 239 p.
K564.C6A125 1993 <SciRR>
Continuation of: Computer crime, abuse, liability,
and security, published in 1985.
Bibliography of selected computer security publications,
January 1980-October 1989: computer security. Rein Turn, compiler;
Lawrence E. Bassham, editor. Gaithersburg, Md., U.S. Dept. of Commerce,
National Institute of Standards and Technology; Washington, U.S.
Govt. Print. Off., 1990. 1 v. (various pagings) (NIST special publication,
800-1)
QC100.U57 no. 800-1 <SciRR>
Deighton, Suzan. Privacy and computers: a bibliography.
London, The Library, Institution of Electrical Engineers, 1978.
97 p.
Z7164.L6D38
Deighton, Suzan. The new criminals: a bibliography
of computer related crime. London, Institution of Electrical
Engineers, 1978. 23 p.
Z5703.4.C63D44
Flaherty, David H. Privacy and data protection:
an international bibliography. With the assistance of Terence
J. Donohue and Peter J. Harte. White Plains, N.Y., Knowledge Industry
Publications, 1984. 276 p.
Z7164.L6F57 1984
Galin, Joseph J. Computers and the law: a selected
bibliography. Monticello, Ill., Vance Bibliographies, 1985.
13 p. (Public administration series--bibliography, P-1627)
KF390.5.C6A124 1985
LaGasse, Charles E. The computer resource guide.
1988 ed. Concord, Mass., Computer Insights, c1987. 84 p.
Z5640.L34 1987
Lin, Joseph C. Computer crime, security, and privacy:
a selected bibliography. Monticello, Ill., Vance Bibliographies,
1979. 22 p. (Public administration series--bibliography, P-284)
Z5703.4.C63L56
MacCafferty, Maxine. Computer security. London,
Aslib, 1976. 91 p. (Aslib bibliography; no. 4)
Z5640.M32
Vance, Mary A. Computer crime. Rev. ed. of
P 1255. Monticello, Ill., Vance Bibliographies, 1988. 35 p. (Public
administration series--bibliography, P-2355)
Z5703.4.C63V36 1988
TOP OF PAGE
CIS Index to Publications of the United States
Congress (1970- )
KF49.C62 <MRR> <N&CPR> and CD-ROM
<MRR>
Monthly Catalog of United States Government Publications
(1895- )
Z1223.A18 <SciRR> <MRR> and CD-ROM
<N&CPR>
TOP OF PAGE
United States. Congress. House. Committee on Energy
and Commerce. Subcommittee on Telecommunications and Finance. Computer
viruses: hearing before the Subcommittee on Telecommunications and
Finance of the Committee on Energy and Commerce, House of Representatives,
One Hundred First Congress. Washington, U.S. Govt. Print. Off.,
1989-1990. 2 v.
KF27.E555 1989h
Includes bibliographical references.
Supt. of Docs. no.: Y 4.En 2/3:101-71
United States. Congress. House. Committee on Science,
Space, and Technology. Subcommittee on Technology and Competitiveness.
Computer security: hearing before the Subcommittee on Technology
and Competitiveness of the Committee on Science, Space, and Technology,
U.S. House of Representatives, One Hundred Second Congress, first
session, June 27, 1991. Washington, U.S. Govt. Print. Off.,
1991. 157 p.
KF27.S39955 1991i
Includes bibliographical references.
Supt. of Docs. no.: Y 4.Sci 2:102/42
United States. Congress. House. Committee on Science,
Space, and Technology. Subcommittee on Technology and Competitiveness.
Computer Security Act of 1987: report. Prepared by the Subcommittee
on Technology and Competitiveness; transmitted to the Committee
on Science, Space, and Technology, House of Representatives, One
Hundred Second Congress, second session. Washington, U.S. Govt.
Print. Off., 1992. 15 p.
KF390.5.C6A25 1992
Includes bibliographical references.
Supt. of Docs. no.: Y 4.Sci 2:102/M
United States. Congress. House. Committee on Science,
Space, and Technology. Subcommittee on Transportation, Aviation,
and Materials. Implementation of the Computer Security Act: hearing
before the Subcommittee on Transportation, Aviation, and Materials
of the Committee on Science, Space, and Technology, House of Representatives,
One Hundredth Congress, second session, September 22, 1988.
