Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint


1.ThinkGeek. Swiss Flash USB Knife,; 2010 [accessed 21.03.10].
2.TechChee. Comb USB flash drive keeps your hair neat always,; 2010 [accessed 21.03.10].
3.Gill NS. The Trojan War and the Trojan Horse,,; 2010 [accessed 21.03.10].
4.Anthology of Swiss banks in fiction. The Bourne Identity Photo Gallery : Laser device projecting a Swiss numbered account number on the wall,; 2010 [accessed 21.03.10].
5.Striphas T. Where the Cylons will come from,; 2010 [accessed 21.03.10].
6.Washington Technology. Want to win big? Call in a tiger team,; 2009 [accessed 22.03.10].
7.Bruce S. “Tiger Team” Reality TV Show,; 2007 [accessed 22.03.10].
8.Rob S. Dateline NBC. Your kid's cyber secret,; 2006 [accessed 23.03.10].
9.Brown S. WarGames: A Look Back at the Film That Turned Geeks and Phreaks Into Stars, Wired,; 2008 [accessed 21.03.10].
10.Richardson WTG. Honey Pots,; 2007 [accessed 21.03.10].
11.Nakashima E. Dismantling of Saudi-CIA Web site illustrates need for clearer cyberwar policies, The Washington Post,; 2010 [accessed 29.03.10].
12.Rivest R. The MD5 Message-Digest Algorithm,; 1992 [accessed 25.03.10].
13.Sotirov A, Stevens M, Appelbaum J, Lenstra A, Molnar D, Osvik D, et al. MD5 considered harmful today; Creating a rogue CA certificate,; 2008 [accessed 27.03.10].
14.Robert B. Super ‘Alias’ will bowl you over, USA Today,; 2003 [accessed 26.03.10].
15.Aislinn S, Telegraph Media Group. Dr Who's David Tenant joins other 10 Time Lords for one-off show,; 2009 [accessed 26.03.10].
16.Passwall. The Net: Suspense,; 2010 [accessed 29.03.10].
17.Top Ten Most Ridiculous Movie Hacks of All Time, Jayson Street, Syngress Phish-wrap,; 2009 [accessed 29.03.10].
18.Nathan D, Redspin Inc. War-Driving,; 2009 [accessed 25.03.10].
19.InfraGard. About InfraGard,; 2010 [accessed 21.03.10].
20.Duncan C, ZDNet. Echelon: Sigint under the spotlight,; 2000 [accessed 21.03.10].
21.Michael W, SANS Institute. Forensics and Perl-Fu,; 2009 [accessed 21.03.10].
22.Cathal K, Toronto S. Cyberspies’ code a click away,; 2009 [accessed 21.03.10].
23.Tobias M, Engadget. The Lockdown: Locked, but not secure (Part 1),; 2006 [accessed 21.03.10].
24.Deviant O. Lockpicking,; 2010 [accessed 29.03.10].



You are currently reading a PREVIEW of this book.


Get instant access to over $1 million worth of books and videos.


Start a Free Trial

  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint