home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hackers Underworld 2: Forbidden Knowledge
/
Hackers Underworld 2: Forbidden Knowledge.iso
/
UNDERGRD
/
VOL_3
/
CUD336A.TXT
< prev
next >
Wrap
Text File
|
1994-11-01
|
3KB
|
55 lines
Computer Underground Digest--Sat, Oct 12, 1991 (Vol #3.36)
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
CONTENTS, #3.36 ( October 12, 1991)
Subject: File 1-- Intro to Biblio and ResourcesModerators' Corner
Subject: File 2-- General CU-Related Bibliography
Subject: File 3-- Dissertations and Theses
Subject: File 4-- General On-Line and Print Resources
Subject: File 5-- Misc. Books for Fun Reading
Issues of CuD can be found in the Usenet alt.society.cu-digest news
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.20),
chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of
Chicago email server, send mail with the subject "help" (without the
quotes) to archive-server@chsun1.spc.uchicago.edu.
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source
is cited. Some authors do copyright their material, and they should
be contacted for reprint permission. It is assumed that non-personal
mail to the moderators may be reprinted unless otherwise specified.
Readers are encouraged to submit reasoned articles relating to the
Computer Underground. Articles are preferred to short responses.
Please avoid quoting previous posts unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
----------------------------------------------------------------------
Date: 12 Oct 91 11:21:19 CDT
From: Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: Intro to Biblio and ResourcesModerators' Corner
We continually receive requests for information about studies, 'zines
and people doing research on cyber issues. The number of works
appearing in the past two years has dramatically increased. Below is a
select bibliography of some of the oft-cited works. We tried to be
representative rather than inclusive, and selected articles, stories,
or publications that include references to other works or that are
considered classics and must be read to understand the CU. Some
readers may questions the selection or why we excluded particular
items in favor of others. If any glaring omissions occur, send over
your choices and we will add a supplement in a few weeks.
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
+ END THIS FILE +
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=