Washington, U.S. Govt. Print. Off., 1989. 112 p.
KF27.S3997 1988i
Supt. of Docs. no.: Y 4.Sci 2:100/146
United States. Congress. House. Committee on Small
Business. Subcommittee on Regulation and Business Opportunities.
Small business and computer crime: hearing before the Subcommittee
on Regulation and Business Opportunities of the Committee on Small
Business, House of Representatives, One Hundredth Congress, first
session, Washington, DC, November 16, 1987. Washington, U.S.
Govt. Print. Off., 1988. 120 p.
KF27.S675 1987b
Bibliography: p. 119-120.
Supt. of Docs. no.: Y 4.Sm 1:100-38
United States. Congress. Senate. Committee on the
Judiciary. Subcommittee on Technology and the Law. The Computer
Abuse Amendments Act of 1990: hearing before the Subcommittee on
Technology and the Law of the Committee on the Judiciary, United
States Senate, One Hundred First Congress, second session, on S.
2476 ... July 31, 1990. Washington, U.S. Govt. Print. Off.,
1991. 110 p. (Senate hearing, 101-1276)
KF26.J8745 1990
Bibliography: p. 81-87.
Supt. of Docs. no.: Y 4.J 89/2:Shrg.101-1276
United States. Congress. Senate. Committee on the
Judiciary. Subcommittee on Technology and the Law. Computer viruses:
hearing before the Subcommittee on Technology and the Law of the
Committee on the Judiciary, United States Senate, One Hundred First
Congress, first session, on the impact of computer viruses and other
forms of computer sabotage or exploitation on computer information
systems and networks, May 15, 1989. Washington, U.S. Govt. Print.
Off., 1991. 94 p. (Senate hearing, 101-1267)
KF26.J8745 1989
Includes bibliographical references.
United States. General Accounting Office. Computer
security: virus highlights need for improved internet management:
report to the chairman, Subcommittee on Telecommunications and Finance,
Committee on Energy and Commerce, House of Representatives.
United States General Accounting Office. Washington, GAO, 1989.
48 p.
QA76.76.C68U55 1989
TOP OF PAGE
Abstracting and Indexing Services that index relevant
journal articles and other literature are listed below. Suggested
terms are given as aids in searching. Note: See a Science reference
librarian for location of indexes in the Science Reading Room
ABI/Inform
CD-ROM <B&E> <N&CPR>
See: Computer Privacy
Computer Security
Computer Viruses
Data Encryption
Crime
ACM Guide to Computing Literature (1977- )
QA75.5.A75a <SciRR A&I>
See: (in key word index)
Crime
Encryption
Privacy
Security
Viruses
Applied Science and Technology Index (1913-
)
Z7913.I7 <SciRR A&I> <MRR> <N&CPR>
and CD-ROM <SciRR>
See: Computer Crimes
Computer Fraud
Computer Networks--Access Control
Computer Viruses
Cryptography
Electronic Data Processing
Right of Privacy
Computer Abstracts (1957- )
Z6654.C17C64 <SciRR A&I>
See: Computer Crime
Law
Privacy
Security
Computer and Control Abstracts (Science Abstracts--Series
C) (1968- )
QA76.C548 <SciRR A&I> and CD-ROM <SciRR>
See: Computer Crime
Computer Viruses
Cryptography
Data Privacy
Legislation
Security of Data
Computer and Information Systems Abstracts
(1962- )
QA76.I46 <SciRR A&I>
See: Computer Crime
Computer Viruses
Laws and Legislation
Security of Data
Security Systems
Computing Reviews (1960- )
QA76.C5854 <SciRR A&I>
See: E.3 Data Encryption
K.5 Legal Aspects of Computing
K.6 Management of Computing and Information Systems
Engineering Index (1884- )
Z5851.E62 <SciRR A&I> and CD-ROM <SciRR>
See: Computer Crime
Computer Crime--Viruses
Computer Networks--Security
Computer Software--Security Systems
Computers--Security
Electronic Crime Countermeasures
Network Security
Security and Privacy Management
INSPEC
