Index of locally available sites:
-
ACM Digital Library Search
-
Digital Library and Site Search
-
InfoTrac Web
- An IW Bibliography
- Intelligence Note Book
-
Information Warfare & Information Operations (IW/IO) : A Bibliography
-
DTIC Review--DTIC Documents
-
Information-Age Warfare: A Working Bibliography
-
Information-Age Warfare: A Working Bibliography, Part II
-
UNBSJ Ward Chipman Library Information Warfare
-
stinet.dtic.mil/index.html
-
ACSA Information Security Bookshelf
-
Breakdown of NISS Conference Proceedings
-
ACM Digital Library: Users are not the enemy
-
USIA, U.S. Foreign Policy Agenda, November 1998 --
"CYBERTHREAT: PROTECTING U.S. INFORMATION NETWORKS -- Table of
Contents
-
www.dodccrp.org/ncw.htm
-
C:\OCCPAPER\OCP9.ASC
-
ACM Digital Library: Security modelling for organisations
-
Early Computer Security Papers, Part I
-
Threat Assessments for Information Networks and Infrastructures
-
Criminal Threats to Business on the Internet
-
WAIS Document Retrieval
-
cyberwar
-
www.rand.org/publications/MR/MR1016/index.html
-
In Athena's Camp
-
Computer: Abstract: The State of the Art in Electronic Payment Systems, pp. 28-35
-
www.avolio.com/MultiDimensional.html
-
Best Practices in Network Security | Page 1 | March 20, 2000
-
NWC Review, Spring 1998: Barnett
-
ACM Digital Library: Information systems security design methods implications for information systems development
-
193.51.39.62/Caae/Articles_Web/20AFCEA.htm
-
Steven M. Bellovin -- Papers
-
ACM Digital Library: A formal protection model of security in centralized, parallel, and distributed systems
-
It's time for intranet guerrilla warfare
-
www.cisp.org/imp/september_99/09_99blumenthal.htm
-
Catapults and grappling hooks: The tools and techniques
of information warfare
-
www.infowar.com/hacker/99/hack_061799c_j.shtml
-
www.commsec.com/security/infowarfare.htm
-
Infowar
-
Information War and the Air Force: Wave of the Future?
Current Fad?
-
TOWARDS A GAME THEORY MODEL OF INFORMATION WARFARE
-
Stephen F. Bush
-
As We May Think by Vannevar Bush
-
A Short History of the Web
-
Infowar Melts with Black Marketeering in the Information Age, Creating Black Dagger
-
Selections from the Current Issue
-
CyberWar: Security, Strategy and Conflict in the Information Age
-
Sep-Nov 98, Table of Contents
-
Joint Force Quarterly - Autumn 96
-
U.S. Naval Institute - Proceedings - Network-Centric Warfare: Its Origin and Future, by Vice Admiral Arthur K. Cebrowski
-
www.isoc.org/inet2000/cdproceedings/7a/7a_4.htm
-
seclab.cs.ucdavis.edu/papers.html
-
Page has moved
-
Page has moved
-
ACM Digital Library: A credibility-based model of computer system security
-
Andy Clark - Past Papers & Presentations
-
The One with the Most Information Wins? The Quest for Information Superiority
-
indexso99
-
www.dodccrp.org/Proceedings/DOCS/plenary presentations/Clothier/Short Paper for ICCRTS.html
-
Mar-Apr 98, Table of Contents
-
Thinking about the Unthinkable: Australian Vulnerabilities to High-Tech Risks(Research Paper 18 1997-98)
-
Australia's Vulnerability to Information Attack:
-
TheStandard.com: World War Web
-
Classics
-
CONCEPTUAL BORDER
-
WITS Information Assurance Papers
-
1996 IEEE Computer Society Computer Security Foundations Workshop (CSFW9)
-
Daly Study Plan
-
Potentials OnLine
-
Determinants of Computer Security Practices
-
www.infosoc.co.uk/00106/feature.htm
-
Publication List of Florian Matthes
-
information axioms - papers
-
Concerning Hackers
-
www.infosecuritymag.com/apr99/cover.htm
-
www.cs.georgetown.edu/_denning/infosec/award.html
-
www.infosoc.co.uk/00107/feature.htm
-
ACM Digital Library: Computer security by redefining what a computer is
-
Devost.net - Technical Defense Associates
-
www.cs.unm.edu/_patrik/index.html
-
Some Cautionary Thoughts on Information Warfare
-
ACM Digital Library: New security paradigms: what other concepts do we need as well?
-
Computers & Security, Vol: 14, Issue: 7, 1995
-
Digital Warfare: Using Malicious Computer Code As A Weapon
-
UIS Hires CIS Interns
-
ACM Digital Library: Testing and evaluating computer intrusion detection systems
-
eXaminer.com
-
Information Warfare and International Security
-
CNS - Information Warfare: Hype or Reality?
