Категории
Самые читаемые
onlinekniga.com » Документальные книги » Публицистика » Компьютерное подполье. Истории о хакинге, безумии и одержимости - Сьюлетт Дрейфус

Компьютерное подполье. Истории о хакинге, безумии и одержимости - Сьюлетт Дрейфус

Читать онлайн Компьютерное подполье. Истории о хакинге, безумии и одержимости - Сьюлетт Дрейфус

Шрифт:

-
+

Интервал:

-
+

Закладка:

Сделать
1 ... 97 98 99 100 101 102 103 104 105 106
Перейти на страницу:

RTM – Роберт Таппан Моррис-младший, студент Корнельского университета, написавший червя, известного под названием RTM.

SPAN – Space Physics Analysis Network (Международная сеть исследователей физики космоса), глобальная сеть DECNET, первоначально контролировалась NASA.

Sprint – американская телекоммуникационная компания, провайдер сети Х.25.

Sprintnet – сеть Х.25, контролируемая Sprint communications.

Sun – Sun Microsystems, крупнейший производитель рабочих станций Unix.

TCP – Transmission Control Protocol (RFC793) (протокол контроля передачи), стандарт передачи данных между двумя компьютерами в Интернете.

TELENET – сеть Х.25, DNIC 3110.

Telnet – Телнет, способ соединения между двумя компьютерами в Интернете или в других сетях TCP/IP.

Tymnet – сеть Х.25, контролируемая MCI, DNIC 3106.

Unix – многопользовательская компьютерная операционная система, разработанная AT&T и университетом Беркли.

VAX – Virtual Address Extension («виртуальное адресное расширение»), серия минимэйн-фреймов, производимых фирмой DEC.

VMS – Virtual Memory System («система виртуальной памяти»), операционная система, производимая фирмой DEC и применяемая в машинах VAX.

WANK (Worms Against Nuclear Killers) («Черви против ядерных убийц»), название червя на базе DECNET/VMS, запущенного в SPAN/DEC/HEPNET в 1989 году.

Х.25 – международная сеть передачи данных, использующая коммуникационные протоколы Х.25. Сеть создана крупными телекоммуникационными компаниями на базе стандарта CCITT # Х.25.

Zardoz – ограниченный лист почтовой рассылки материалов по компьютерной безопасности.

Библиография

Australian Federal Police (AFP), Annual Report 1995–1996, Canberra, 1996.

–, Annual Report 1994–1995, Canberra, 1995.

–, Annual Report 1993–1994, Canberra, 1994.

Bourne, Philip E., «Internet security; System Security», DEC Professional, vol. 11, June 1992.

Cerf, Vinton G., «Networks», Scientific American, vol. 265, september 1991.

Clyde, Robert A., «DECnet Security», DEC Professional, vol. 10, april 1991.

Commonwealth Attorney-General’s Department, Interim Report on Computer Crime (the gibbs Report), Canberra, 1988.

Commonwealth Director of Public Prosecution (DPP), Annual Report 1993–1994, Canberra, 1994.

Commonwealth Scientific and Industrial Research Organisation (CSIRO), Annual Report 1994–1995, Canberra, 1995.

Davis, Andrew W., «DEC Pathworks the mainstay in Macto-VAX connectivity», Mac Week, vol. 6, 3 August 1992.

Department of Foreign Affairs and Trade, Australian Treaty Series 1993, no. 40, Australian Government Publishing Service, Canberra, 1993.

Digital Equipment Corporation, Annual Report 1989, securities and Exchange Commission (SEC) Online (USA) Inc., 1989.

–, Quarterly Report for period ending 12.31.89, sec Online (USA).

Gezelter, Robert, «The DECnet TASK object; Tutorial», Digital Systems Journal, vol. 16, july 1994.

Gianatasio, David, «Worm Infestation hits 300 VAX/VMS systems worldwide via DECnet», Digital Review, vol. 6, 20 november 1989.

Haffner, Katie & Markoff John, Cyberpunk, Corgi Books (transworld), Moorebank NSW, 1994.

Halbert, Debora, «The Potential for Modern Communication Technology to Challenge Legal Discourses of Authorship and Property», Murdoch University E-Law Journal, vol. 1, no. 2.

Kelman, Alistair, «Computer Crime in the 1990s: a Barrister’s View», Paper for the Twelfth National Symposium on Economic Crime, September 1994.

Law Commission (UK) Working Paper, no. 110, 1988.