CD-ROM <SciRR>
See: Computer Crime
Computer Virus Infection
Computers--Government Policies
Data Privacy
Legislation
Security of Data
Magazine Index (1979- )
Available in several formats in LC
See: Computer Crimes
Computer Security
Computer Viruses
Encryption
Right of Privacy
Reader's Guide to Periodical Literature (1900-
)
AI3.R48 <B&E> <MRR> <N&CPR>
See: Computer Crimes
Computer Passwords
Computer Programs--Unauthorized Use
Computer Viruses
Computers--Security Measures
Cryptography
Right of Privacy
Wilson Business Abstracts (1982- )
CD-ROM <B&E>
See: Computer Crimes
Computer Hackers
Computer Security Systems
Computers--Security Measures
Computers and Privacy
Encryption
TOP OF PAGE
Technical reports and other types of literature are
indexed in the following guides:
Government Reports Announcements & Index
(1946- )
Z7916.G78 <SciRR A&I> and CD-ROM <SciRR>
See: Computer Privacy
Computer Security
Computer Viruses
Cryptography
Encryption
Monthly Catalog of United States Government Publications
(1885- )
Z1233.A18 <SciRR A&I> and CD-ROM <MRR>
<N&CPR>
See: Computer Crimes
Computer Security
Computer Viruses
Computers--Access Control
Computers--Law and Legislation--United States
Cryptography
Privacy, Right Of--United States
TOP OF PAGE
The following selected technical reports are available in the microform
collection of the Science Reading Room. They are sold by the National
Technical Information Service, Springfield, Virginia 22161.
Anderson, M. Some comments on techniques for resisting
computer viruses. Technical report. Electronics Research Lab.,
Adelaide, Australia, September 1989. 27 p.
AD-A221-097
Computer Fraud. Cleveland, Ernst and Whinney,
1987. 55p.
PB87-184909
Denning, Peter J. Stopping computer crimes.
Moffett Field, Calif., Research Institute for Advanced Computer
Science, November 28, 1989. 13p.
NASA-CR-188896
N92-116573
Green, James L., and others. The Father Christmas
worm. Greenbelt, Md., National Aeronautics and Space Administration,
Goddard Space Flight Center, June 1989. 8 p.
NASA-TM-107938
N92-282672
Hochberg, Judith A. Addressing the insider threat.
Los Alamos, NM, Los Alamos National Lab., 1993. 17p.
LA-UR-93-1181
DE93-012626
Johnson, David R., and others. Computer viruses:
legal and policy issues facing colleges and universities. American
Council on Education, Washington, United Educators Insurance, Chevy
Chase, Md., May 1989. 17 p.
ED314-069
Polk, W. Timothy. Automated tools for testing computer
system vulnerability. Final rept. Gaithersburg, Md., National
Institute of Standards and Technology, December 1992. 42p.
PB93-146025
Polk, W. Timothy, and Lawrence E. Bassham III. Guide
to the selection of anti-virus tools and techniques. Special pub.
Gaithersburg, Md., National Institute of Standards and Technology
(CSL), December 1992. 49p.
PB93-152049
Privacy and Security Research Group workshop on
network and distributed systems security: proceedings. Lawrence
Livermore National Lab., Calif. 1993. 135p.
CONF-93-0245
DE93-010504
Privacy protection in the United States: a 1991
survey of laws and regulations affecting privacy in the public and
private sector including a list of all relevant officials. Prepared
by Ronald L. Plesser and Emilio W. Cividanes. Gaithersburg, Md.,
National Institute of Standards and Technology, February 1992. 107
p.
PB92-173228
Report of the NSF/NIST workshop on NSFNET/NREN
security. Held on July 6-7, 1992. Ames, Iowa, Iowa State University,
Dept. of Computer Science, May 1993. 88 p.
PB93-2228682
Sinisi, Michael J. Network security issues. (Master's
thesis). Wright-Patterson AFB, OH, Air Force Institute of Technology,
1989. 140 p.
