Information Technology Reference
In-Depth Information
[84]
John Leyden. “Second Man Jailed over Scientology DDoS Attacks.”
Register
, May 25,
2010.
www.theregister.co.uk.
[85]
Nate Anderson. “Anon on the Run: How Commander X Jumped Bail and Fled to
Canada.”
Ars Technica
, December 11, 2012. arstechnica.com.
[86]
Dave Lee. “Jake Davis: Freed Hacker Faces Strict Tech Rules.” BBC, June 24, 2013.
www
[87]
A. Agresti and B. Presnell. “Misvotes, Undervotes, and Overvotes: The 2000 Presiden-
tial Election in Florida.”
Statistical Science
17(4):436-440, 2002.
[88]
Aviel D. Rubin. “Security Considerations for Remote Electronic Voting.”
Communica-
tions of the ACM
45(12):39-44, December 2002.
[89]
Sam Hananel. “Thousands to Cast Ballots by Web in 2004.”
Associated Press
, July 12,
2003.
[90]
Rebecca Mercuri. “A Better Ballot Box?”
IEEE Spectrum
, pp. 46-50, October 2002.
[91]
Thomas E. Patterson.
The Vanishing Voter: Public Involvement in an Age of Uncertainty
.
Alfred A. Knopf/Random House, New York, NY, 2002.
[92]
Bureau of Business of Economic Research, University of New Mexico. “Per Capita
Personal Income by State.” April 2, 2013. bber.unm.edu..
[93]
Todd R. Weiss. “N.J. to Get E-voting Paper Trail, but Not until 2008; a Legal Battle
Continues to Try to Put the Law into Effect Sooner.”
Computerworld
, July 15, 2005.
[94]
Bruce Schneier. “Technology Was Only Part of the Florida Problem.”
Computerworld
,
December 18, 2000.
[95]
John Leyden. “Office Workers Give Away Passwords for a Cheap Pen.”
Register
,April
17, 2003.
www.theregister.co.uk.
[96]
“Fighting the Worms of Mass Destruction.”
Economist
, pp. 65-67, November 29, 2003.
[97]
Kalamazoo College Information Technology Services. “Computer Virus Policy.” Ac-
cessed July 29, 2011. reason.kzoo.edu.
[98]
Brock Read. “How to Write a Computer Virus, for College Credit.”
Chronicle of Higher
Education
, January 16, 2004.