Information Technology Reference
In-Depth Information
Trygstad, Ray, 2004,
Security Policy
, Illinois Institute of Technology, (www.itm.iit.edu/578/
lesson7/lesson07.ppt), accessed June 2004.
U.S. Department of Energy (DoE), 1992,
Root cause analysis guidance document
.
Whitcomb, Carrie Morgan, Spring 2002 , “An
Historical Perspective of Digital Evidence:
A Forensic Scientist's View,”
International Journal of Digital Evidence,
Volume 1, Issue
1 (www.ijde.org, last accessed March 2008).
Willett, Keith D., and Gardner, Robert K.,
Risk Analysis and Assessments: Focus on Intelli-
gent, Coordinated, Non-State Adversary
, Computer Sciences Corporation, June 2004
Willett, Keith D., July 2000,
Applied IP Telephony
course developed by Keith D. Willett,
Avaya, Inc.
Willett, Keith D., April 2002,
IP Telephony - The Business Case
, CTN Technologies, Inc.