Skip Navigation Links  The Library of Congress >> Researchers
ScienceReference Services (Science, Technology, and Business Division)
  Home >> Tracer Bullets
Science Tracer Bullets Online

Computer Crime and Security

Tracer Bullet 94-1


Library of Congress Standard Disclaimer Unless otherwise noted, the Internet sites listed in this directory are provided by organizations other than the Library of Congress. These links are being offered as a convenience and for informational purposes only; they do not constitute an endorsement or an approval by the Library of Congress of any of the products, services, or opinions of the corporation, organization or individual. The Library of Congress bears no responsibility for the accuracy, legality, or content of the external site or for that of subsequent links. Contact the external site for answers to questions regarding its content.


SCOPE:

High technology has become commonplace in today's environment, and it is no surprise that it has also found its way into the criminal domain. For a new breed of criminals, computers are rapidly becoming the "weapon of choice." There are four major categories of computer crime: internal computer crimes--trojan horses, logic bombs, trap doors, worms, and viruses; telecommunications crimes--phreaking and hacking; computer manipulation crimes that result in embezzlement and fraud; and traditional thefts of hardware and software. Not surprisingly, new computer crimes are stimulating innovative ways to combat it, giving rise to a wide range of advanced computer security systems and techniques as well as the rapid development of computer-related laws and legislation.

This guide to materials about computer crime and security updates and replaces TB 85-4. Not meant to be a comprehensive bibliography, this Tracer Bullet is designed -- as the name of the series implies -- to put the reader "on target."

TOP OF PAGE

INTRODUCTIONS TO THE TOPIC

Beekman, George. Computer security and risks. In his Computer currents: navigating tomorrow's technology. Redwood City, Calif., Benjamin/Cummings Pub. Co., c1994. p. 280-297.
   QA76.5.B3653 1994 and Pamphlet box <SciRR>

   Includes bibliographical references.

Cardinali, Richard. Anatomy of a bug: understanding the computer virus. Computer education, no. 74, June 1993: 12-15.
   QA76.27.C65 and Pamphlet box <SciRR>

Hartson, H. Rex. Computer security. In McGraw-Hill encyclopedia of science and technology. v. 4. 6th ed. New York, McGraw-Hill Book Co., c1987. p. 274-276.

   Q121.M3 1987 <SciRR>

Parker, Donn B. Crime. In Encyclopedia of computer science and technology. v. 6. New York, Marcel Dekker, Inc., c1977. p. 383-403.
   QA76.15.E5 <SciRR>

TOP OF PAGE

SUBJECT HEADINGS

Subject headings used by the Library of Congress, under which books on computer security can be located in most card, book, and online catalogs, include the following:

COMPUTERS--ACCESS CONTROL (Highly relevant)
COMPUTER SECURITY--UNITED STATES (Highly relevant)

   See also the subdivision "Security Measures" under names of individual computers, e.g. "IBM Computers--Security Measures"

COMPUTER VIRUSES--UNITED STATES (Highly relevant)
COMPUTER CRIMES--UNITED STATES (Highly relevant)
COMPUTERS--LAW AND LEGISLATION (Highly relevant)
DATA PROTECTION (Highly relevant)
ELECTRONIC DATA PROCESSING DEPARTMENTS--SECURITY MEASURES (Relevant)
COMPUTER SECURITY--GOVERNMENT POLICY--UNITED STATES (Relevant)
COMPUTERS--ACCESS CONTROL--GOVERNMENT POLICY--UNITED STATES (Relevant)
CRYPTOGRAPHY (Related)
DATA BASE SECURITY (Related)
PRIVACY, RIGHT OF (Related)
TELECOMMUNICATION--LAW AND LEGISLATION--UNITED STATES (Related)

TOP OF PAGE

BASIC TEXTS

Caelli, William, Dennis Longley, and Michael Shain. Information security handbook. Basingstoke, Hants, England, Macmillan Publishers; New York, Stockton Press, 1991. 833 p.
   QA76.9.A25C34 1991

Carroll, John Millar. Computer security. 2nd ed. Boston, Butterworths, c1987. 446 p.
   HF5548.2.C29 1987 <SciRR>
   Bibliography: p. 431-436

Computers under attack: intruders, worms, and viruses. Edited by Peter J. Denning. New York, ACM Press; Reading, Mass., Addison-Wesley, c1990. 554 p.
Includes bibliographical references.
   QA76.9.A25C667 1990 <SciRR>

Defending secrets, sharing data: new locks and keys for electronic information. Washington, Congress of the U.S., Office of Technology Assessment, U.S. Govt. Print. Off., 1987. 187 p.
   QA76.9.A25D44 1987
   "Second component of OTA's assessment of new communications technologies. The first component, The Electronic supervisor: new technologies, new tensions, was published in September 1987."
   Includes bibliographical references.
   Supt. of Docs. no.: Y 3.T 22/2: D 36

TOP OF PAGE
ADDITIONAL TITLES

Computer security products buyers guide. 1992- San Francisco, Calif., Computer Security Institute. annual
   QA76.9.A25B89 <SciRR Computer Shelf>

Hruska, Jan. Computer viruses and anti-virus warfare. 2nd rev. ed. New York, Ellis Horwood, 1992. 224 p.
   QA76.76.C68H78 1992
   Includes bibliographical references.