Lloyd, J. Ian & Simpson, Moira, Law on the Electronic Frontier, David Hume Institute, Edinburgh, 1996.

Longstaff, Thomas A., & Schultz, E. Eugene, «Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code». Computers & Security, vol. 12, february 1993.

Loundy, David J., «Information Systems Law and Operator Liability Revisited», Murdoch University E-Law Journal, vol. 1, no. 3, september 1994. mcmahon, john, «Practical DECnet Security», Digital Systems Journal, vol. 14, November 1992.

Melford, Robert J., «Network security; computer networks», Internal Auditor, institute of Internal Auditors, vol. 50, February 1993.

Natalie, D. & Ball, W, EIS Coordinator, North Carolina Emergency Management, «How North Carolina Managed Hurricane Hugo», EIS News, vol. 3, no. 11, 1988.

NorTel Australia Pty Ltd, Discovering Tomorrow’s Telecommunications Solutions, chatswood, nsw (n.d.).

Northern Telecom, Annual Report 1993, Ontario, 1993.

Slatalla, Mishelle & Quittner, Joshua, Masters of Deception, Harpercollins, New York, 1995.

Royal Commission into Aboriginal Death in Custody, Report of the Inquiry into the Death of Woman Who Died at Ceduna, Australian government Publishing Service, Canberra, 1990.

Scottish Law Commission Report on Computer Crime, no. 174, 1987.

SPAN Management Office, «Security guidelines to be followed in the latest worm attack», an Intranetwork Memorandum released by the SPAN Management Office, NASA, 30 October 1989.

Sterling, Bruce, The Hacker Crackdown, Penguin Books, Melbourne, 1994. [Книга доступна на http://lib.rus.ec/b/106013 (прим. сост. FB2)]

Stoll, Clifford, The Cuckoo’s Egg, pan books, London, 1991.

Tencati, Ron, «Information regarding the DECNET worm and protection measures», an Intranetwork Memorandum released by the SPAN Management Office, NASA, 19 October 1989.

–, «Network Security Suplemental Information – Protecting the DECNET Account», security advisory, released by SPAN, NASA/Goddard Space Flight Center, 1989.

The Victorian Ombudsman, Operation Iceberg; Investigation of Leaked Police Information and Related Matters, report of the Deputy Ombudsman (Police Complaints), L. V. North Government Printer, Melbourne, 1993.

«USA proposes international virus team», Computer Fraud &. Security Bulletin (Elsevier Advanced Technology Publication), August 1991.

Victoria Police, Operation Iceberg – Investigation and Recommendations into Allegations of Leaked Confidential Police Information, 1 june, memorandum from victoria Police Commander Bowles to Chief Commissioner Comrie (also available as Appendix 1 in the Victorian Ombudsman’s Operation Iceberg Report, tabled in Victorian Parliament, October 1993), 1993.

Vietor, Richard, Contrived Competition: Regulation and Deregulation in America, belknap/harvard university press, Cambridge, 1994.

Yallop, David, To the Ends of the Earth, corgi books (transworld), moorebank, nsw, 1994.

Законы:

Computer Misuse Act 1990 (UK)

Crimes Act 1914 (no. 5) (cwlth)

Crimes Legislation Amendment Act 1989, no. 108

Computer Fraud and Abuse Act 1986 (us), 18 usc 1030

Computer Misuse Crimes Legislation Amendment Bill 1989 (aus),

Explanatory Memo Clause 7 Crimes (Computers) Act, no. 36 of 1988 (vic)

Другие публикации и базы данных:

• American Bar Association Journal Associated Press

• Attorney general’s information Service (Australia)

• Australian Accountant

• Australian Computer Commentary

• Aviation Week and Space Technology (USA)

• Banking Technology

• Business Week

• Cable News Network (CNN)

• Card News (USA)

• CERT Advisories (The Computer Emergency Response Team at Carnegie Mellon University)

• Chicago Daily Law Bulletin Communications Week

• Communications Week International

• Computer Incident Advisory Capability (CIAC)

• Computer Law and Practice (Australia)

• Computer Law and Security Report (Australia)

• Computer Weekly

• Computergram

• Computerworld

• Computing

• Corporate EFT Report (USA)

• Daily Mail (UK)

• Daily Telegraph (sydney)

• Daily Telegraph (UK)

• Data Communications

• Datalink

• Evening Standard (UK)

• Export Control News (USA)

• Fintech Electronic Office (The Financial Times)

• Gannett news office

• Government Computer News (USA)

• Info World

• Intellectual Property Journal (Australia)

