REFERENCES
- Dorothy F. Denning, Information Warfare and Security, Addison Wesley Longman Inc., Massachusetts, 1999, p.280. Also read pp.214–216 for a detailed account on the methodology employed by the Morris worm (exploiting a flaw in the Unix Sendmail daemon) to perform a buffer overflow attack.
- Izhar Lev & Michael Knights, Computer Viruses: E- biological Warfare, Janes Intelligence Review, March 2001.
- Cited in TA Balasubramanian ”Time to call the corporate virus busters”, Economic Times, New Delhi, 20 Sep 2001.
- Carolyn Meinel, Code Red for the Web, Scientific American, October 2001
- Ibid, As quoted by David Moore, Senior Technical Manager at California based Cooperative Association for Internet Data Analysis
- Ibid. Also visit www.incidents.org for details.
- For more details of the MSN incident see Prashant Bakshi, Microsoft Hacker trouble, Financial Express. New Delhi, November 8 2000. Accessible at www.financialexpress.com
- Alvin Toffler, War and Anti War: Survival at the Dawn of the 21st Century
- n.5
- Yashwant Deva, Secure or perish (Ocean Books, New Delhi, 2001), pp 63–84.
- ‘Cyberterrorism’—Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services, US House of Representatives by Dorothy F. Denning, Georgetown University. Also see Dorothy Denning, N.2, pp.68–76.
- James Adams, Virtual Defense, Foreign Affairs, May / June 2001. Also see by the same author, The Next World War (Simon & Schuster, New York, 1998), pp. 187–91.
- Report warns of Al Qaeda's potential Cyber Capabilities, News Article, dated January 09, 2002 at www.infowar.com.
- Ibid.
- CSI/FBI survey 2001 can be downloaded from the CSI website www.gocsi.com