Information Technology Reference
In-Depth Information
Trygstad, Ray, 2004, Security Policy , Illinois Institute of Technology, (www.itm.iit.edu/578/
lesson7/lesson07.ppt), accessed June 2004.
U.S. Department of Energy (DoE), 1992, Root cause analysis guidance document .
Whitcomb, Carrie Morgan, Spring 2002 , “An Historical Perspective of Digital Evidence:
A Forensic Scientist's View,” International Journal of Digital Evidence, Volume 1, Issue
1 (www.ijde.org, last accessed March 2008).
Willett, Keith D., and Gardner, Robert K., Risk Analysis and Assessments: Focus on Intelli-
gent, Coordinated, Non-State Adversary , Computer Sciences Corporation, June 2004
Willett, Keith D., July 2000, Applied IP Telephony course developed by Keith D. Willett,
Avaya, Inc.
Willett, Keith D., April 2002, IP Telephony - The Business Case , CTN Technologies, Inc.
Search WWH ::




Custom Search