McAfee, John, and Colin Haynes. Computer viruses, worms, data diddlers, killer programs, and other threats to your system: what they are, how they work, and how to defend your PC, Mac, or mainframe. New York, St. Martin's Press, c1989. 235 p.
   QA76.76.C68M38 1989 <MRCRR>

Nechvatal, James. Public-key cryptography: computer security. Gaithersburg, Md., U.S. Dept. of Commerce, National Institute of Standards and Technology, Washington; U.S. Govt. Print. Off., 1991. 162 p. (NIST special publication, 800-2)
   QC100.U57 no. 800-2
   Bibliography: p. 147-162.

Perry, Robert Louis. Computer crime. New York, F. Watts, 1986. 65 p.
   KF9350.Z9P47 1986
   Bibliography: p. 61-62.
   Examines legal and ethical problems involving computer use, including piracy of hardware and software and the theft of information and electronic funds.

Stang, David J. Network security. 6th ed. Washington, International Computer Security Association, 1992. 298 p.
   TK5105.5.S764 1992 <SciRR>
   Includes bibliographical references.
   See especially p. 49-82, "Regulations, Standards, & Security," and p. 256-272, "Glossary of Networking Terms."

Wack, John P., and Lisa J. Carnahan. Computer viruses and related threats: a management guide. Gaithersburg, Md., U.S. Dept. of Commerce, National Institute of Standards and Technology; Washington, U.S. Govt. Print. Off., 1989. 1 v. (various pagings) (NIST special publication, 500-166. Computer systems technology)
   QC100.U57 no. 500-166 <SciRR>
   Bibliography: p. A1, B1-B2.

TOP OF PAGE
RELATED TITLES

Abrams, Marshall D., and Harold J. Podell. Tutorial computer and network security. Washington, IEEE Computer Society Press; Los Angeles, Calif., c1987. 430 p.
Bibliography: p. 425-430.
   QA76.9.A25A27 1987
   See especially p. 413-424 "Glossary" and p. 429-430, "Recommended Readings."

BloomBecker, Buck. Spectacular computer crimes: what they are and how they cost American business half a billion dollars a year! Homewood, Ill., Dow Jones-Irwin, c1990. 242 p.
   HV6773.2.B55 1990

Forester, Tom, and Perry Morrison. Computer ethics: cautionary tales and ethical dilemmas in computing. 2nd ed. Cambridge, Mass., MIT Press, c1994. 347 p.
   QA76.9.M65F67 1994
   Bibliography: p. 307-331.

Hafner, Katie, and John Markoff. Cyberpunk: outlaws and hackers on the computer frontier. New York, Simon & Schuster, c1991. 368 p.
   QA76.9.A25H34 1991
   Bibliography: p. 347-351.

Landreth, Bill. Out of the inner circle: the true story of a computer intruder capable of cracking the nation's most secure computer systems. Redmond, Wash., Tempus Books; New York, distributed in the U.S. by Harper & Row, c1989. 230 p.
   HF5548.37.L36 1989

Levy, Steven. Hackers: heroes of the computer revolution. Garden City, N.Y., Anchor Press/Doubleday, 1984. 458 p.
   QA76.6.L469 1984
   Bibliography: p. 441-444.

Lundell, Allan. Virus! the secret world of computer invaders that breed and destroy. Chicago, Contemporary Books, c1989. 189 p.
   QA76.76.C68L86 1989
   Bibliography: p. 176.

Mungo, Paul, and Bryan Clough. Approaching zero: the extraordinary underworld of hackers, phreakers, virus writers, and keyboard criminals. New York, Random House, 1992. 247 p.
   HV6773.M86 1992
   Bibliography: p. 245-247.

Sterling, Bruce. The hacker crackdown: law and disorder on the electronic frontier. New York, Bantam Books, 1992. 328 p.
   HV6773.2.S74 1992

Stoll, Clifford. The cuckoo's egg: tracking a spy through the maze of computer espionage. New York, Doubleday, c1989. 326 p.
   UB271.R92H477 1989
   Bibliography: p. 325-326.

Wrobel, Leo Anthony. Writing disaster recovery plans for telecommunications networks and LAN. Boston, Artech House, c1993. 138 p.
   TK5102.5.W77 1993

TOP OF PAGE
SPECIALIZED TITLES

Computer Viruses

Burger, Ralf. Computer viruses and data protection. Grand Rapids, Mich., Abacus, c1991. 353 p.
   QA76.76.C68B88 1991 <SciRR> <MRCRR>

Ferbrache, David. A pathology of computer viruses. London; New York, Springer-Verlag, c1992. 299 p.
   QA76.76.C68F45 1991 <SciRR>
   Bibliography: p. 283-290.
   See especially p. 272-278, "Appendix 14 - Contact Points".

Fites, Philip E., Peter Johnston, and Martin P. J. Kratz. The computer virus crisis. 2nd ed. New York, Van Nostrand Reinhold, c1992. 399 p.
   QA76.76.C68F57 1992 <SciRR> <MRCRR>
   Bibliography: p. 375-385.

Leiss, Ernst L. Software under siege: viruses and worms. Oxford, Eng., Elsevier Advanced Technology, c1990. 132 p.
   QA76.76.C68L45 1990
   Bibliography: p. 125-130.

