![]() NSTSSI Security Education Standards |
REFERENCES
[CHR90]Interview with Agent Jim Christy, Chief, Air Force Office
of Special Investigations, Computer Crime Division,
26 March 1990.
[DOD85]Department of Defense Trusted Computer System Evaluation
Criteria, DoD 5200.28-STD, Department of Defense,
Washington, DC, December 1985.
[DOJ88]Basic Considerations in Investigating and Proving
Computer-Related Federal Crimes, U.S. Department of
Justice, Justice Management Division, Washington, DC,
November 1988.
[HIG89]Higgins, John C., Information Security as a Topic in
Undergraduate Education of Computer Scientists,
Proceedings of the 12th National Computer Security
Conference, November 1989.
[MAC89]Maconachy, W.V., Computer Security Education, Training,
and Awareness: Turning a Philosophical Orientation
into Practical Reality, Proceedings of the 12th
National Computer Security Conference, November 1989.
[OTA87]U.S. Congress, Office of Technology Assessment, Defending
Secrets, Sharing Data: New Locks and Keys for
Electronic Information, OTA-CIT-310, Washington, DC,
U.S. Government Printing Office, October 1987.
[PFL89]Pfleeger, Charles P., Security in Computing, Prentice-
Hall, 1989.