-
www.ndu.edu/inss/siws/cont.html
-
Information Applications Volume
-
Legion: Technical papers
-
ACM Digital Library: Using standards as a security policy tool
-
Thomas Finne, Computer Support for Information Security Analysis in a Small Business Environment.
-
Thomas Finne, Why Safeguard Information?
-
Riccardo Focardi's Bibliography
-
CORNERSTONES OF INFORMATION WARFARE
-
Keeping Internet-business fraud in check
-
ACM Digital Library: Standardizing information technology security
-
Publications of Professor Stephanie Forrest
-
Globus Papers Page has moved
-
www.kcl.ac.uk/orgs/icsa/Infowar/iwpapers.html
-
HASET Publications
-
ACM Digital Library: Differences between public and private management information systems
-
Papers: UK Government Information (In)Security Organisations
-
ACM Digital Library: A cop on the beat: collecting and appraising intrusion evidence
-
perspective
-
AIC: Trends & Issues in Crime and Criminal Justice
-
AIC: Conference Paper - Computer Crime: A Criminological Overview
-
Cyber Troops and Net War: The Profession of Arms in the Information Age
-
Page has moved
-
Secure Deletion of Data from Magnetic and Solid-State Memory
-
Download page
-
www.cis.morrisville.edu/oneilpa/CIS220/infotech.htm
-
Harknett Paper
-
ps.ucdavis.edu/jciss/risky.html
-
Bulletin #43: Information Warfare
-
1994 Publications of the Network Security Group
-
Publications
-
PARAMETERS, US Army War College Quarterly - Autumn 1998
-
ACM Digital Library: The quest for information technology standards for the global information infrastructure
-
ACM Digital Library: Security is fuzzy!: applying the fuzzy logic paradigm to the multipolicy paradigm
-
Security Protection For Government Networks - Isaac, Gabrielson, Humphrey, Aker
-
ACM Digital Library: The information technology security evaluation criteria
-
Computer: Abstract: Surviving Information Warfare Attacks
-
ACM Digital Library: Trusted recovery
-
Studies in Intelligence Vol. 01 No.1, 1997
-
Exploding the myth of computer and information security..... computer security, information security, intrusion detection, distributed denial of service attackss
-
www.ce.chalmers.se/staff/jonsson/publ97-.html
-
graylit.osti.gov/cgi-bin/dexplhcgi308e.html
-
Companies Strive For Simpler Security
-
CHACS Publications for 1998
-
web.mit.edu/tdqm/papers/other/kaomea.html
-
www.noie.gov.au/projects/information_economy/convergence/index.htm
-
www.cs.virginia.edu/_dmk8r/index.html
-
Government Information Technology Executive Council (GITEC) 1996 IPC Conference
Papers
-
Reflections on Information War, Casualty Aversion, and Military Research and
Development After the Gulf War and the Demise of the Soviet Union, a
publication of the Commonwealth Institute Project on Defense Alternatives
-
Information-Based Warfare: A Third Wave Perspective
-
Page has moved
-
www.infowar.com/info_ops/00/info_ops033000b_j.shtml
-
New Page 1
-
www.cs.cornell.edu/kozen/papers/papers.html
-
SECURITY SCARE - Cover Stories - tfmgr.com
-
www.ndu.edu/inss/strforum/forum105.html
-
www.research.microsoft.com/lampson/Publications.html
-
CHACS Publications for 1993
-
CHACS Publications for 1997
-
CHACS Publications for 1994
-
CHACS Publications for 1990
-
ACM Digital Library: Prospect on security paradigms
-
The Effects of Information Warfare
-
www.law.berkeley.edu/journals/btlj/articles/14_2/Lee/html/text.html
-
papers - libicki1
-
ACIS Paper 3 - CONTENTS
-
Martin C. Libicki
-
C:\Trades\ocean.htm
-
www.cis.morrisville.edu/oneilpa/CIS220/InfoWarfare.htm
-
Digital Systems Research Center: Report 61
-
www.ce.chalmers.se/staff/ulfl/pubs.html
-
Page has moved
-
INFORMATION AGE TERRORISM
-
A New Battlefield: Rethinking Warfare in the Computer Age
-
Distributed Object Computation Testbed (DOCT)
-
INSIGHT: E-Zapper Could Break The Bank [Free Republic]
-
TNO FEL: INTERNET and INTRANET, INSECURITY INSIDE OUT
-
www.cisp.org/imp/september_99/09_99lukasik.htm
-
Raptor Systems, Inc - On Line Library
-
New Page 1
-
CHACS Publications for 1996
-
Hacker Trackers
-
SAIC Strategic Assessment Center - The Competitive Edge
-
CHACS Publications for 1990
-
CHACS Publications for 1999
-
Information Warfare: Impact And Concerns
-
ACM Digital Library: Three paradigms in computer security
-
Defense Department Battles Cybercrime
-
Facts fight fiction in security circles, 3/9/98
-
Software: Abstract: System Insecurity in the Internet Age, pp. 62-69.