Louw, Eric, and Neil M. Duffy. Managing computer viruses. Oxford; New York, Oxford University Press, 1992. 171 p.
   QA76.76.C68L68 1992 <MRCRR>
   Bibliography: p. 123-133.

Roberts, Ralph. Compute!'s Computer viruses. Greensboro, N.C., Compute! Books, c1988. 170 p.
   QA76.76.C68R62 1988 <SciRR>

Rogue programs: viruses, worms, and Trojan horses. Edited by Lance J. Hoffman. New York, Van Nostrand Reinhold, c1990. 384 p.
   Includes bibliographical references.
   QA76.76.C68R64 1990 <MRCRR>

Stang, David J. Field guide to computer viruses. 2nd ed. Washington, Virus Research Center of the International Computer Security Association, c1992. 567 p.
   QA76.76.C68S734 1992

Networks

Davies, Donald Watts, and W. L. Price. Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer. 2nd ed. Chichester, Eng.; New York, Wiley, c1989. 377 p.
   TK5105.D43 1989
   Includes bibliographical references.

Davis, Peter T. Complete LAN security control. New York, Windcrest/ McGraw-Hill, c1994. 330 p.
   TK5105.7.D384 1994
   Bibliography: p. 280-291.

Devargas, M. Network security. Manchester, Eng., NCC Blackwell, c1993. 152 p.
   QA76.9.A25D5 1993
   Includes bibliographical references.

Muftic, Sead, and Per Christoffersson. Security mechanisms for computer networks. Chichester, Eng., Ellis Horwood; New York, Halsted Press, 1989. 195 p.
   QA76.9.A25M84 1989
   Bibliography: p. 182-189.

Peltier, Thomas R. Policies & procedures for data security: a complete manual for computer systems and networks. San Francisco, Miller Freeman Inc., c1991. 168 p.
   QA76.9.A25P47 1991
   Bibliography: p. 157.

Purser, Michael. Secure data networking. Boston, Artech House, c1993. 241 p.
   TK5105.5.P87 1993
   Bibliography: p. 233-235.
   See p. 233-235 for a list of relevant standards from ANSI, CCITT, CCMA, ISO, and other standards organizations.

Schweitzer, James A. Protecting information on local area networks. Boston, Butterworths, c1988. 138 p.
   TK5105.7.S39 1988
   Bibliography: p. 107-108.

Security in communications networks: conference transcript, 9th September 1986, London. London, IBC Technical Services, c1986. 144 p.
   TK5102.5S39 1986
   Includes bibliographical references

Laws and Legislation

American Bar Association. Task Force on Computer Crime. Report on computer crime. Washington, The Task Force, 1984. 51, 12, 6 p.
   HV6773.A44 1984
   Includes bibliographical references.

Bequai, August. Technocrimes. Lexington, Mass., Lexington Books, c1987. 192 p.
   HV6773.B48 1987
   Bibliography: p. 181.

Branscomb, Anne W. Rogue computer program--viruses, worms, Trojan horses, and time bombs: prank, prowess, protection or prosecution? Cambridge, Mass., Program on Information Resources Policy, Harvard University, Center for Information Policy Research, c1989. 83 p. (Incidental paper, 1-89-3 (Sept. 1989))
   KF390.5.C6B68 1989
   Errata slip inserted.
   Bibliography: p. 75-83.

The Computer and the law. Compiled and edited by Irving J. Sloan. London, New York, Oceana Publications, 1984. 141 p. (Legal almanac series, no. 83)
   KF9350.C64 1984

Computer crime: electronic fund transfer systems and crime. Prepared by Kent W. Colton and others. Washington, U.S. Dept. of Justice, Bureau of Justice Statistics, U.S. Govt. Print. Off., 1982. 182 p.
   HV6769.C64 1982
   "Prepared for the Bureau of Justice Statistics, U.S. Department of Justice by Public Systems Evaluation, Inc., and supported by grant number 80-BJ-CX-0026."
   Bibliography: p. 125-137.
   Supt. of Docs. no.: J 29.2:El 2

Guide to the prosecution of telecommunication fraud by the use of computer crime statutes. Chicago, Section of Science and Technology,
   American Bar Association, c1989. 33 p.
   KF9350.Z9G85 1989

Perry, William E. Understanding computer crime. Editor, Joyce W. Masterson. Dallas, Tex., Chantico Pub. Co., c1986. 75 p. (Critical technology report, no. C-11-86)
   HV6773.2.P47 1986
   Bibliography: p. 72-75.

Prevention and prosecution of computer and high technology crime. Stanley S. Arkin and others. New York, M. Bender, 1988- 1 v. (loose-leaf)
   KF9350.P74 1988

United States. Congress. House. Committee on the Judiciary. Subcommittee on Criminal Justice. Computer virus legislation: hearing before the Subcommittee on Criminal Justice of the Committee on the Judiciary, House of Representatives, One Hundred First Congress, first session, on H.R. 55 and H.R. 287 ... November 8, 1989. Washington, U.S. Govt. Print. Off., 1990. 128 p.
   KF27.J859 1989b
   Includes bibliographical records.