AD-A219-182
Stevens, D. F. Who goes there? A Dialogue of questions
and answers about benign hacking. Lawrence Berkeley Lab., Calif.,
April 1987. 12 p.
CONF87-12092
"DE87-009643"
TOP OF PAGE
Journals that often contain relevant articles include
the following:
ACM Computing Surveys |
QA76.5.C617 |
Communications of the ACM |
QA76.A772 |
Computer |
TK7885.A1I5 |
Computer Control Quarterly |
QA76.9.A25C632 |
Computer Security Alert |
QA76.9.A25C637 |
Computer Security Journal |
QA76.9.A25C65 |
Computers & Security |
QA76.9.A25C664 |
Datamation |
T175.M26 |
Information Management and Computer Security |
T58.64.I5 |
Journal of Systems Management |
HD28.S953 |
Proceedings of the IEEE |
TK5700.I6 |
Virus Bulletin |
QA76.76.C68V57 |
Virus News and Reviews |
QA76.76.C68V58 |
TOP OF PAGE
Adam, John A. Threats and countermeasures. IEEE
spectrum, v. 29, Aug. 1992: 21-28.
TK1.I15 and Pamphlet box <SciRR>
Becker, Louise Giovane. Computer crime. Congressional
Research Service review, v. 4, July-Aug. 1983: 21-22.
JK1.U54a
Benjamin, R. Security considerations in communications
systems and networks. IEE Proceedings. I, communications, speech
and vision, v. 137, no. 2: p. 61-72.
TK1.I3817
BloomBecker, J. J. Short-circuiting computer crime.
Datamation, v. 35, Oct. 1, 1989: 71-72.
T175.M26
Brownstein, Ronald. Computer communications vulnerable
as privacy laws lag behind technology. National journal,
v. 16, Jan. 14, 1984: 52-57.
JK1.N28
David, Jon. Virus alert! The state of the black art.
Accounting technology, v. 9, Oct. 1993: 76-80.
HF5679.C587
Davis, Morgan. Terminal illness. (computer viruses)
(includes related article on safety software; another related article
discusses legislation - the Computer Virus Eradication Act of 1989
and the Computer Fraud and Abuse Act of 1986). A+, v. 7, Apr. 1989:
48-
QA76.8.A66A19
De Laurentiis, Joanne. Privacy in an electronic world:
why financial institutions must take leadership. World of banking,
v. 12, Sept./Oct. 1993: 28-30+.
HG1501.W67
Francett, Barbara. Security in open times: can you
loosen the bolts without disarming the locks? Computerworld,
v. 23, Oct. 23, 1989: 75-77.
QA76.C5816
Francis, Bob. The search for client/server security.
Datamation, v. 39, May 1, 1993: 39-43.
T175.M26
Glynn, Elizabeth A. Computer abuse: the emerging crime
and the need for legislation. Fordham urban law journal,
v. 12, no. 1, 1983-1984: 73-101.
K6.O73
Grimm, Rudiger. Security on networks: do we really
need it? Computer networks and ISDN systems, v. 17, Oct.
10, 1989: 315-323.
TK5015.5.C647
Hernandez, Ruel Torres. ECPA and online computer privacy.
Federal communications law journal, v. 41, Nov. 1988: 17-41.
K6.E29
Jobusch, David L., and Arthur E. Oldehoeft. A survey
of password mechanisms: weaknesses and potential improvements. Part
1. Computers & security, v. 8, Nov. 1989: 607-611.
QA76.9.A25C664
Jones, David C. Unauthorized computer access problem
mounts. National underwriter, v. 97, May 31, 1993: 10.
HG8011.N35
Katz, J. E. Social aspects of telecommunications security
policy. IEEE technology and society magazine, vol. 9, no.
2:16-24.
T14.5.I35
Lunt, Teresa F. A survey of intrusion detection techniques.
Computers & security, v. 44, June 1993: 405-418.
QA76.9.A25C664
Manuel, Tom. Computer security. Electronics,
v. 57, Mar. 8, 1984: 121-140.
Pamphlet box <SciRR>
Merrick, Bill. Electronic funds transfer: biometrics,
neural networks poised to fight fraud. Credit union magazine,
v. 59, Nov. 1993: 33-34.
