Information Technology Reference
In-Depth Information
[84]
John Leyden. “Second Man Jailed over Scientology DDoS Attacks.” Register , May 25,
2010. www.theregister.co.uk.
[85]
Nate Anderson. “Anon on the Run: How Commander X Jumped Bail and Fled to
Canada.” Ars Technica , December 11, 2012. arstechnica.com.
[86]
Dave Lee. “Jake Davis: Freed Hacker Faces Strict Tech Rules.” BBC, June 24, 2013. www
.bbc.co.uk.
[87]
A. Agresti and B. Presnell. “Misvotes, Undervotes, and Overvotes: The 2000 Presiden-
tial Election in Florida.” Statistical Science 17(4):436-440, 2002.
[88]
Aviel D. Rubin. “Security Considerations for Remote Electronic Voting.” Communica-
tions of the ACM 45(12):39-44, December 2002.
[89]
Sam Hananel. “Thousands to Cast Ballots by Web in 2004.” Associated Press , July 12,
2003.
[90]
Rebecca Mercuri. “A Better Ballot Box?” IEEE Spectrum , pp. 46-50, October 2002.
[91]
Thomas E. Patterson. The Vanishing Voter: Public Involvement in an Age of Uncertainty .
Alfred A. Knopf/Random House, New York, NY, 2002.
[92]
Bureau of Business of Economic Research, University of New Mexico. “Per Capita
Personal Income by State.” April 2, 2013. bber.unm.edu..
[93]
Todd R. Weiss. “N.J. to Get E-voting Paper Trail, but Not until 2008; a Legal Battle
Continues to Try to Put the Law into Effect Sooner.” Computerworld , July 15, 2005.
[94]
Bruce Schneier. “Technology Was Only Part of the Florida Problem.” Computerworld ,
December 18, 2000.
[95]
John Leyden. “Office Workers Give Away Passwords for a Cheap Pen.” Register ,April
17, 2003. www.theregister.co.uk.
[96]
“Fighting the Worms of Mass Destruction.” Economist , pp. 65-67, November 29, 2003.
[97]
Kalamazoo College Information Technology Services. “Computer Virus Policy.” Ac-
cessed July 29, 2011. reason.kzoo.edu.
[98]
Brock Read. “How to Write a Computer Virus, for College Credit.” Chronicle of Higher
Education , January 16, 2004.
 
Search WWH ::




Custom Search