520 lines
21 KiB
Plaintext
520 lines
21 KiB
Plaintext
|
||
|
||
Computer Underground Digest--Sat, Oct 12, 1991 (Vol #3.36)
|
||
|
||
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
|
||
CONTENTS, #3.36 ( October 12, 1991)
|
||
Subject: File 1-- Intro to Biblio and ResourcesModerators' Corner
|
||
Subject: File 2-- General CU-Related Bibliography
|
||
Subject: File 3-- Dissertations and Theses
|
||
Subject: File 4-- General On-Line and Print Resources
|
||
Subject: File 5-- Misc. Books for Fun Reading
|
||
|
||
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
||
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
||
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
|
||
789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.20),
|
||
chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of
|
||
Chicago email server, send mail with the subject "help" (without the
|
||
quotes) to archive-server@chsun1.spc.uchicago.edu.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source
|
||
is cited. Some authors do copyright their material, and they should
|
||
be contacted for reprint permission. It is assumed that non-personal
|
||
mail to the moderators may be reprinted unless otherwise specified.
|
||
Readers are encouraged to submit reasoned articles relating to the
|
||
Computer Underground. Articles are preferred to short responses.
|
||
Please avoid quoting previous posts unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: 12 Oct 91 11:21:19 CDT
|
||
From: Moderators <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: Intro to Biblio and ResourcesModerators' Corner
|
||
|
||
We continually receive requests for information about studies, 'zines
|
||
and people doing research on cyber issues. The number of works
|
||
appearing in the past two years has dramatically increased. Below is a
|
||
select bibliography of some of the oft-cited works. We tried to be
|
||
representative rather than inclusive, and selected articles, stories,
|
||
or publications that include references to other works or that are
|
||
considered classics and must be read to understand the CU. Some
|
||
readers may questions the selection or why we excluded particular
|
||
items in favor of others. If any glaring omissions occur, send over
|
||
your choices and we will add a supplement in a few weeks.
|
||
|
||
------------------------------
|
||
|
||
Date: 12 Oct 91 11:21:19 CDT
|
||
From: Moderators <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: General CU-Related Bibliography
|
||
|
||
The following list is not intended to be exhaustive, but reflects some
|
||
of the basic resource literature relevant to the Computer Underground
|
||
and related culture. Journalists specializing in media coverage of the
|
||
topic include Joe Abernathy of the Houston Chronicle, John Markoff of
|
||
the New York Times, and John Schnieder of Newsweek, and Adam Gaffin,
|
||
of the Middlesex News (Framingham, Mass). All are accessible on
|
||
internet. Susan Ross (sross@clutx.clarkson.edu) is currently
|
||
comparing Canadian and U.S. civil rights laws as they pertain to
|
||
cyberspace.
|
||
|
||
Allman, William F. 1990. "Computer Hacking goes on Trial." U.S. News
|
||
and World Report, January 22: 25.
|
||
|
||
Barlow, John Perry. 1990 (Forthcoming). "Crime and Puzzlement." Whole
|
||
Earth Review.
|
||
|
||
Bequai, August. 1978. Computer Crime. Lexington (Mass.): Lexington.
|
||
|
||
Bequai, August. 1987. Technocrimes. Lexington (Mass.): Lexington.
|
||
|
||
Bloombecker, Jay. 1988. Interview, Hour Magazine. NBC television,
|
||
November 23.
|
||
|
||
Brunner, John. 1989. The Shockwave Rider. New York: Ballantine.
|
||
|
||
Camper, John. 1989. "Woman Indicted as Computer Hacker Mastermind."
|
||
Chicago Tribune, June 21: II-4.
|
||
|
||
Charles Ess. 1987. "Computers and Ideology: Limits of the Machine."
|
||
Quarterly Journal of Ideology. 11(2): 33-39.
|
||
|
||
"Civil Liberties Hacked to Pieces: Jolyon Jenkins Refuses to Panic
|
||
over Computer Crime." New Statesman & Society, February 9: 27.
|
||
|
||
"Computer Expert's Son Cited as Virus Creator.' 1988. Chicago Tribune,
|
||
November 5: 1, 2.
|
||
|
||
"Computer Hacker Ring with a Bay Area Link." 1990. San Francisco
|
||
Chronicle, May 9: A-30.
|
||
|
||
"Computer Saboteur gets Probation." 1988. Chicago Tribune, Oct. 22: 4.