TOP OF PAGE
HANDBOOKS

Cobb, Stephen. The Stephen Cobb complete book of PC and LAN security. Blue Ridge Summit, Pa., Windcrest; TAB, Software Dept. [distributor], c1992. 556 p.
   TK5105.7.C62 1990 <SciRR>
   Bibliography: p. 546.

Computer virus desk reference. Homewood, Ill., Business One Irwin. 1992- annual.
   QA76.76.C68C66 <SciRR>

Haynes, Colin. The computer virus protection handbook. San Francisco, SYBEX, c1990. 192 p. + 1 computer disk (5 1/4 in.)
   QA76.76.C68H39 1990 <SciRR> <MRCRR>
   System requirements for computer disk (ViruScan and Virus simulation suite): IBM PC or clone; DOS; floppy or hard disk system.
   For computer disk see <MRCRR>.

Highland, Harold Joseph. Computer virus handbook. Oxford, Eng., Elsevier Advanced Technology, c1990. 375 p.
   QA76.76.C68H54 1990
   Includes bibliographical references.

Levin, Richard B. The computer virus handbook. Berkeley, Osborne McGraw-Hill, c1990. 411 p.
   QA76.76.C68L48 1990 <MRCRR>

Parker, Donn B. Computer crime: criminal justice resource manual. Report contributors, David C. Smith, Geoffrey W. Turner, Sanford Sherizan [i.e. Sherizen]. 2nd ed. Washington, U.S. Dept. of Justice, National Institute of Justice, Office of Justice Programs, 1989. 221 p.
   HV6773.P36 1989 <SciRR>
   Bibliography: 137-138.
   Supt. of Docs. no.: J 28.23:C 73/4
   See especially p. xiii-xx, "Glossary of technical terms."

Stang, David J. ICSA's computer virus handbook. 2nd ed. Washington, Virus Research Center of the International Computer Security Association, c1992. 224 p.
   QA76.76.C68I37 1992
   Rev. ed. of Computer viruses, 1991.
   Bibliography: p. 197-199.

TOP OF PAGE

CONFERENCE PROCEEDINGS

Conference Papers Index (1978- )
   Z7403.C84 <SciRR A&I>

Directory of Published Proceedings. Series SEMT: Science / engineering / medicine / technology. (1965- )
   Z7409.D56 <SciRR A&I>

Index to Scientific & Technical Proceedings (1978- )
   Z7403.I4 <SciRR A&I>

Proceedings in Print (1964- )
   Z7503.A2P7 <SciRR A&I>

TOP OF PAGE

SELECTED CONFERENCE PROCEEDINGS

Aerospace Computer Security Applications Conference. Proceedings. Washington, IEEE Computer Society Press, 1985- annual.
   QA76.9.A25A38a

Computer Security Foundations Workshop (6th, 1993, Franconia, N.H.). Computer Security Foundations Workshop VI: proceedings: Franconia, New Hampshire, June 15-17, 1993. Sponsored by the IEEE Computer Society. Los Alamitos, Calif., IEEE Computer Society Press, c1993. 163 p.
   QA76.9.A25C638 1991
   Includes bibliographical references.

European Symposium on Research in Computer Security (2nd, 1992, Toulouse, France). Computer security, ESORICS 92: Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992: proceedings. Y. Deswarte, G. Eizenberg, J.-J. Quisquater, eds. Berlin; New York, Springer-Verlag, c1992. 450 p. (Lecture notes in computer science, 648).
   QA76.9.A25E98 1992
   Includes bibliographical references.

IFIP TC11 International Conference on Information Security (8th, 1992, Singapore). IT security: the need for international cooperation: proceedings of the IFIP TC11 Eighth International Conference on Information Security, IFIP/Sec '92, Singapore, 27-29 May 1992. Edited by Guy G. Gable, William J. Caelli. Amsterdam; New York, North-Holland, 1992. 495 p. (IFIP transactions. A, Computer science and technology, A-15)
   QA76.9.A25I45 1992
   Includes bibliographical references.

International Carnahan Conference on Security Technology. Proceedings. Lexington, KY, OES Publications, 1933- annual.
   TH9701.I56a

IEEE Computer Society Symposium on Research in Security and Privacy. Proceedings. Los Alamitos, Calif., IEEE Computer Society Press, 1986 - annual.
   QA76.9.A25S94a

Symposium on Computer Security: Threats and Countermeasures (1990: Rome, Italy). Symposium on Computer Security: Threats and Countermeasures: Rome, Italy, November 22-23, 1990: proceedings. Rome, Italy, Fondazione Ugo Bordoni, 1991. 207 p.
   QA76.9.A25S936 1990
   Includes bibliographical references.

Workshop LANSEC '89 (1989, Karlsruhe, Germany). Local area network security: Workshop LANSEC '89, European Institute for System Security (E.I.S.S.), Karlsruhe, FRG, April 3-6, 1989: proceedings. T. A. Berson, T. Beth (eds.). Berlin, New York, Springer-Verlag, c1989. 152 p. (Lecture notes in computer science, 396)
   TK5105.7.W65 1989
   Includes bibliographical references.

