Resources
Created: Feb. 20, 2004
Books
- Pfleeger, Charles P. Security in Computing, 2nd Edition.
(Chapter 11). Prentice Hall. 1997.
Articles
- Saad Haj Bakry. Development of security policies for private networks.
International Journal of Network Management, Volume 13 Issue 3. May 2003.
- Jinx P. Walton. Developing an enterprise information security policy.
Proceedings of the 30th annual ACM SIGUCCS conference on User
services. November 2002.
- Peter Swire, Lauren Steinfeld.A prognosis for use of health, medical, and genetic information:
Security and privacy after September 11: the health care example.
Proceedings of the 12th annual conference on Computers, freedom and
privacy. April 2002.
- Luther Troell, Yin Pan, Bill Stackpole.Security: Forensic course development. Proceeding of
the 4th conference on information technology curriculum on Information
technology education. October 2003.
- Gregory J. Walters.Privacy and security: an ethical analysis. ACM SIGCAS
Computers and Society, Volume 31 Issue 2.
June 2001.
- Postini. Reducing
Corporate Liability With Filtering and Policy Tools. The overwhelming majority of corporate email
addresses today receive unsolicited commercial email, or spam. ...
- SANS Institute. Intrusion
Detection FAQ - Can I take legal actions against port scanning?.
- David J. DiCenso. The
Legal Issues of Information Warfare.
- Federal Bureau of Investigation.Encryption:
Impact on Law Enforcement. Feb 27, 2000.
- Ross J. Anderson. Crypto
in Europe - Markets, Law and Policy.Apr 05,
2000.
- Peter Sommer.
Intrusion
Detection Systems as Evidence.Feb 27,
2000.
- Ross J. Anderson. Liability
and Computer Security - Nine Principles. Feb 27,
2000.
Web Sites
- HIPAA (Health Insurance Portability and Accountability Act of 1996)
related info:
- Winguides.com: (All
Windows): Use these fields to create a dialog box that will be presented
to any user before logging onto the system. This is useful where you are
required by law to warn people that it is illegal to attempt to logon without
being an authorized user.
- Windowsecurity.com: http://www.windowsecurity.com/
- WindowSecurity.com library of white papers: http://www.windowsecurity.com/whitepaper/