|
||
|
||
Conly, Catherine H. and J. Thomas McEwen. 1990. "Computer Crime." NIJ
|
||
Reports, 218(January/February): 2-7.
|
||
|
||
Conly, Catherine H. 1989. Organizing for Computer Crime Investigation
|
||
and Prosecution.
|
||
|
||
Cooley, Ronald B. 1984. "RICO: Modern Weaponry against Software
|
||
Pirates." Computer Law-Journal, 5(Fall): 143-162.
|
||
|
||
Denning, Dorothy E. 1990. "Concerning Hackers Who Break into
|
||
Computers Systems." Paper present at the National Computer Security
|
||
Conference, Washington, D.C., Oct. 1-4.
|
||
|
||
Edwards, Lynda. "Samurai Hackers." Rolling Stone, Sept. 19, 1991:
|
||
67-69.
|
||
|
||
Geertz, Clifford. 1973. The Interpretion of Cultures. New York: Basic
|
||
Books. 1973.
|
||
|
||
Gibson, William. 1984. Neuromancer. New York: Ace.
|
||
|
||
"Hacker, 18, Gets Prison for Fraud." 1989. Chicago Tribune, February
|
||
15: III-1.
|
||
|
||
Haffner, Katie and John Markoff. 1991. Cyberpunk: Outlaws and
|
||
Hackers on the Computer Frontier. New York: Simon and Schuster.
|
||
|
||
Harper's Forum. 1990. "Is Computer Hacking a Crime? A Debate from the
|
||
Electronic Underground." Harper's, 280(March): 45-57.
|
||
|
||
Hollinger, Richard C. and Lonn Lanza-Kaduce. 1988. "The Process of
|
||
Criminalization: The Case of Computer Crime Laws." Criminology,
|
||
26(February): 101-126.
|
||
|
||
Hollnger, Richard C. 1990. "Hackers: Computer Heroes or Electronic
|
||
Highwaymen?" Paper presented at the American Society of Criminology
|
||
annual meetings, Baltimore, Nov. 7.
|
||
|
||
Jensen, Eric C. 198?. "An Electronic Soapbox: Computer Bulletin
|
||
Boards and the First Amendment." Federal Communications Law Journal,
|
||
39(3): 217-258.
|
||
|
||
Kane, Pamela. 1989. V.I.R.U.S. Protection: Vital Information
|
||
Resources under Siege. New York: Bantam.
|
||
|
||
Kling, Rob, and Suzanne Iocono. 1988. "The Mobilization of Support
|
||
for Computerization: The Role of Computerization Movements." Social
|
||
Problems, 35(June): 226-243.
|
||
|
||
Landreth, Bill. 1985. Out of the Inner Circle: A Hacker's Guide to
|
||
Computer Security. Belleview (Wash.): Microsoft Press.
|
||
|
||
Langworthy, Robert H. 1989. "Do Stings Control Crime? An Evaluation
|
||
of a Police Fencing Operation." Justice Quarterly, 6(March): 27-45.
|
||
|
||
Levy, Steven. 1984. Hackers: Heroes of the Computer Revolution.
|
||
Garden City: Doubleday.
|
||
|
||
Levy, Steven. 1990. Cloak and Dagger.
|
||
|
||
Markoff, John. 1990a. "3 Arrests Show Global Threat to Computers."
|
||
New York Times, April 4, A1, A11.
|
||
|
||
Markoff, John. 1990a. "3 Arrests Show Global Threat to Computers."
|
||
New York Times, April 4, A1, A11.
|
||
|
||
Markoff, John. 1990b. "Drive to Counter Computer Crime Aims at
|
||
Invaders." The New York Times, June 3: 1, 21.
|
||
|
||
Marx, Gary T. 1988a. Undercover: Police Surveillance in America.
|
||
Berkeley: University of California Press.
|
||
|
||
Marx, Gary T. 1988b. "The Maximum Security Society." Deviance et
|
||
Societe, 12(2): 147-166.
|
||
|
||
Marx, Gary T., and Nancy Reichman. 1985. "Routinizing the Discovery
|
||
of Secrets: Computers as Informants." Software Law Journal, 1(Fall):
|
||
95-121.
|
||
|
||
McEwen, J. Thomas. 1989. Dedicated Computer Crime Units. Washington
|
||
D.C.: National Institute of Justice.
|
||
|
||
Meyer, Gordon R. "Hackers, Phreakers, and Pirates: The Semantics of
|
||
the Computer Age." 1989. Pp. 74-82 in P. Kane, V.I.R.U.S. Protection:
|
||
Vital Information Resources under Siege. New York: Bantam.
