[1] Rittinghouse, John W., William M. Hancock, Cybersecurity Operations Handbook First ed. 2003 New York Digital Press
[2] See http://isc.sans.org/trends.html.
[3] Computer Security Institute. “2002 CSI/FBI Computer Crime and Security Survey.” Richard Power, 2003, at http://www.gocsi.com.
[4] Internet Fraud Complaint Center. “IFCC Annual Internet Fraud Report, January 1, 2001 to December 31, 2001,” at http://www1.ifccfbi.gov/strategy/statistics.asp.
[5] Garner Bryan A.,, Black’s Law Dictionary 7th ed. 1999 Cleveland, OH: West Group,
[8] Wells Joseph T., Gilbert Geis, Fraud Examiners Manual, 3rd ed. Vol. 1 1998 Fraud Examiners Manual, 3rd ed., Vol 1. Association of Certified Fraud Examiners, Inc
[9] See note 5. See also, The Merriam Webster Dictionary, Home and Office Edition. Springfield, MA: Merriam-Webster, 1995.
[10] Downes John, Jordan Elliot Goodman, Barron’s Dictionary of Finance and Investment Terms 5th ed 1998 Hauppauge, NY Barron’s Educational Series
[14] U.S. Department of Justice. Press Release of February 26, 2002, “Former Computer Network Administrator at New Jersey High-Tech Firm Sentenced to 41 Months for Unleashing $10 Million Computer Time Bomb, at http://www.usdoj.gov/criminal/cybercrime/lloydSent.htm.
[15] U.S. Department of Justice. Press Release of May 1, 2001, “Creator of Melissa Virus Sentenced to 20 Months in Federal Prison,” at http://www.usdoj.gov/criminal/cybercrime/MelissaSent.htm.
[16] U.S. Department of Justice. Electronic Citation: 2002 FED App. 0062P (6th Cir.), File Name: 02a0062p.06, decided and fled February 20, 2002, at http://www.usdoj.gov/criminal/cybercrime/4Pillars6thCir.htm.
[17] The full text of this rendering can be reviewed at http://www.usdoj.gov/criminal/cybercrime/4Pillars6thCir.htm
[18] NIST SP 800-12, Computer Security Handbook, author unknown. Washington, DC: U.S. Department of Commerce, 1996.
18.191.102.112