| ANDE72 | Computer Security Technology Planning Study, EDS-TR-73-51, Vol. 1, Anderson, J.P., Hanscom AFB, Massachusetts, 1972. | 
| CC | Common Criteria for Information Technology Security Evaluation (aligned with ISO/IEC International Standard (IS) 15408), Version 2.1, August 1999. The CC consists of four volumes available at, e.g., http://www.radium.ncsc.mil/tpep/library/ccitse/, and at http://csrc.nist.gov/cc/ccv20/ccv2list.htm#CCV21. | 
| DoD88 | Security Requirements for Automated Information Systems, DOD Directive 5200.28, 21 March 1988. | 
| Howard 97 | Howard, J. D., An Analysis of Security Incidents on the Internet: 1989-1995, Ph.D. Theses, Carnegie Mellon University, 1997. | 
| IETF99 | R. Shirey, Internet Security Glossary, Internet 
      Engineering Task Force, 17 October 1999.  Available at http://www.ietf.org/internet-drafts/draft-shirey-security-glossary-02.txt | 
| ITSEC | Information Technology Security Evaluation Criteria (ITSEC), Version 1.2, 1991. | 
| Krsul 98 | Krsul, I.V., Software Vulnerability Analysis, Ph.D. Thesis, Purdue University, 1998. | 
| Longstaff 97 | Longstaff, T., Update: CERT/CC Vulnerability Knowledgebase, DARPA Workshop, Savannah, Georgia, 1997. | 
| NCSC87 | Trusted Network Interpretation, NCSC-TG-005, National Computer Security Center, July 1987. Available at http://www.radium.ncsc.mil/tpep/library/rainbow/index.html#TG005. | 
| NCSC88 | Glossary of Computer Security Terms, National Computer Security Center, NCSC-TG-004. Available at http://www.radium.ncsc.mil/tpep/library/rainbow/index.html#TG004. | 
| NCSC92 | A Guide to Understanding Security Modeling in Trusted Systems, National Computer Security Center, NCSC-TG-004, October 1992. Available at http://www.radium.ncsc.mil/tpep/library/rainbow/index.html#TG010. | 
| Neumann 89 | Neumann, P.G., and D.B. Parker, "A Survey of Computer Abuse Techniques," Proceedings of the 12th National Computer Security Conference, Pages 396-407, 1989. | 
| NIST74 | Guidelines for Automatic Data Processing Physical Security and Risk Management, National Institute of Standards and Technology (NIST), Federal Information Processing Standards Publication (FIPS PUB) 31, June 1974. | 
| Perry 84 | Perry, T., and P. Wallich, Can Computer Crime be Stopped?, IEEE Spectrum, No. 21, Vol. 5, 1984. | 
| Power 96 | Power, R., Current and Future Danger: A CSI Primer of Computer Crime and Information Warfare, CSI Bulletin, 1996. | 
| TCSEC | Trusted Computer System Evaluation Criteria (TCSEC), December 1985, DOD 5200.28-STD. Available at http://www.radium.ncsc.mil/tpep/library/rainbow/index.html#STD520028. |