Readings

  1. "Stung by Spam Attacks, Businesses Head to Court," Computerworld, August 18, 1997 (www.computerworld.com), pgs. 1 and 16.

  2. "Internet Providers Fight Back Against Spammers," Computerworld, August 18, 1997 (www.computerworld,com), p. 17.


  3. "Where Is Our Data?" Secure Computing, August, 1997, pages 18-23.

  4. "Security on the Web," Secure Computing, August, 1997, pages 42-44.

  5. "Cyber Terrorism," Secure Computing, July, 1997, pages 22-28.

  6. Firewalls for the Year 2000 and Beyond, Secure Computing, July, 1997, pages 46-57.

  7. "Don’t Get Spammed," Information Week, August 18, 1997, pages 53-64.

  8. "Body Language…Biometrics," Information Week, August 18, 1997, pages 36-48.

  9. "How to Develop a Comprehensive Business Resumption Plan at a Large Organization," Disaster Recovery Journal, (DRJ), Summer, 1997, pages 29-34.

  10. "Training Your Business Continuity Teams," Disaster Recovery Journal (DRJ), Summer, 1997, pages 35-37.

©1997 James Madison University