|
||
|
||
Meyer, Gordon R. and Jim Thomas. 1989. "Role Differentiation in the
|
||
computer underground." Paper presented at the Society for the Study of
|
||
Social Problems annual meetings, Berkeley, August.
|
||
|
||
Meyer, Gordon R. 1989a. The Social Organization of the computer
|
||
underground. Unpublished Masters Thesis, Northern Illinois University.
|
||
|
||
Michalowski, Raymond J. and Erdwin H. Pfuhl. 1990 (forthcoming).
|
||
"Technology, Property, and Law: The Case of Computer Crime."
|
||
Contemporary Crisis.
|
||
|
||
Pope, Kyle, 1990. "U.S. Computer Investigation Targets Austinites."
|
||
Austin-American Statesman, March 17, Pp A-1, A-12.
|
||
|
||
Parker, Donn B. 1983. Fighting Computer Crime. New York: Charles
|
||
Scribner's Sons.
|
||
|
||
Pfuhl, Erdwin H. 1987. "Computer Abuse: Problems of Instrumental
|
||
Control." Deviant Behavior, 8(2): 113-130.
|
||
|
||
Rosenbaum, Ron. 1971. "Secrets of the Little Blue Box." Esquire,
|
||
76(October): 116-1125, 222-226.
|
||
|
||
Rosenblatt, Kenneth. 1990. "Deterring Computer Crime." Technology
|
||
Review, 93(FebruaryMarch): 34-40.
|
||
|
||
Sandza, Richard. 1984. "Revenge of the Hackers." Newsweek,
|
||
104(December 10): 25.
|
||
|
||
Sandza, Richard. 1984. "The Night of the Hackers." Newsweek,
|
||
104(November 12): 17-18.
|
||
|
||
Schwartz, Eddie. 1988. "Special on 'Computer Hacking.'" WGN Radio,
|
||
Sept 27.
|
||
|
||
Schwartz, John. 1990. "The Hacker Dragnet: The Feds Put a Tail on
|
||
Computer Crooks--and Sideswipe a few Innocent Bystanders." Newsweek,
|
||
April 30: 50.
|
||
|
||
Scientific American. 1991. Special Issue: How to Work, Play and
|
||
Thrive in Cyberspace. September.
|
||
|
||
Sterling, Bruce. 1988. Islands in the Net. New York: Ace Books.
|
||
|
||
Sterling, Bruce. Forthcoming. The Hacker Crackdown: The True Story of
|
||
the Digital Dragnet of 1990 and the Start of the Electronic Frontier
|
||
Foundation.
|
||
|
||
Stoll, Clifford. 1989. The Cuckoo's Egg: Tracking a Spy through the
|
||
Maze of Computer Espionage. New York: Doubleday.
|
||
|
||
Thomas, Jim and Gordon R. Meyer. 1990. "(Witch)Hunting for the
|
||
Computer Underground: Joe McCarthy in a Leisure Suit." The Critical
|
||
Criminologist, 2(September): 7-8, 19-20.
|
||
|
||
Thomas, Jim, and Gordon R. Meyer. 1990a (forthcoming). "The Baudy
|
||
World of the Byte Bandit: A Postmodernist Interpretation of the
|
||
Computer Underground." In F. Schmalleger (ed.), Computers in Criminal
|
||
Justice. Bristol (Ind.): Wyndham Hall.
|
||
|
||
Thomas, Jim, and Gordon R. Meyer. 1990b. "In Defense of the Computer
|
||
Underground: The End of the Frontier?" Paper presented to the American
|
||
Society of Criminology annual conference, Baltimore (November).
|
||
|
||
Tompkins, Joseph B., Jr., and Linda A. Mar. 1986. "The 1984 Federal
|
||
Computer Crime Statute: A Partial Answer to a Pervasive Problem."
|
||
Computer-Law Journal, 6(Winter): 459-481.
|
||
|
||
Van, John. 1989. "Oddballs no More, Hackers are now a Threat."
|
||
Chicago Tribune, March 5, IV: 4.
|
||
|
||
Winter, Christine. 1988. "Virus Infects Huge Computer Network."
|
||
Chicago Tribune, November 4, 1, 18.
|
||
|
||
"Yes, You Sound very Sexy, but I Really Need a Probation Officer."
