Thursday, November 19, 2009

Bibliography - Antivirus

Bibliography


'Virus Encounters, 1995: Cost to the World Population'. Testimony, House Subcommittee on Telecommunications and Finance, Tippett, Peter, June 1993.


'The Wildlist'. Maintained by Joe Wells.

'Real World Anti-Virus Product Reviews and Evaluation'. Gordon, Sarah and Ford, Richard, Proceedings of Security on the I-Way, NCSA, 1995.

'An Introduction to General Systems Thinking', p.3, Weinberg, Gerald. John Wiley and Sons, 1975.

'An Introduction to General Systems Thinking', p.51, Weinberg, Gerald. John Wiley and Sons, 1975.

'General Systems Theory: Foundations, Development, Applications', pp.xix-xx, Revised Edition, von Bertalanffy, Ludwig. George Braziller, Inc, 1980.

'Health Promotion Throughout the Lifespan', Edelman, Carole and Mandle, Carole. Mosby, 1994.

'Guide to the Selection of Anti-Virus Tools and Techniques'. Polk, T. and Bassham, L. NIST Special Publication 800-5. NIST, December, 1992.

'Real World Anti-Virus Product Reviews and Evaluation', Gordon, Sarah and Ford, Richard. Proceedings of Security on the I-Way. NCSA, 1995.

'Semantics, Operationalism and the Molecular-Statistical Model in Thermodynamics', Dixon, John and Emery, Alden. American Scientist, 53, 1965.

Quote attributed to Abraham Lincoln.

'Applied General Systems Theory', p.39, Van Gigch. John P. Harper and Row, 1974.

'Applied General Systems Theory', Figure 2.2, Van Gigch. John P. Harper and Row, 1974.

'Directed Graph Epidemiological Models of Computer Viruses', Kephart, Jeffrey O. and White, Steve, R., Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, 1991.

'The Viability and Cost Effectiveness of an 'In the Wild' virus scanner in a Corporate Environment', Gordon, Sarah, 1995.

'Applied General Systems Theory', p.25, Van Gigch. John P. Harper and Row, 1974.

'The Development of Operations Research as a Science', pp.59-60, as cited in [4]. Ackoff, Russell. Scientific Decision Making in Business.

'Some Mathematical Models in Science', Kac, Mark. Science, 166 No. 3906 695, 1969.



About the Author

Sarah Gordon's work in various areas of IT Security can be found profiled in various publications including the New York Times, Computer Security Journal and Virus Bulletin. She is a frequent speaker at such diverse conferences as those sponsored by NSA/NIST/NCSC and DEFCON. Recently appointed to theWildlist Board of Directors, she is actively involved in the development of anti-virus software test criteria and methods. She may be reached assgordon@low-level.format.com

No comments:

Post a Comment