World Conference on Computer Security, Audit, and Control (9th, 1992, London, England). Proceedings of Compsec International 1992. Oxford, Eng., Elsevier Advanced Technology, c1992. 494 p.
   QA76.9.A25W68 1992
   Includes bibliographical references

TOP OF PAGE

BIBLIOGRAPHIES

Beasley Library. Computers and the law: an annotated bibliography of materials in the Beasley Library of the University of Western Australia. Compiled by Paul Genoni. Perth, Library of the University of Western Australia, c1984. 48 p.
   Includes bibliographical references.
   K564.C6A12 1984
   Annotated listing of all books on computers and the law held in the Beasley Library of the University of Western Australia.

Best, Reba A., and D. Cheryn Picquet. Computer crime, abuse, liability, and security: a comprehensive bibliography, 1970-1984. Jefferson, N.C., McFarland, c1985. 155 p.
   Z5703.4.C63B47 1985

Best, Reba A., and D. Cheryn Picquet. Computer law and software protection: a bibliography of crime, liability, abuse, and security, 1984 through 1992. Jefferson, N.C.; London, McFarland, 1993. 239 p.
   K564.C6A125 1993 <SciRR>
   Continuation of: Computer crime, abuse, liability, and security, published in 1985.

Bibliography of selected computer security publications, January 1980-October 1989: computer security. Rein Turn, compiler; Lawrence E. Bassham, editor. Gaithersburg, Md., U.S. Dept. of Commerce, National Institute of Standards and Technology; Washington, U.S. Govt. Print. Off., 1990. 1 v. (various pagings) (NIST special publication, 800-1)
   QC100.U57 no. 800-1 <SciRR>

Deighton, Suzan. Privacy and computers: a bibliography. London, The Library, Institution of Electrical Engineers, 1978. 97 p.
   Z7164.L6D38

Deighton, Suzan. The new criminals: a bibliography of computer related crime. London, Institution of Electrical Engineers, 1978. 23 p.
   Z5703.4.C63D44

Flaherty, David H. Privacy and data protection: an international bibliography. With the assistance of Terence J. Donohue and Peter J. Harte. White Plains, N.Y., Knowledge Industry Publications, 1984. 276 p.
   Z7164.L6F57 1984

Galin, Joseph J. Computers and the law: a selected bibliography. Monticello, Ill., Vance Bibliographies, 1985. 13 p. (Public administration series--bibliography, P-1627)
   KF390.5.C6A124 1985

LaGasse, Charles E. The computer resource guide. 1988 ed. Concord, Mass., Computer Insights, c1987. 84 p.
   Z5640.L34 1987

Lin, Joseph C. Computer crime, security, and privacy: a selected bibliography. Monticello, Ill., Vance Bibliographies, 1979. 22 p. (Public administration series--bibliography, P-284)
   Z5703.4.C63L56

MacCafferty, Maxine. Computer security. London, Aslib, 1976. 91 p. (Aslib bibliography; no. 4)
   Z5640.M32

Vance, Mary A. Computer crime. Rev. ed. of P 1255. Monticello, Ill., Vance Bibliographies, 1988. 35 p. (Public administration series--bibliography, P-2355)
   Z5703.4.C63V36 1988

TOP OF PAGE

GOVERNMENT PUBLICATIONS

CIS Index to Publications of the United States Congress (1970- )
   KF49.C62 <MRR> <N&CPR> and CD-ROM <MRR>

Monthly Catalog of United States Government Publications (1895- )
   Z1223.A18 <SciRR> <MRR> and CD-ROM <N&CPR>

TOP OF PAGE

SELECTED GOVERNMENT PUBLICATIONS

United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Telecommunications and Finance. Computer viruses: hearing before the Subcommittee on Telecommunications and Finance of the Committee on Energy and Commerce, House of Representatives, One Hundred First Congress. Washington, U.S. Govt. Print. Off., 1989-1990. 2 v.
   KF27.E555 1989h
   Includes bibliographical references.
   Supt. of Docs. no.: Y 4.En 2/3:101-71

United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Technology and Competitiveness. Computer security: hearing before the Subcommittee on Technology and Competitiveness of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Second Congress, first session, June 27, 1991. Washington, U.S. Govt. Print. Off., 1991. 157 p.
   KF27.S39955 1991i
   Includes bibliographical references.
   Supt. of Docs. no.: Y 4.Sci 2:102/42

United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Technology and Competitiveness. Computer Security Act of 1987: report. Prepared by the Subcommittee on Technology and Competitiveness; transmitted to the Committee on Science, Space, and Technology, House of Representatives, One Hundred Second Congress, second session. Washington, U.S. Govt. Print. Off., 1992. 15 p.
   KF390.5.C6A25 1992
   Includes bibliographical references.
   Supt. of Docs. no.: Y 4.Sci 2:102/M

United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Transportation, Aviation, and Materials. Implementation of the Computer Security Act: hearing before the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science, Space, and Technology, House of Representatives, One Hundredth Congress, second session, September 22, 1988. Washington, U.S. Govt. Print. Off., 1989. 112 p.
   KF27.S3997 1988i
   Supt. of Docs. no.: Y 4.Sci 2:100/146

United States. Congress. House. Committee on Small Business. Subcommittee on Regulation and Business Opportunities. Small business and computer crime: hearing before the Subcommittee on Regulation and Business Opportunities of the Committee on Small Business, House of Representatives, One Hundredth Congress, first session, Washington, DC, November 16, 1987. Washington, U.S. Govt. Print. Off., 1988. 120 p.
   KF27.S675 1987b
   Bibliography: p. 119-120.
   Supt. of Docs. no.: Y 4.Sm 1:100-38

