* The Perimeter is Gone
* The Internal Threat
* A Walk on the Wild Side
* Electronic Commerce Crime
* Economic Espionage
* Information Warfare
* Contents of the Intruder's Toolkit
* Countermeasures
* Where to Go From Here
Location
A hard-copy of this is in REC 216
BibTex-formatted data
To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.