|
||
1989. Chicago Tribune, June 13, 10.
|
||
|
||
Zablit, Jocelyne. 1989. "Fraud Sweep Nabs 2 Michigan Teens in
|
||
Computer Ring." Detroit Free Press, 25 May: 1, 18.
|
||
|
||
------------------------------
|
||
|
||
Date: 12 Oct 91 11:21:19 CDT
|
||
From: Moderators <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: Dissertations and Theses
|
||
|
||
The following come from International Dissertation Abstracts and from
|
||
persons who responded to our request for information on theses. The
|
||
dissertation list should be fairly complete. It excludes works limited
|
||
to computer crime or computer-mediated communication (contact Bitnet's
|
||
CMC newsgroup for information on CMC). The thesis list is incomplete
|
||
because of the relatively low number of institutions responding. But,
|
||
judging from bibliographies and discussions, there seem to be
|
||
relatively few CU-related theses. ("Dissertations" are normally done
|
||
for a PhD, and "theses" are written for a Master's degree).
|
||
|
||
++++++++++++++++++++++++
|
||
DISSERTATIONS
|
||
++++++++++++++++++++++++
|
||
|
||
Friedman, Batya. 1988. SOCIAL JUDGMENTS AND TECHNOLOGICAL INNOVATION:
|
||
ADOLESCENT'S CONCEPTIONS OF COMPUTER PIRACY AND PRIVACY. (Director:
|
||
none listed). University of California, Berkeley. 186 pp. Order No.
|
||
DA 8916665.
|
||
|
||
Dunn, Thurman Stanley. 1982. METHODOLOGY FOR THE OPTIMIZATION OF
|
||
RESOURCES IN THE DETECTION OF COMPUTER FRAUD. (Directory: Jay F.
|
||
Nunamaker). The University of Arizona. 198 pp. Order No. DA 8305976.
|
||
|
||
Baker, Donald R. 1990. RELATIONSHIP SOF INTERNAL ACCOUNTING CONTROLS
|
||
AND OCCURRENCES OF COMPUTER FRAUD. (Chair: Edward A. Becker). Nova
|
||
University. 133 pp. Order No. DA 9022334.
|
||
|
||
Esquerra, Ronald Lee. 1982. PERSONAL PRIVACY IN A COMPUTER
|
||
INFORMATION SOCIETY. (Director: Jay F. Nunamaker). The University of
|
||
Arizona. 377 pp. Order No. DA 8217495
|
||
|
||
Honan, Ava Smith. 1988. ANALYSIS OF KEYSTROKE PATTERNS FOR THE
|
||
DEVELOPMENT OF A SECURITY SYSTEM FOR VALIDATION OF COMPUTER ACCESS.
|
||
(Chair, Saeed Maghsoodloo). Auburn University. 115 pp. Order No. DA
|
||
8918795.
|
||
|
||
Lu, Wen-Pai. 1986. SECURITY OF COMMUNICATION IN COMPUTER NETWORKS.
|
||
(Director: Malur K. Sundareshan). The University of Arizona. 282 pp.
|
||
Order No. DA 8702350.
|
||
|
||
Pozzo, Maria Mildred. 1990. TOWARDS COMPUTER VIRUS PREVENTION.
|
||
(Chair: David G. Cantor). University of California, Los Angeles. 202
|
||
pp. Order No. DA 9033944
|
||
|
||
Shamp, Scott A. 1989. MECHANOMORPHISM AND THE PERCEPTION OF COMPUTER
|
||
COMMUNICATION PARTNERS (University of Utah). Contact: sshamp@uga.bitnet
|
||
|
||
++++++++++++++++++++++++
|
||
MASTERS' THESES
|
||
++++++++++++++++++++++++
|
||
|
||
Meyer, Gordon. 1988. THE SOCIAL ORGANIZATION OF THE
|
||
COMPUTER UNDERGROUND. (Chair: James Massey). Northern Illinois
|
||
University. Contact: Gordon Meyer: "72307.1502@COMPUSERVE.COM"
|
||
|
||
Wang, Shenhsien J. 1986. DETECTIVE SECURITY SYSTEM THAT MEASURES AND
|
||
PREVENTS NETWORK VIOLATIONS. (Chair: Kenneth C. Kung). Northrop
|
||
University. 109 pp. Order No. MA 132853
|
||
|
||
Lankewicz, Linda Bright. 1986. RESOURCE UTILIZATION AND SECURITY.
|
||
(Major Professor: Marino J. Niccolai). University of South Alabama.
|
||
190 pp. Order No. ??).
