- Aho, Alfred V., Brian W. Kernighan, and Peter J. Weinberger,
The
AWK Programming Language,
Addison-Wesley Publishing Company, 1988.
- Authors, Various,
UNIX Security Mailing List/Security Digest,
December 1984-present.
- Baldwin, Robert W.,
Rule Based Analysis of Computer Security,
Massachusetts Institute of Technology, June 1987.
- Grampp, F. T. and R. H. Morris, ``UNIX Operating System Security,''
AT&T Bell Laboratories Technical Journal, October 1984.
- Kaplilow, Sharon A. and Mikhail Cherepov, ``Quest—A Security
Auditing Tool,''
AT&T Bell Laboratories Technical Journal,
AT&T Bell Laboratories Technical Journal, May/June 1988.
- Smith, Kirk, ``Tales of the Damned,''
UNIX Review,
February 1988.
- Spafford, Eugene, Kathleen Heaphy and David Ferbrache,
Computer
Viruses: Dealing with Electronic Vandalism and Programmed Threats,
ADPASO, 1989.
- Spence, Bruce, ``spy: A UNIX File System Security Monitor,''
Proceedings of the Large Installation Systems Administration III
Workshop, Usenix Association,
September, 1988.
- Thompson, Ken, ``Reflections on Trusting Trust,''
27
(8),
Communications of the ACM,
August 1984.
- Wood, Patrick and Stephen Kochran,
UNIX System Security,
Hayden
Books, 1986.
- Wood, Patrick, ``A Loss of Innocence,''
UNIX Review,
February 1988.