United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology and the Law. The Computer Abuse Amendments Act of 1990: hearing before the Subcommittee on Technology and the Law of the Committee on the Judiciary, United States Senate, One Hundred First Congress, second session, on S. 2476 ... July 31, 1990. Washington, U.S. Govt. Print. Off., 1991. 110 p. (Senate hearing, 101-1276)
   KF26.J8745 1990
   Bibliography: p. 81-87.
   Supt. of Docs. no.: Y 4.J 89/2:Shrg.101-1276

United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology and the Law. Computer viruses: hearing before the Subcommittee on Technology and the Law of the Committee on the Judiciary, United States Senate, One Hundred First Congress, first session, on the impact of computer viruses and other forms of computer sabotage or exploitation on computer information systems and networks, May 15, 1989. Washington, U.S. Govt. Print. Off., 1991. 94 p. (Senate hearing, 101-1267)
   KF26.J8745 1989
   Includes bibliographical references.

United States. General Accounting Office. Computer security: virus highlights need for improved internet management: report to the chairman, Subcommittee on Telecommunications and Finance, Committee on Energy and Commerce, House of Representatives. United States General Accounting Office. Washington, GAO, 1989. 48 p.
   QA76.76.C68U55 1989

TOP OF PAGE

ABSTRACTING AND INDEXING SERVICES

Abstracting and Indexing Services that index relevant journal articles and other literature are listed below. Suggested terms are given as aids in searching. Note: See a Science reference librarian for location of indexes in the Science Reading Room

ABI/Inform
   CD-ROM <B&E> <N&CPR>

See: Computer Privacy

   Computer Security
Computer Viruses
Data Encryption
Crime

ACM Guide to Computing Literature (1977- )
   QA75.5.A75a <SciRR A&I>

See: (in key word index)

   Crime
Encryption
Privacy
Security
Viruses

Applied Science and Technology Index (1913- )
   Z7913.I7 <SciRR A&I> <MRR> <N&CPR> and CD-ROM <SciRR>

See: Computer Crimes

   Computer Fraud
Computer Networks--Access Control
Computer Viruses
Cryptography
Electronic Data Processing
Right of Privacy

Computer Abstracts (1957- )
   Z6654.C17C64 <SciRR A&I>

See: Computer Crime

   Law
Privacy
Security

Computer and Control Abstracts (Science Abstracts--Series C) (1968- )
   QA76.C548 <SciRR A&I> and CD-ROM <SciRR>

See: Computer Crime

   Computer Viruses
Cryptography
Data Privacy
Legislation
Security of Data

Computer and Information Systems Abstracts (1962- )
   QA76.I46 <SciRR A&I>

See: Computer Crime

   Computer Viruses
Laws and Legislation
Security of Data
Security Systems

Computing Reviews (1960- )
   QA76.C5854 <SciRR A&I>

See: E.3 Data Encryption

   K.5 Legal Aspects of Computing
K.6 Management of Computing and Information Systems

Engineering Index (1884- )
   Z5851.E62 <SciRR A&I> and CD-ROM <SciRR>

See: Computer Crime

   Computer Crime--Viruses
Computer Networks--Security
Computer Software--Security Systems
Computers--Security
Electronic Crime Countermeasures
Network Security
Security and Privacy Management

INSPEC
   CD-ROM <SciRR>

See: Computer Crime

   Computer Virus Infection
Computers--Government Policies
Data Privacy
Legislation
Security of Data

Magazine Index (1979- )
   Available in several formats in LC

See: Computer Crimes

   Computer Security
Computer Viruses
Encryption
Right of Privacy

Reader's Guide to Periodical Literature (1900- )
   AI3.R48 <B&E> <MRR> <N&CPR>

See: Computer Crimes

   Computer Passwords
Computer Programs--Unauthorized Use
Computer Viruses
Computers--Security Measures
Cryptography
Right of Privacy

Wilson Business Abstracts (1982- )
   CD-ROM <B&E>

See: Computer Crimes

   Computer Hackers
Computer Security Systems
Computers--Security Measures
Computers and Privacy
Encryption

TOP OF PAGE

TECHNICAL REPORTS

Technical reports and other types of literature are indexed in the following guides:

Government Reports Announcements & Index (1946- )

   Z7916.G78 <SciRR A&I> and CD-ROM <SciRR>
   See: Computer Privacy

Computer Security
Computer Viruses
Cryptography
Encryption

Monthly Catalog of United States Government Publications (1885- )

   Z1233.A18 <SciRR A&I> and CD-ROM <MRR> <N&CPR>

   See: Computer Crimes

Computer Security
Computer Viruses
Computers--Access Control
Computers--Law and Legislation--United States
Cryptography
Privacy, Right Of--United States

TOP OF PAGE

SELECTED TECHNICAL REPORTS
The following selected technical reports are available in the microform collection of the Science Reading Room. They are sold by the National Technical Information Service, Springfield, Virginia 22161.

