Washington Post. 1989. "Computer virus strikes Michigan hospital," March 23.

Washington Post. 1990. "Man faces charges of computer fraud," February 4, p. A18.

Washington University Law Quarterly. 1977. "Potential liability: Conclusion," Vol. 405, No. 3, p. 433.

Webb, Ben. 1989. "Plan to outlaw hacking," Nature, Vol. 341, October 19, p. 559.

Weil, Martin. 1989. "Double malfunction grounds thousands," Washington Post, November 4, pp. B1, B4.

Williams, Gurney III. 1988. "UL: What's behind the label," Home Mechanix , pp. 78–80, 87–88.

Winans, Christopher. 1990. "Personal data travels, too, through agencies," Wall Street Journal, March 27, p. B1.

Wines, Michael. 1990. "Security agency debates new role: Economic spying," New York Times, June 18, p. A1.

Wing Jeannette. 1990. "A specifier's introduction to formal methods," IEEE Computer, September.

Wright, Karen. 1990. "The road to the global village," Scientific American, March, pp. 83–94.

Young Catherine L. 1987. "Taxonomy of computer virus defense mechanisms," Proceedings of the 10th National Computer Security Conference, National Bureau of Standards/National Computer Security Center, Baltimore, Md., September 21–24, pp. 220–225.

Young W. D. and J. McHugh. 1987. "Coding for a believable specification to implementation mapping," Proceedings of the 1987 IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, Calif., April 27–29, pp. 140–148.

Youngblut, Christine, et al. 1989. "SDS Software Testing and Evaluation," IDA Paper P-2132, Institute for Defense Analyses, Alexandria, Va., February.

Zachary, G. Pascal. 1990. "U.S. agency stands in way of computer-security tool," Wall Street Journal, July 9, pp. B1, B3.

Zeil, Steven J. 1989. Constraint Satisfaction and Test Data Generation," Old Dominion University, Norfolk, Va.

The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement