Strategic Security Intelligence


NSTSSI Security Education Standards


Standards

Top - Help

Copyright(c), 1995 - Management Analytics and Others - All Rights Reserved


                              REFERENCES

[CHR90]Interview with Agent Jim Christy, Chief, Air Force Office 
            of Special Investigations, Computer Crime Division, 
            26 March 1990.

[DOD85]Department of Defense Trusted Computer System Evaluation 
            Criteria, DoD 5200.28-STD, Department of Defense, 
            Washington, DC, December 1985.

[DOJ88]Basic Considerations in Investigating and Proving 
            Computer-Related Federal Crimes, U.S. Department of 
            Justice, Justice Management Division, Washington, DC, 
            November 1988.

[HIG89]Higgins, John C., Information Security as a Topic in 
            Undergraduate Education of Computer Scientists, 
            Proceedings of the 12th National Computer Security 
            Conference, November 1989.

[MAC89]Maconachy, W.V., Computer Security Education, Training, 
            and Awareness:  Turning a Philosophical Orientation 
            into Practical Reality, Proceedings of the 12th 
            National Computer Security Conference, November 1989.

[OTA87]U.S. Congress, Office of Technology Assessment, Defending 
            Secrets, Sharing Data:  New Locks and Keys for 
            Electronic Information, OTA-CIT-310, Washington, DC, 
            U.S. Government Printing Office, October 1987.

[PFL89]Pfleeger, Charles P., Security in Computing, Prentice-
            Hall, 1989.