Anderson, M. Some comments on techniques for resisting computer viruses. Technical report. Electronics Research Lab., Adelaide, Australia, September 1989. 27 p.
   AD-A221-097

Computer Fraud. Cleveland, Ernst and Whinney, 1987. 55p.
   PB87-184909

Denning, Peter J. Stopping computer crimes. Moffett Field, Calif., Research Institute for Advanced Computer Science, November 28, 1989. 13p.
   NASA-CR-188896
   N92-116573

Green, James L., and others. The Father Christmas worm. Greenbelt, Md., National Aeronautics and Space Administration, Goddard Space Flight Center, June 1989. 8 p.
   NASA-TM-107938
   N92-282672

Hochberg, Judith A. Addressing the insider threat. Los Alamos, NM, Los Alamos National Lab., 1993. 17p.
   LA-UR-93-1181
   DE93-012626

Johnson, David R., and others. Computer viruses: legal and policy issues facing colleges and universities. American Council on Education, Washington, United Educators Insurance, Chevy Chase, Md., May 1989. 17 p.
   ED314-069

Polk, W. Timothy. Automated tools for testing computer system vulnerability. Final rept. Gaithersburg, Md., National Institute of Standards and Technology, December 1992. 42p.
   PB93-146025

Polk, W. Timothy, and Lawrence E. Bassham III. Guide to the selection of anti-virus tools and techniques. Special pub. Gaithersburg, Md., National Institute of Standards and Technology (CSL), December 1992. 49p.
   PB93-152049

Privacy and Security Research Group workshop on network and distributed systems security: proceedings. Lawrence Livermore National Lab., Calif. 1993. 135p.
   CONF-93-0245
   DE93-010504

Privacy protection in the United States: a 1991 survey of laws and regulations affecting privacy in the public and private sector including a list of all relevant officials. Prepared by Ronald L. Plesser and Emilio W. Cividanes. Gaithersburg, Md., National Institute of Standards and Technology, February 1992. 107 p.
   PB92-173228

Report of the NSF/NIST workshop on NSFNET/NREN security. Held on July 6-7, 1992. Ames, Iowa, Iowa State University, Dept. of Computer Science, May 1993. 88 p.
   PB93-2228682

Sinisi, Michael J. Network security issues. (Master's thesis). Wright-Patterson AFB, OH, Air Force Institute of Technology, 1989. 140 p.
   AD-A219-182

Stevens, D. F. Who goes there? A Dialogue of questions and answers about benign hacking. Lawrence Berkeley Lab., Calif., April 1987. 12 p.
   CONF87-12092
   "DE87-009643"

TOP OF PAGE

JOURNALS

Journals that often contain relevant articles include the following:

ACM Computing Surveys
QA76.5.C617
Communications of the ACM QA76.A772
Computer TK7885.A1I5
Computer Control Quarterly QA76.9.A25C632
Computer Security Alert QA76.9.A25C637
Computer Security Journal QA76.9.A25C65
Computers & Security QA76.9.A25C664
Datamation T175.M26
Information Management and Computer Security T58.64.I5
Journal of Systems Management HD28.S953
Proceedings of the IEEE TK5700.I6
Virus Bulletin QA76.76.C68V57
Virus News and Reviews QA76.76.C68V58

TOP OF PAGE

SELECTED JOURNAL ARTICLES

Adam, John A. Threats and countermeasures. IEEE spectrum, v. 29, Aug. 1992: 21-28.
   TK1.I15 and Pamphlet box <SciRR>

Becker, Louise Giovane. Computer crime. Congressional Research Service review, v. 4, July-Aug. 1983: 21-22.
   JK1.U54a

Benjamin, R. Security considerations in communications systems and networks. IEE Proceedings. I, communications, speech and vision, v. 137, no. 2: p. 61-72.
   TK1.I3817

BloomBecker, J. J. Short-circuiting computer crime. Datamation, v. 35, Oct. 1, 1989: 71-72.
   T175.M26

Brownstein, Ronald. Computer communications vulnerable as privacy laws lag behind technology. National journal, v. 16, Jan. 14, 1984: 52-57.
   JK1.N28

David, Jon. Virus alert! The state of the black art. Accounting technology, v. 9, Oct. 1993: 76-80.
   HF5679.C587

Davis, Morgan. Terminal illness. (computer viruses) (includes related article on safety software; another related article discusses legislation - the Computer Virus Eradication Act of 1989 and the Computer Fraud and Abuse Act of 1986). A+, v. 7, Apr. 1989: 48-
   QA76.8.A66A19

De Laurentiis, Joanne. Privacy in an electronic world: why financial institutions must take leadership. World of banking, v. 12, Sept./Oct. 1993: 28-30+.
   HG1501.W67

Francett, Barbara. Security in open times: can you loosen the bolts without disarming the locks? Computerworld, v. 23, Oct. 23, 1989: 75-77.
   QA76.C5816

Francis, Bob. The search for client/server security. Datamation, v. 39, May 1, 1993: 39-43.
   T175.M26

Glynn, Elizabeth A. Computer abuse: the emerging crime and the need for legislation. Fordham urban law journal, v. 12, no. 1, 1983-1984: 73-101.
   K6.O73

Grimm, Rudiger. Security on networks: do we really need it? Computer networks and ISDN systems, v. 17, Oct. 10, 1989: 315-323.
   TK5015.5.C647

Hernandez, Ruel Torres. ECPA and online computer privacy. Federal communications law journal, v. 41, Nov. 1988: 17-41.
   K6.E29

