Bibliography

  1. United States. Congress. Senate. Committee on the Judiciary. (2011). Cybercrime updating the Computer Fraud and Abuse Act to protect cyber space and combat emerging threats: Hearing before the Committee on the Judiciary, United States Senate, One Hundred Twelfth Congress, first session, September 7, 2011. (United States. Congress. Senate. S. hrg. ; 112-126. Y). Washington: U.S. G.P.O.
  2. Schirick, E. A. (2012, March-April). Computer network security–evolving risks. Camping Magazine, 85(2), 16+. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA283705723&asid=b563bc7277c447d84029609454b2e55e
  3. United States. Congress. Senate. Committee on Homeland Security Governmental Affairs author. (2017). DHS Stop Asset and Vehicle Excess Act : Report of the Committee on Homeland Security and Governmental Affairs, United States Senate, to accompany H.R. 366 to amend the Homeland Security Act of 2002 to direct the Under Secretary for Management of the Department of Homeland Security to make certain improvements in managing the Department’s vehicle fleet, and for other purposes. (United States. Congress. Senate. Report; 115-32. Y).
  4. Grimes, R. A. (2015, November 9). 10 reasons why phishing attacks are nastier than ever. InfoWorld.com. Retrieved from                                                                          http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA4 1596729&asid=3f53530e427f3b03d56c02fb7d591326
  5. Leithauser, T. (2017, June 12). DHS eyes undoing decision to treat elections as ‘critical infrastructure’. Cybersecurity Policy Report. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA498337750&asid=cdf1f82af1264f1f62411a87147d15b0

Leave a Reply