|
||
|
||
++++++++++++++++++++++++
|
||
WORKS IN PROGRESS
|
||
++++++++++++++++++++++++
|
||
|
||
(The following include projects in the planning stage as well as
|
||
those nearing completion)
|
||
|
||
William Curran (Arizona State University). Writing a Masters Thesis on
|
||
the introduction of wide area and local nets into the Soviet Union,
|
||
combining technological and sociological analysis that summarizes the
|
||
changes and prospects for early nineties. Contact:
|
||
WCURRAN@CARAT.ARIZONA.EDU
|
||
|
||
Mark Smith (Sociology, University of California, Los Angeles).
|
||
Dissertation (in progress) that focuses on the power and politics of the
|
||
"information society". Recurring themes include the role of time/space
|
||
compression and surveillance in society. Significant influences include
|
||
David Harvey, Michel Foucault, Mark Poster, Herbert expand. One issue
|
||
includes the clash between Enlightenment rhetoric and post-modern
|
||
technology. Contact: SMITHM@DUVM.BITNET
|
||
|
||
Peter S. Markham (University of Melbourne, Dept. of Criminology).
|
||
Masters' Thesis in progress on a comparative study of the
|
||
Criminalisation of Computer Misuse in the United States, United Kingdom
|
||
and Australia. Contact: pmark@ARIEL.UCS.UNIMELB.EDU.AU
|
||
|
||
Elizabeth M. Reid (University of Melbourne). Supervisor: Donna
|
||
Merwick. Honours Thesis on computer-Mediated Communication
|
||
communication processes in synchronous conferencing, including
|
||
computer networks, internet, and electronic mail. The focus is on
|
||
cultural themes of communication, including power, interpreting social
|
||
contexts, socialization and learning, from a deconstructionist
|
||
perspective. ((Moderators' note: We've read a draft, and it's
|
||
first-rate)). Contact: "emr%munagin.ee.mu.oz.au@uunet.uu.net"
|
||
|
||
Paul Taylor (University of Edinburgh). Finishing a dissertation on
|
||
hacking/viruses and the politics behind them. Focus includes hackers
|
||
and their computer security industry counterparts. Examines the issue
|
||
of technological determinism and the "information revolution" and also
|
||
the idea of hackers being perhaps an extension or most recent
|
||
development of an alternative culture. It also raises the whole issue of
|
||
the exact nature of cyberspace and the implications it holds: Are we
|
||
entering a new realm of informational colonialism? What is information?
|
||
Who has rights over it, and are hackers/the computer underground
|
||
fighting a battle of principle the importance of which has passed most
|
||
people by? Contact: "p.a.taylor@edinburgh.ac.uk"
|
||
|
||
Robert Berry (U. of North Carolina at Chapel Hill, Journalism). M.A.
|
||
Thesis on the First Amendment implications of computer-based
|
||
communication technologies. The focus includes a political analysis
|
||
of the history of governmental harassment of hackers and how that
|
||
harassment threatens to infringe the First Amendment rights associated
|
||
with this new technology. The analysis centers around Operation Sun
|
||
Devil and the related prosecutions that have taken place during the
|
||
past few years. Contact: rrberry@SHELTIE.CHAPEL-HILL.NC.US
|
||
|
||
------------------------------
|
||
|
||
Date: 12 Oct 91 11:21:19 CDT
|
||
From: Moderators <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: General On-Line and Print Resources
|
||
|
||
The following "phreak/hacker" newsletters and magazines provide
|
||
insights into the culture of the CU. Some are defunct, others are
|
||
still publishing. An (*) indicates continued publication. (E)
|
||
indicates published in electronic format, (H) indicates hardcopy.
|
||
Most are available in the CuD ftp archives.
|
||
|
||
TAP (*H): General phreak/hack information. Contact TAP, PO Box 20264
|
||
Louisville, KY 40250.
|
||
|
||
ATI (*E): Political oriented posts. Appears every few months. Contact
|
||
gzero@tronsbox.xei.com
|
||
|
||
NIA (Network Information Access) (*E): News digest and p/h
|
||
information.
|
||
|
||
NIA (*E): National Information Access, appears every few months.
|
||
Contact nuchat!samp@uunet.uu.net.
|
||
|
||
P/Hun (E): Five issues appeared. Primarily technical information.
|
||
|
||
PIRATE (E): News related to software piracy. Five issues appeared.
|
||
|
||
LoD/TJ (E): Hacker technical journal with occasional news. Four issue
|
||
appeared.