-
www.aaas.org/spp/dspp/sfrl/per/per15.htm
-
ASAX Project: Papers and Research Reports
-
OSS Proceedings
-
ACM Digital Library: From Washington: Infowar: AK-47s, lies, and videotape
-
Untitled Document
-
Publications by Clifford Neuman
-
Information Warfare: Planning the Campaign
-
www.ce.chalmers.se/staff/ulfl/group-pubs.html
-
www.ifip.tu-graz.ac.at/TC11/SEC94/roppl.html
-
ACM Digital Library: Defensive information warfare
-
An Analysis of Unclassified Current and Pending Air Force Information Warfare and Information Operations Doctrine
and Policy
-
BeVar Systems, Inc. - Cyberterrorism: A Special Report
-
Security Researchers Aim to Foil Vandals
-
Software: Table of Contents: September/October 1997
-
www.angelfire.com/ia/pinegar/impact.html
-
www.angelfire.com/ia/pinegar/infowar.html
-
Web Review: CyberWar! (1 of 5)
-
CNN - The hacker in all of us - October 12, 1999
-
Computer Security Institute
-
www.kcl.ac.uk/orgs/icsa/Infowar/IWAAS/iwaas.htm
-
mis.deakin.edu.au/pages/staff/pswatman/publications.htm
-
www.informs-cs.org/wsc99papers/prog99.html
-
NCTP: Articles Janet Reno on Cybercrime
-
What Hazards and Disasters are Likely in the 21st Century - or Sooner?
-
Papers
-
www.infowar.com/civil_de/civil1.shtml
-
Toward a Secure System Engineering Methodology
-
The Protection of Information in Computer Systems
-
www.cs.cmu.edu/afs/cs/project/coda/Web/docs-afs.html
-
ACM Digital Library: We need to think about the foundations of computer security
-
Manipulating The OODA Loop: The Overlooked Role of Information Resource
Management in Information Warfare
-
Attack Trees
-
CryptoRhythms
-
Legal, Regulatory, Policy and Organizational Considerations for Assurance
-
Implications of Cyberwar for Nat'l Security & Business
-
www.ict.org.il/articles/infowar.htm
-
Vital Interests, Virtual Threats: Reconciling International Law with Information Warfare and United States Security
-
Journal of Universal Computer Science
-
Tools From the Underground | Page 1 | May 29, 2000
-
www.princeton.edu/_jsimmons/work/jp1.html
-
ANU Reporter
-
www.idsa-india.org/an-content.htm
-
Issues in S and T, Fall 1998, An Electronic Pearl Harbor? Not Likely
-
SE-COM - White Papers
-
www.dsto.defence.gov.au/corporate/publicity/articles/adsn2110.html
-
Computer Immune Systems -- Papers
-
ACM Digital Library: Crisis and aftermath
-
Journal articles
-
Diomidis Spinellis Publications
-
Publications & Products
-
www.emergency.com/2000/cybersec2000.htm
-
www.defensedaily.com/reports/isdoctrine.htm
-
www.airpower.maxwell.af.mil/airchronicles/apj/spr95.html
-
AF2025 v3c3-1 | Information Attack: Information Warfare In 2025 | (Ch 1)
-
Battlefield of the Future
-
IT Pro: Abstract: Basic Intrusion Protection: The First Line of Defense
-
Computer Security Publications & Other Security Publications
-
ACM Digital Library: Stalking the wily hacker
-
Ethical hackers' becoming much in demand
-
ACM Digital Library: Mediators in infrastructure survivability enhancement
-
www.trustedsystems.com/tss_nsa_guide.htm
-
NIST Computer Security Division
-
Special Publications
-
The Village Voice: Machine Age: Hacking the Future
-
Attaining the Knowledege Edge
-
AIC: Conferences - Internet Crime
-
Information Warfare
-
Information Warfare - Part 2
-
Thrasher Thesis
-
www.radiusnet.net/books/index.html
-
graylit.osti.gov/cgi-bin/dexplhcgi5abd.html
-
SIXTH USENIX SECURITY SYMPOSIUM, 1996
-
DSTO On-line Scientific and Technical Reports Database
-
Page has moved
-
www.semper.org/info/index.html
-
ACM Digital Library: A type system for expressive security policies
-
IT: Bytes replace bullets in the new wired warfare
-
www.time.com/time/magazine/archive/toc/950821.toc.html
-