NOTES

A large portion of the articles and references in this list are freely available online through the links noted.

Chapter 1

1. Federal Information Security Modernization Act of 2002, 44 U.S.C. §3542.

2. Spafford, Eugene. “Quotable Spaf.” Updated June 7, 2018. https://spaf.cerias.purdue.edu/quotes.html.

3. Parker, Donn B. Fighting Computer Crime. Hoboken, NJ: Wiley, 1998.

4. Munroe, Randall. “Password Strength.” xkcd: A Webcomic of Romance, Sarcasm, Math, and Language, accessed July 2, 2019. https://xkcd.com/936/.

Chapter 2

1. Cisco, Talos Intelligence Group. “Email & Spam Data.” Accessed July 2, 2019. https://www.talosintelligence.com/reputation_center/email_rep.

2. Pascual, Al, Kyle Marchini, and Sarah Miller. “2018 Identity Fraud: Fraud ...

Get Foundations of Information Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.