JonesF.‘Nowhere to Run… Nowhere to Hide: The Vulnerability of CRTS, CPUs and Peripherals to Tempest Monitoring in the Real World’. Internethttp://www.thecodex.com/c-tempest.htm. 1996.
4.
SmithRGMedical Discipline: The Professional Conduct Jurisdiction of the General Medical Council, 1858–1990, Oxford, Clarendon Press, 1994.
5.
CloughBMungoP.Approaching Zero: Data Crime and the Computer Underworld. London: Faber and Faber, 1992.
6.
DayK.‘Defending Yourself and Your Organisation From Information Warfare’, paper presented to the Information Warfare and Competitive Intelligence Conference. Sydney: 27–28 November, 1996.
7.
SmithRG‘Internet Piracy’. Trends and Issues in Crime and Criminal Justice. Canberra: Australian Institute of Criminology, No. 65, 1997.
8.
DaviesS.Monitor: Extinguishing Privacy on the Information Superhighway. Sydney: Pan Macmillan Australia, 1996.
9.
VarneyC.‘Regulating Cyberspace: An Off the Record Interview with Federal Trade Commissioner Christine Vamey’Computer Underground Digest, 25 March, no. 8(24), 1996.
10.
SchwartauW.Information Warfare: Chaos on the Electronic Superhighway. Arlington: American Society for Industrial Security, 1995.
11.
ShenonP.‘World Trade Centre Suspect Linked to Plan to Blow Up Two Planes’. New York Times, 26 March, p. 37., 1995.
12.
General Medical Council. Good Medical Practice. London: General Medical Council, 1995.
13.
British Medical Association Medical Ethics Today: Its Practice and Philosophy. London: British Medical Association, 1993.