• Intelligence Newsletter (Indigo Publication)

• Journal of Commerce (The New York Times)

• Journal of The Law Society of Scotland

• Korea Economic Daily

• Law Institute Journal (Melbourne)

• Law Society' Gazette (UK)

• Law Society’s Guardian Gazette (UK)

• Legal Times (USA)

• Lexis-Nexis (Reed Elsevier)

• Lloyds List

• Mail on Sunday (UK)

• Media Week

• MIS Week

• Mortgage Finance Gazette

• Network World

• New Law Journal (UK)

• New York Law Journal

• Newsday

• PC Week (USA)

• Press Association Newsfile

• Reuter

• Reuter News Service – United Kingdom Science

• South China Morning Post

• St Louis Post-Dispatch

• St Petersburg Times

• Sunday Telegraph (Sydney)

• Sunday Telegraph (UK)

• Sunday Times (UK)

• Telecommunications (Horizon House Publication Inc.)

• The Age

• The Australian

• The Australian Financial Review

• The Bulletin

• The Computer Lawyer (USA)

• The Connecticut Law Tribune

• The Daily Record (USA)

• The Engineer (UK)

• The Gazette (Montreal)

• The Guardian

• The Herald (Glasgow)

• The Herald (Melbourne)

• The Herald Sun (Melbourne)

• The Independent

• The Irish Times

• The Legal Intelligencer (USA)

• The Los Angeles Times

• The Nation

• The National Law Journal (USA)

• The New York Times

• The Recorder (USA)

• The Reuter European Community Report

• The Reuter Library Report

• The Scotsman

• The Sun (Melbourne)

• The Sunday Age

• The Sydney Morning Herald

• The Times

• The Washington Post

• The Washington Times

• The Weekend Australian

• Time Magazine

• United Nations Chronicle

• United Press International

• USA Today

Стенограммы:

Hearing of the Transportation, Aviation and Materials Subcommittee of the House Science, Space and Technology Committee transcript: witness Clifford Stoll, 10 July 1990

«Larry King Live» transcript, interview with Clifford Stoli, 23 March 1990 The World Uranium Hearing, Salzburg 1992, witness transcript US Government Accounting Office Hearing (computer security) witness transcripts, 1996

Судебные приговоры:

Chris Goggans, Robert Cupps and Scott Chasin, Appellants v. Boyd & Fraser Publishing Co., a division of South-Western Publishing Co., Appellee No. 01-95-00331-Cv 1995 Tex. App.

Gerald Gold v. Australian Federal Police, no v93/1140.

Gerald Gold v. National Crime Authority, no. v93/1141 aat no. 9940 Freedom of Information (1994) 37 ALD 168.

Henry John Tasman Rook v. Lucas Richard Maynard (no.2) lca 52/ 1994; judgement no. A64/1994.

Pedro Juan Cubillo v. Commonwealth of Australia, no. ng 571 of 1991 fed no.1006/95 tort – negligence. R v. Gold and another, house of lords (UK), [1988] 1 AC 1063, [1988] 2 All ER 186, [1988] 2 WLR 984, 87 Cr App Rep 257, 152 JP 445, [1988] Crim Lr 437.

Steve Jackson Games Incorporated, et al., plaintiffs, v. United States Secret Service, United States of America, et al., defendants no. A 91 CA 346 Ss 816 F. Supp. 432; 1993 U.S. Dist.

United States of Americav. Julio Fernandez, et al.,92 cr. 563 (ro).

United States of America, plaintiff, v. Robert J. Riggs, also known as Robert Johnson, also known as Prophet, and Craig Neidorf, also known as Knight Lightning, defendants no. 90 cr 0070 743 F. Supp. 556; 1990 U.S. Dist.

United States of America, appellee, v. Robert Tappan Morris, defendant-Appellant No. 90– 1336 928 F.2d 504; 1991 U.S. App.

Wesley Thomas Dingwall v. Commonwealth of Australia, no. ng 575 of 1991 Fed no.296/94 Torts.

William Thomas Bartlett v. Claire Patricia Wier, Henry J T Rook, Noel E. Aikman, Philip Edwards and Michael В McCay no. tg 7 of 1992; fed no. 345/94.

Другие судебные материалы:

Докладные записки и доклады от/в:

1 ... 97 98 99 100 101 102 103 104 105 106
Перейти на страницу:
На этой странице вы можете бесплатно читать книгу Компьютерное подполье. Истории о хакинге, безумии и одержимости - Сьюлетт Дрейфус.
Комментарии