Association of Research Libraries (ARL). 1998. (http://arl.cni.org/).
Cheswick, W., and Bellovin, S. M. Firewalls. Scientific American, October 1998:106-107.
Clerck, C. A. 1758. Aranei Svecici descriptionibus et figuris . . . . Stockholm.
Cobb, M. 1998a. Security solution. Security Advisor, Premiere 1998:12-14.
Cobb, M. 1998b. What to look for in an enterprise anti-virus product. Security Advisor, Premiere 1998:28-33.
Ford, W. 1998. Digital certificates. Scientific American, October 1998:108.
Gardner, W., and Rosenbaum, J. 1998. Intellectual property. Database protection and access to information. Science 281:786-787.
Garfinkel, S., and Spafford, G. 1996. Practical UNIX & Internet Security (second edition). O’Reilly & Associates, Inc., Sebastopol, California.
Gosling, J. 1998. The Java sandbox. Scientific American, October 1998:109.
Grossman, W. M. 1998. Cyber View. Y2K: the end of the world as we know it. Scientific American, October 1998:48.
Hartley, B. V. 1998. Get your network ready for e-business. Security Advisor, Premiere 1998:16-18.
Levy, S. 1998. Living with the bugs. Newsweek, August 17, 1998:68.
Linnaeus, C. 1758. Systemae naturae per regna tria naturae, secundum classes, ordines, genera, species cum characteribus, differentiis, synonymis, locis, Editio decima, reformatra, Tomus I (tenth edition). Laurentii Salvii, Holmiae.
McCarthy, L. 1998. Intranet Security: Stories from the Trenches. Sun Microsystems Press, Prentice Hall, Mountain View, California.
Meinel, C. P. 1998a. The Happy Hacker: A Guide to (Mostly) Harmless Computer Hacking. American Eagle Publications, Show Low, Arizona.
Meinel, C. P. 1998b. How hackers break in ... and how they are caught. Scientific American, October 1998:98-105.
Mish, F. C. 1995. Merriam-Webster’s Collegiate Dictionary (tenth edition). Merriam-Webster, Incorporated, Springfield, Massachusetts.
Rivest, R. L. 1998. The case against regulating encryption technology. Scientific American, October 1998:116-117.
TechEncyclopedia. http://www.techweb.com/.
Tilton, C. 1998. Put a finger on your security. Security Advisor, Premiere 1998:40-43.
Wallace, A. R. 1858. On the tendency of varieties to depart indefinitely from the original type. Journal and Proceedings of the Linnaean Society (Zoology) 3:53-62.
Washington Post. 1998. October 5, 1998:A20.
Zimmermann, P. R. 1998. Cryptography on the Internet. Scientific American, October 1998:110-115.