Underground: Hacking, madness and obsession on the electronic frontier - BestLightNovel.com
You’re reading novel Underground: Hacking, madness and obsession on the electronic frontier Part 76 online at BestLightNovel.com. Please use the follow button to get notification about the latest chapter next time when you visit BestLightNovel.com. Use F11 button to read novel in full-screen(PC only). Drop by anytime you want to read free – fast – latest novel. It’s great if you could leave a comment, share your opinion about the new chapters, new novel with others on the internet. We’ll do our best to bring you the finest, latest novel everyday. Enjoy
12. Nick Nuttall, 'Hackers Stay Silent on Court Acquittal', The Times, 19 March 1993.
13. Melvyn Howe, Press a.s.sociation Newsfile, Home News section, 21 May 1993.
Chapter 8
1. Words And Music by James Moginie/Peter Garrett. (c) Copyright 1982 Sprint Music. Administered for the World--Warner/Chappell Music Australia Pty Ltd. Used By Permission.
2. This is an edited version.
Chapter 9
1. Words And Music by Rob Hirst. (c) Copyright 1993 Sprint Music.
Administered for the World--Warner/Chappell Music Australia Pty Ltd.
Used By Permission.
Chapter 10
1. Words And Music by Rob Hirst/James Moginie/Martin Rotsey/Andrew James. (c) Copyright 1978 Sprint Music. Administered for the World--Warner/Chappell Music Australia Pty Ltd and Andrew James. Used By Permission.
Chapter 11
1. Words And Music by James Moginie (lyrics adapted from the book The Great Prawn War And Other Stories by Dennis Kevans). (c) Copyright 1984 Sprint Music. Administered for the World--Warner/Chappell Music Australia Pty Ltd. Used By Permission.
Afterword
1. Victorian Ombudsman, Operation Iceberg; Investigation of Leaked Confidential Police Information and Related Matters.
2. The police report was printed as an appendix in the Ombudsman's report. See Chapter 5, note 1, above.
3. Australian Federal Police, Annual Report, 1995-1996, p. 7.
Bibliography.
Australian Federal Police (AFP), Annual Report 1995-1996, Canberra, 1996.
----, Annual Report 1994-1995, Canberra, 1995.
----, Annual Report 1993-1994, Canberra, 1994.
Bourne, Philip E., 'Internet security; System Security', DEC Professional, vol. 11, June 1992.
Cerf, Vinton G., 'Networks', Scientific American, vol. 265, September 1991.
Clyde, Robert A., 'DECnet security', DEC Professional, vol. 10, April 1991.
Commonwealth Attorney-General's Department, Interim Report on Computer Crime (The Gibbs Report), Canberra, 1988.
Commonwealth Director of Public Prosecutions (DDP), Annual Report 1993-1994, Canberra, 1994.
Commonwealth Scientific and Industrial Research Organisation (CSIRO), Annual Report 1994-1995, Canberra, 1995.
Davis, Andrew W., 'DEC Pathworks the mainstay in Mac-to-VAX connectivity', MacWeek, vol. 6, 3 August 1992.
Department of Foreign Affairs and Trade, Australian Treaty Series 1993, no. 40, Australian Government Publis.h.i.+ng Service, Canberra, 1993.
Digital Equipment Corporation, Annual Report 1989, Securities and Exchange Commission (SEC) Online (USA) Inc., 1989.
----, Quarterly Report for period ending 12.31.89, SEC Online (USA).
Gezelter, Robert, 'The DECnet TASK object; Tutorial', Digital Systems Journal, vol. 16, July 1994.
Gianatasio, David, 'Worm infestation hits 300 VAX/VMS systems worldwide via DECnet', Digital Review, vol. 6, 20 November 1989.
Haffner, Katie & Markoff, John, Cyberpunk, Corgi Books (Transworld), Moorebank NSW, 1994.
Halbert, Debora, 'The Potential for Modern Communication Technology to Challenge Legal Discourses of Authors.h.i.+p and Property', Murdoch University E-Law Journal, vol. 1, no. 2.
Kelman, Alistair, 'Computer Crime in the 1990s: A Barrister's View', Paper for the Twelfth International Symposium on Economic Crime, September 1994.
Law Commission (UK) Working Paper, no. 110, 1988.
Lloyd, J. Ian & Simpson, Moira, Law on the Electronic Frontier, David Hume Inst.i.tute, Edinburgh, 1996.
Longstaff, Thomas A., & Schultz, E. Eugene, 'Beyond preliminary a.n.a.lysis of the w.a.n.k and OILZ worms: a case study of malicious code', Computers & Security, vol. 12, February 1993.
Loundy, David J., 'Information Systems Law and Operator Liability Revisited', Murdoch University E-Law Journal, vol. 1, no. 3, September 1994.
McMahon, John, 'Practical DECnet security', Digital Systems Journal, vol. 14, November 1992.
Melford, Robert J., 'Network security; computer networks', Internal Auditor, Inst.i.tute of Internal Auditors, vol. 50, February 1993.
Natalie, D. & Ball, W, EIS Coordinator, North Carolina Emergency Management, 'How North Carolina Managed Hurricane Hugo', EIS News, vol. 3, no. 11, 1988.
NorTel Australia Pty Ltd, Discovering Tomorrow's Telecommunications Solutions, Chatswood, NSW (n.d.).
Northern Telecom, Annual Report 1993, Ontario, 1993.
Slatalla, Mich.e.l.le & Quittner, Joshua, Masters of Deception, HarperCollins, New York, 1995.
Royal Commission into Aboriginal Deaths in Custody, Report of the Inquiry into the Death of the Woman Who Died at Ceduna, Australian Government Publis.h.i.+ng Service, Canberra, 1990.
Scottish Law Commission's Report on Computer Crime, no. 174, 1987.
SPAN Management Office, 'Security guidelines to be followed in the latest worm attack', an Intranetwork Memorandum released by the SPAN Management Office, NASA, 30 October 1989.
Sterling, Bruce, The Hacker Crackdown, Penguin Books, Melbourne, 1994.
Stoll, Clifford, The Cuckoo's Egg, Pan Books, London, 1991.