Chanen, David. (12 September 2000). "Man accused of hacking into nuclear weapons lab; Federal agents arrested a Bloomington resident they say got into computers in California. National security wasn't threatened, FBI says." Star Tribune. Minneapolis, MN
Hackers" (2006). [Online available]
Hacker: Computer Security" (2006). [Online available] (http://en.wikipedia.org/wiki/Hacker_(computer_security)
Hannemyr, Gisle. (1999). "Technology and Pleasure Considering Hacking Constructive." [Online available]
Levy, Stephen. (1984). "Hackers: Heroes of the Computer Revolution." New York: Anchor Press/Doubleday.
Stone, David. (1999). "Computer Hacking." University Laboratory High School, Urbana, IL. [Online available]
Hackingalert.com. "History of Hacking." http://www.hackingalert.com/hacking-articles/history-of-hacking.php
Tippit, Inc. "Top Ten Most Famous Hackers of All Time." http://www.itsecurity.com/features/top-10-famous-hackers-042407/
Trigaux, Robert. "A History of Hacking." St. Petersburg Times. 2000. http://www.sptimes.com/Hackers/history.hacking.html
Anonymous. (2010, December 4). China leadership 'orchestrated google hacking'. Retrieved
Bright, P. (2011, March). Anonymous speaks: the inside story of the HBGary hack. Retrieved from http://arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars
Palmer, C. (2001). Ethical hacking. IBM Systems Journal, 40(3), 769-780.
Stern, R. (2010, December 13). Gawker security breach: we're here to help. Retrieved from http://gawker.com/5713056/gawker-security-breach-were-here-to-help
Tate, R. (2010, June 9). Apple's worst security breach: 114,000 iPad owners exposed. Retrieved from http://gawker.com/5559346/apples-worst-security-breach-114000-iPad-owners-exposed
Palmer, C.C. (2001). Ethical hacking. IBM Systems Journal. 40(1): 769-780.
Bishop, M. (2007). About penetration testing. Security and Privacy IEEE. 5(6): 84-87.
Whitman, M.E. (2011). An etymiological view of ethical hacking. In Whitman M.E., & Mattord, H.J. (Eds.) Readings and cases in information security: Law and ethics. Boston, MA: Cengage Learning.
Caldwell, T. (2011). Ethical hackers: Putting on the white hat. Net work Security. 7: 10-13.
Knight, W. (2009). License to hack. Infosecurity. 6(6): 38-41.