|
|
Appendix F
Citations
NOTE: Appendix E contains bibliographical information for each document listed in these citations.
Reference
-
Text adapted from Computer Security Basics, p20
-
Bullets adapted from Network Security Secrets, p. 908
-
Computer Security in a Networked Society (NSA Training Brief), p. 31
- Bullets adapted from Computer Security Guidelines, p. 9
- Bullets adapted from Information Security Modules, p. 32
- Text adapted from Computer Security Basics, p. 105
- Bullets adapted from Computer Security Guidelines, p. 9
- Box adapted from Information Security Modules, p. 73
- Bullets adapted from Network Security Secrets, p. 890
- Bullets adapted from Network Security Secrets, p. 890
- Bullets adapted from The Underground Guide to Computer Security, p. 199
- Bullets adapted from Network Security Secrets, p. 830
- Bullets from Census Handbook for Information Technology Security, p. 36
- Bullets adapted from Network Security Secrets, p. 833
AND The Underground Guide to Computer Security, p. 155
- Bullets from Network Security Secrets, p. 828
- Bullets adapted from NCSA Guide to PC and LAN Security, p. 323
- Bullets adapted from Information Security Modules, p. 22
- Some bullets adapted from The Network Security Secrets, p. 274
- Box definitions from Information Security Modules, p. 31
- Box definitions from Information Security Modules, p. 31
- Sidebar from Information Security Modules, p. 77
- Some bullets adapted from Census Handbook for Information Technology Security, p. 20
- Adapted from Computer Security Basics, p. 61
|