Jobusch, David L., and Arthur E. Oldehoeft. A survey of password mechanisms: weaknesses and potential improvements. Part 1. Computers & security, v. 8, Nov. 1989: 607-611.
   QA76.9.A25C664

Jones, David C. Unauthorized computer access problem mounts. National underwriter, v. 97, May 31, 1993: 10.
   HG8011.N35

Katz, J. E. Social aspects of telecommunications security policy. IEEE technology and society magazine, vol. 9, no. 2:16-24.
   T14.5.I35

Lunt, Teresa F. A survey of intrusion detection techniques. Computers & security, v. 44, June 1993: 405-418.
   QA76.9.A25C664

Manuel, Tom. Computer security. Electronics, v. 57, Mar. 8, 1984: 121-140.
   Pamphlet box <SciRR>

Merrick, Bill. Electronic funds transfer: biometrics, neural networks poised to fight fraud. Credit union magazine, v. 59, Nov. 1993: 33-34.
   HG2033.B7

Messmer, Ellen. U.S. government seeks new global security guidelines. Network world, v. 10, Sept. 13, 1993: s61.
   QA76.C5816

Nicholson, Cynthia K. Computer viruses: information age vulnerability and the technopath. American criminal law review, v. 27, no. 3, 1990: 525-543.
   K1.M43 and Pamphlet Box <SciRR>

Parker, Donn B. The many faces of data vulnerability. IEEE spectrum, v. 21, May 1984: 46-49.
   TK1.I15 and Pamphlet Box <SciRR>

Price, R. Leon, and others. Computer fraud in commercial banks: management's perception of risk. Journal of systems management, v. 40, Oct. 1989: 28-33.
   HD28.S953

Radigan, Joseph. The growing problem of electronic theft. United States banker, v. 103, June 1993: 37-38.
   HG1.U5

Rosenstein, Samuel. The Electronic Communications Privacy Act of 1986 and satellite descramblers: toward preventing statutory obsolescence. Minnesota law review, v. 76, June 1992: 1451-1481.
   K13.I55

TOP OF PAGE
SELECTED MATERIALS

Selected materials available in the Science Reading Room pamphlet boxes include the following:

Adam, John A. Cryptography = privacy? IEEE spectrum, v. 29, Aug. 1992: 29-35.

Adam, John A. Data security. IEEE spectrum, v. 29, Aug. 1992: 18-20.

Benjamin, Louise M. Privacy, computers, and personal information: toward equality and equity in an information age. Communications and the law, v. 13, June 1991: 3-16.

BloomBecker, J. J. Buck. Cracking down on computer crime. State legislatures, v. 14, Aug. 1988: 10-13.

Branscomb, Anne W. Common law for the electronic frontier. Scientific American, v. 265, Sept. 1991: 154-157.

Computer security bibliography. Northboro, Mass., Computer Security Institute, 1977. 10 p.

Flanagan William G., and Brigid McMenamin. The playground bullies are learning to type. Forbes, Dec. 21, 1992: 184-189.

Glynn, Elizabeth A. Computer abuse: the emerging crime and the need for legislation. Fordham urban law journal, v. 12, 1983-84: 73-102.

Kapor, Mitchell. Civil liberties in cyberspace. Scientific American, v. 265, Sept. 1991: 158-160, 162, 164.

Kephart, Jeffrey, O., Steve R. White, and David M. Chess. Epidemiology of computer viruses. IEEE spectrum, v. 30, May 1993: 20-26.

Martinott, Robert T., and John M. Winton. Getting a lock on computer security. Chemical week, v. 141, Oct. 28, 1987: 26-28, 30-33.

Neumann, Peter G. Inside risks: fraud by computer. Communications of the ACM, v. 35, Aug. 1992: 154.

Resource guide: virus protection for networks. Byte, v. 18, May 1993: 144.

Rotenberg, Marc. Communications privacy: implications for network design. Communications of the ACM, v. 18, Aug. 1993: 61-

A security roundtable. IEEE spectrum, v. 29, Aug. 1992: 41-44.

Security Systems Service. In Small Business Sourcebook. v. 1. 5th ed. Detroit, Mich., Gale Research Co., c1992. p. 1553-1562.
Includes lists of primary associations, educational programs, sources of supply, tradeshows and conventions, and research centers.

Shakelford, Steve. Computer related crime: an international problem in need of an international solution. Texas international law journal, v. 27, no. 2, spring 1992: 479-505.

TOP OF PAGE

ADDITIONAL SOURCES OF INFORMATION

National Institute of Standards and Technology (NIST)
Gaithersburg, MD 20899
NIST Computer Security BBS: 301-948-5717 or 301-948-5140 (9600 baud)
Internet: http://csrc.ncsl.nist.gov

Computer Technology Association of America
1616 North Fort Myer Dr.
Suite 1300
Arlington, VA 22209
Tel: 703-522-5055

Computer Security Institute
600 Harrison St.
San Francisco, CA 94107
Tel: 415-905-2626

TOP OF PAGE

Top of Page Top of Page
  Home >> Tracer Bullets
  The Library of Congress >> Researchers
   June 5, 2014
Legal | External Link Disclaimer

Contact Us:  
Ask a Librarian