Chang, R.K. (2002). Defending against flooding-based distributed denial-of-service attacks: A tutorial, IEEE Communication. Mag., 40(10), 42 -- 51.
Dimensional Research. (2008). The Risk of Social Engineering on Information
Technology. Retrieved from http://www.cigital.com/papers/download/ses.pdf
Erickson, K., & Philip, N.H. (2007). "A Case of Mistaken Identity? News Accounts of Hacker and Organizational Responsibility for Compromised Digital Records, 1980-2006." Journal of Computer Mediated Communication, 12 (4), 1229-1247
Gottlieb, P.J.B., CDR. (2010). Cyberspace vs. cyber strategy. American Intelligence
Journal, 28 (2), 18-25.
Molsa, J. (2005). Mitigating Denial of Service. Journal of Computer Security, 13(6), 807-
Hamou-Lhadj, A., & Hamou-Lhadj, A. (2009). A Governance Framework for Building
Secure IT Systems. International Journal of Security and Its Applications, 3(2).
Evans D., & Layne-Farrar, A. (2004), The Battle over Intellectual Property Rights,
Virginia Journal of Law and Technology, 9 (10), 2-28
Safe code. (2008). Software Assurance: An Overview of Industry Best Practice. Retrieved from http://www.safecode.org/publications/SAFECode_BestPractices0208.pdf
Wang, H., & Wang, C. (2003). Taxonomy of Security Considerations and Software
Quality. Communications of the ACM, 46(6), 75-78
Whitmer, G.M. (2007). Inside Security Threats: State CIOs Take Action Now. NASCIO-
Representing Chief information officers of the States. Retrieved from http://www.nascio.org/publications/documents/NASCIO-InsiderSecurityThreats.pdf
BITS. (2011). Malware Risks and Mitigation Reports. Retrieved March 11, 2013 from http://www.nist.gov/itl/upload/BITS-Malware-Report-Jun2011.pdf
Daily Tech. (2012). Apple Admits its Macs Have a Malware Problem. Retrieved March 11, 2013 from http://www.dailytech.com/Apple+Admits+Its+Macs+Have+a+Malware+Problem/article24451.htm
Chadrow, E. (2013). Examining How Facebook Got Hacked. Retrieved March 11, 2013 from http://www.bankinfosecurity.com/examining-how-facebook-got-hacked-a-5518
Cole, E. (2012). Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization. Rockland, MA: Elsevier Science.
Lin, P. (2006). System Security Threats and Control. Retrieved March 10, 2013 from http://www.nysscpa.org/cpajournal/2006/706/essentials/p58.htm
PC World. (2009). Unpatched Applications Are #1 Cyber Security Risk. Retrieved March 9, 2013 from http://www.pcworld.com/article/172082/Unpatched_Applications_Are_1_Cyber_Security_Risk.html
Sans. (n.d.). Survival Time. Retrieved March 10, 2013 from http://isc.sans.edu/survivaltime.html
Swan, D. (2013). Cybersecurity Vulnerabilities Facing IT Managers Today. Retrieved March 9, 2013 from http://www.academia.edu/1416741/Cybersecurity_Vulnerabilities_Facing_IT_Managers_Today
Villasenor, J. (2011). Ensuring Hardware Cybersecurity. Retrieved March 11, 2013 from http://www.brookings.edu/research/papers/2011/05/hardware-cybersecurity
Komunyakaa, Yusef. "Facing it." Literature - Reading, Fiction, Poetry and Drama. 6th edition.
New York: McGraw Hill. 2005. Print.
O'Brien, Tim. The Things They Carried. Broadway Books: Broadway, NY. 1990. Print.
Thomas, Marvin. "Facing it." The Explicator. 61. 4. 2003. Web. http://www.heldref.org/?