HG2033.B7
Messmer, Ellen. U.S. government seeks new global security
guidelines. Network world, v. 10, Sept. 13, 1993: s61.
QA76.C5816
Nicholson, Cynthia K. Computer viruses: information
age vulnerability and the technopath. American criminal law review,
v. 27, no. 3, 1990: 525-543.
K1.M43 and Pamphlet Box <SciRR>
Parker, Donn B. The many faces of data vulnerability.
IEEE spectrum, v. 21, May 1984: 46-49.
TK1.I15 and Pamphlet Box <SciRR>
Price, R. Leon, and others. Computer fraud in commercial
banks: management's perception of risk. Journal of systems management,
v. 40, Oct. 1989: 28-33.
HD28.S953
Radigan, Joseph. The growing problem of electronic
theft. United States banker, v. 103, June 1993: 37-38.
HG1.U5
Rosenstein, Samuel. The Electronic Communications
Privacy Act of 1986 and satellite descramblers: toward preventing
statutory obsolescence. Minnesota law review, v. 76, June
1992: 1451-1481.
K13.I55
TOP OF PAGE
Selected materials available in the Science Reading
Room pamphlet boxes include the following:
Adam, John A. Cryptography = privacy? IEEE spectrum,
v. 29, Aug. 1992: 29-35.
Adam, John A. Data security. IEEE spectrum, v. 29, Aug.
1992: 18-20.
Benjamin, Louise M. Privacy, computers, and personal information:
toward equality and equity in an information age. Communications
and the law, v. 13, June 1991: 3-16.
BloomBecker, J. J. Buck. Cracking down on computer crime. State
legislatures, v. 14, Aug. 1988: 10-13.
Branscomb, Anne W. Common law for the electronic frontier. Scientific
American, v. 265, Sept. 1991: 154-157.
Computer security bibliography. Northboro, Mass., Computer
Security Institute, 1977. 10 p.
Flanagan William G., and Brigid McMenamin. The playground bullies
are learning to type. Forbes, Dec. 21, 1992: 184-189.
Glynn, Elizabeth A. Computer abuse: the emerging crime and the
need for legislation. Fordham urban law journal, v. 12, 1983-84:
73-102.
Kapor, Mitchell. Civil liberties in cyberspace. Scientific
American, v. 265, Sept. 1991: 158-160, 162, 164.
Kephart, Jeffrey, O., Steve R. White, and David M. Chess. Epidemiology
of computer viruses. IEEE spectrum, v. 30, May 1993: 20-26.
Martinott, Robert T., and John M. Winton. Getting a lock on computer
security. Chemical week, v. 141, Oct. 28, 1987: 26-28, 30-33.
Neumann, Peter G. Inside risks: fraud by computer. Communications
of the ACM, v. 35, Aug. 1992: 154.
Resource guide: virus protection for networks. Byte, v.
18, May 1993: 144.
Rotenberg, Marc. Communications privacy: implications for network
design. Communications of the ACM, v. 18, Aug. 1993: 61-
A security roundtable. IEEE spectrum, v. 29, Aug. 1992:
41-44.
Security Systems Service. In Small Business Sourcebook.
v. 1. 5th ed. Detroit, Mich., Gale Research Co., c1992. p. 1553-1562.
Includes lists of primary associations, educational programs, sources
of supply, tradeshows and conventions, and research centers.
Shakelford, Steve. Computer related crime: an international problem
in need of an international solution. Texas international law
journal, v. 27, no. 2, spring 1992: 479-505.
TOP OF PAGE
National Institute of Standards and Technology (NIST)
Gaithersburg, MD 20899
NIST Computer Security BBS: 301-948-5717 or 301-948-5140 (9600
baud)
Internet: http://csrc.ncsl.nist.gov
Computer Technology Association of America
1616 North Fort Myer Dr.
Suite 1300
Arlington, VA 22209
Tel: 703-522-5055
Computer Security Institute
600 Harrison St.
San Francisco, CA 94107
Tel: 415-905-2626
TOP OF PAGE
|