Chapter 1 | Chapter 2 | Chapter 3 | Chapter 4 | Chapter 5 | Chapter 6 | Chapter 7 | Chapter 8 | Chapter 9 | Chapter 10 |
Table of Contents | Glossary of Terms |
Appendix E Bibliography and Selected Reference Materials
Print Documents
Alexander, M. (1996). The Underground Guide to Computer Security. Reading, MA: Addison-Wesley Publishing Company.
California Department of Education. (1994). K-12 Network Technology Planning Guide: Building the Future (Draft). Sacramento, CA: California Department of Education.
CAUSE. (1997). Privacy and the Handling of Student Information in the Electronic Networked Environments of Colleges and Universities. Boulder, CO: CAUSE.
Cobb, S. (1996). The NCSA Guide to PC and LAN Security. New York, NY: McGraw-Hill, Inc.
Crowe, Elizabeth P. (1994). The Electronic Traveller: Exploring Alternative Online Systems. Tab Books.
(ISBN: 0830644989).
Dern, D.P. (1994). The Internet Guide for New Users. New York, NY: McGraw-Hill, Inc.
Idaho State University, Department of Computer Information Systems. (1988). Information Security Modules. Unpublished presentations from a U.S. Department of Defense-sponsored workshop.
Levine, J.R., Baroudi, C. and Levine-Young, M. (1995). The Internet for Dummies (3rd Edition). Foster City, CA: IDG Books Worldwide, Inc.
National Security Agency, Information Systems Security Organization. Computer Security in a Networked Society (Training Brief). Presented at the National Center for Education Statistics' Summer Data Conference, July 1996.
Russel, D. and Gangemi, G.T. (1991). Computer Security Basics. Sebastopol, CA: O'Reilly & Associates.
Strang, D. and Moon, S. (1993). Network Security Secrets. San Mateo, CA: IDG Books Worldwide, Inc.
Time-Life Books (Eds). (1986). Computer Security. Alexandria, VA: Time-Life Books.
U.S. Bureau of the Census. (1996). Handbook for Information Technology Security. Unpublished internal use document.
U.S. Department of Commerce. (1975). Computer Security Guidelines for Implementing the Privacy Act of 1974. Washington, DC: Government Printing Office.
U.S. Department of Education, National Center for Education Statistics. (1997). Protecting the Privacy of Student Records: Guidelines for Education Agencies, NCES 97-527. Washington, DC: Government Printing Office.
U.S. Department of Education, National Center for Education Statistics. (1997). Technology @ Your Fingertips, NCES 98-293. Washington, DC: Government Printing Office.
Available Online Resources
American Association of School Administrators (http://www.aasa.org). This site includes appropriate use policies as well as technology plans and other planning resources.
Computer Crime Research Resources (http://www.mailer.fsu.edu/~btf1553/ccrr/states.htm). This site provides lists of, and links to, state statutes (by state) pertaining to crimes involving computers and information.
Computer Ethics Institute (CEI) (http://www.brook.edu/its/cei/cei%5Fhp.htm). CEI offers an advanced forum and resource for identifying, assessing, and responding to ethical issues associated with the advancement of information technologies in society.
Computer Emergency Response Team (CERT) Coordination Center (http://www.cert.org). CERT studies Internet security vulnerabilities, provides incident response services to sites that have been victims of attack, publishes a variety of security alerts, researches security and survivability in wide-area-networked computing, and develops information to help you provide security at your site.
National/International Computer Security Association (NCSA/ICSA) (http://www.ncsa.com). The NCSA/ICSA is an organization dedicated to improving security and confidence in global computing through awareness and the continuous certification of products, systems, and people. It offers a wide range of security publications for sale included under topics such as Communications and Security,
Computer Privacy and Ethics, Computer Viruses, Cryptography, Disaster Recovery, Firewalls and Internet Security, General Security, and Network Security.
National Institute of Standards and Technology (NIST) Computer Security Resource Clearinghouse (http://csrc.nist.gov). The NIST Computer Security Division offers guidance and technical assistance to government and industry in the protection of unclassified automated information systems. The Computer Security Resource Clearinghouse provides an online archive of useful information
available via the World Wide Web.
National Security Institute (http://nsi.org/compsec.html). This site offers a wide range of security-related
information under the headings Alerts and Warnings, Threats, Manager's Guides, Communication and Encryption, Papers and Programs (and FAQs), Government Standards, Internet, Mailing Lists and News Groups, and Links.
Network/Computer Security Technology (http://huitzilo.tezcat.com/web/security). This site is intended to provide an access point to security-related resources across the Internet.
U.S. Department of Education, Office of Educational Technology (http://www.ed.gov/Technology). This site offers access to information on a range of U.S. Department of Education initiatives that promote the use of technology in schools, libraries, and communities to achieve its mission of ensuring equal access to education and promoting educational excellence throughout the nation.
World Wide Web Security FAQ (Frequently Asked Questions) ( http://www.w3.org/Security/Faq). This FAQ list attempts to answer some of the most frequently asked questions relating to the security implications of running a Web server and using Web browsers.
|