|
||
|
||
Weltanschaaung (*E): Political and editorial information focusing on
|
||
cyber issues. Began August, 1991. Contact fox@nuchat.sccsi.com
|
||
|
||
2600--The Hacker Quarterly (*H): Quarterly issue devoted to
|
||
hacker-related technical information and news. Contact
|
||
emmanuel@well.sf.ca.us
|
||
|
||
Boardwatch Magazine (*H): Published monthly; Billed as a "guide to the
|
||
world of online services," focus is on BBS world. Essential reading
|
||
for serious modemers. Contact jrickard@teal.csn.org
|
||
|
||
MONDO 2000 (*H): A slick, "postmodernist" oriented magazine, Mondo
|
||
covers music, art, and other cultural topics as well as cyber culture.
|
||
Contact rusirius@well.sf.ca.us
|
||
|
||
EFFECTOR (*HE): The newsletter of the Electronic Frontier Foundation.
|
||
Mainly covers EFF activities and summaries of its involvement in
|
||
various projects. Contact eff@org
|
||
|
||
RISKS Digest (*E): An on-line, moderated newsgroup identifying
|
||
computer risks to society. Available through Usenet. Contact
|
||
risks@csl.sri.com
|
||
|
||
TELECOM Digest (*E): A on-line, moderated newsgroup focusing on
|
||
telecommunications issues and the related social, ethical, and
|
||
political problems. Available through Usenet. Contact
|
||
telecom@eecs.nwu.edu
|
||
|
||
CuD (*EH): On-line magazine/journal specializing in legal, ethical,
|
||
and social issues related to the computer culture. Available through
|
||
Usenet. Contact tk0jut1@mvs.cso.niu.edu.
|
||
|
||
CuD ftp archives (*E): A collection of legal and academic papers and
|
||
phreak/hacker/pirate 'zines and newsletters. Collection also includes
|
||
a variety of state and federal laws and university policies along with
|
||
other CU-related documents. Contact: chsun1.spc.uchicago.edu or
|
||
ftp.cs.widener.edu
|
||
|
||
VIRUS-L Digest: on-line moderated newsgroup for discussions of
|
||
computer viruses. Available through Usenet. Contact virus-l@lehiibm1
|
||
|
||
Comp.org.eff.talk (*E): Unmoderated newsgroup for discussion of issues
|
||
related to cyberspace. Available through Usenet.
|
||
|
||
Computer/Law Journal (*H): Legal journal devoted to all legal aspects
|
||
of computer technology, including security, privacy, and copyright.
|
||
|
||
Chalisti (*E): German hacker newsletter (written in German) covering
|
||
European hacker news and technology.
|
||
|
||
------------------------------
|
||
|
||
Date: 12 Oct 91 11:21:19 CDT
|
||
From: Moderators <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: Misc. Books for Fun Reading
|
||
|
||
(Compiled by "Dark Mage")
|
||
|
||
Title Author
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
Johnny Zed Betancourt, John Gregory
|
||
When Gravity Fails Effinger, George Alec
|
||
The Long Orbit Farren, Mick
|
||
The Company Man Faust, Clifford
|
||
A Death of Honor Faust, Clifford
|
||
Cyber Way Foster, Alan Dean
|
||
Neuromancer Gibson, William
|
||
Mona Lisa Overdrive Gibson, William
|
||
Count Zero Gibson, William
|
||
Burning Chrome Gibson, William
|
||
Barking Dogs Green, Terrence M.
|
||
The Glass Hammer Jeter, K.W.
|
||
Farewell Horizontal Jeter, K.W.
|
||
Bad Voltage Littel, Jonathan
|
||
Armageddon Blues Moran, Daniel Keys
|
||
Emerald Eyes Moran, Daniel Keys
|
||
Yesterdays Pawn Quick, W.T.
|
||
Dreams of Flesh and Sand Quick, W.T.
|
||
Dreams of Gods and Men Quick, W.T.
|
||
Systems Quick, W.T.
|
||
Eclipse Penumbra Shirley, John
|
||
Eclipse Shirley, John
|
||
Little Heroes Spinrad, Norman
|
||
Other Americas Spinrad, Norman
|
||
Islands in the Net Spinrad, Norman
|
||
Mercedes Nights Weaver, Michael D.
|
||
Angel Station Williams, Walter Jon
|
||
Hardwired Williams, Walter Jon
|
||
Voice of the Whirlwind Williams, Walter Jon
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #3.36
|
||
************************************
|
||
|
||
|
||
|