8. Annotated Bibliography

8. Annotated Bibliography

Copyright(c) Management Analytics, 1995 - All Rights Reserved

The intent of this annotated bibliography is to offer a representative collection of resources of information that will help the user of this handbook. It is meant provide a starting point for further research in the security area. Included are references to other sources of information for those who wish to pursue issues of the computer security environment.

8.1 Computer Law

8.2 Computer Security

  Additional publications on Ethics:

  The University of New Mexico (UNM)

     The UNM has a collection of ethics documents.  Included are
     legislation from several states and policies from many
     institutions.

        Access is via FTP, IP address ariel.umn.edu.  Look in the
        directory /ethics.

8.4 The Internet Worm

8.5 National Computer Security Center (NCSC)

  All NCSC publications, approved for public release, are available
  from the NCSC Superintendent of Documents. 

NCSC = National Computer Security Center
9800 Savage Road
Ft Meade, MD 20755-6000

CSC = Computer Security Center:
an older name for the NCSC

NTISS = National Telecommunications and
Information Systems Security
NTISS Committee, National Security Agency
Ft Meade, MD 20755-6000

Additional NCSC Publications:

8.6 Security Checklists

8.7 Additional Publications

  Defense Data Network's Network Information Center (DDN NIC)

     The DDN NIC maintains DDN Security bulletins and DDN Management
     bulletins online on the machine: NIC.DDN.MIL.  They are available
     via anonymous FTP.  The DDN Security bulletins are in the
     directory: SCC, and the DDN Management bulletins are in the
     directory: DDN-NEWS. 

     For additional information, you may send a message to:
     NIC@NIC.DDN.MIL, or call the DDN NIC at: 1-800-235-3155. 

IEEE Proceedings

     IEEE Proceedings are available from:

   Computer Society of the IEEE
   P.O. Box 80452
   Worldway Postal Center
   Los Angeles, CA  90080

Other Publications:

     Computer Law and Tax Report
     Computers and Security
     Security Management Magazine
     Journal of Information Systems Management
     Data Processing & Communications Security
     SIG Security, Audit & Control Review