Cited: Kastor, Ginger. "Computer Hacking ." 2 Aug. 2002. 8 Mar. 2007 <http://lrs.ed.uiuc.edu/wp/crime-2002/hacking.htm>. Lo , Joseph. "Denial of Service or "Nuke" Attacks." 12 Mar 2005. 2 Apr 2007 <http://www.irchelp.org/irchelp/nuke/>. Palmer, C. C.. "Ethical Hacking." IBM. 13 Apr. 2001. IBM. 15 Mar 2007 <http://www.research.ibm.com/journal/sj/403/palmer.html>. (Script Kiddie. WordSpy. 07 Oct.1998. Paul McFedries and Logophilia Limited . 20 Mar. 2007 <http://www.wordspy.com/words/scriptkiddie.asp>.) "SearchSecurity." Ethical Hacker. 05 Jul. 2006. 15 Mar 2007 <http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci921117,00.html>. Rupley , Sebastian. "Hack Everything." PC Magazine 30 Aug. 2006 22 Mar. 2007 <http://www.pcmag.com/article2/0,1895,2010280,00.asp>. "The Year Hacking Became a Business." The Australian 30 Jan. 2007: 31. Newspaper Source. EbscoHost. Pittsburgh Technical Institute. 15 Mar. 2007 <http://search.ebscohost.com/login.aspx?direct=true&db=nfh&AN=200701301031832081&site=ehost-live>. "White Hat/Black Hat Hackers." CSO Online. The Resource for Security Executives. 22 Mar 2007 <http://www.csoonline.com/glossary/term.cfm?ID=1094>.
Cited: Kastor, Ginger. "Computer Hacking ." 2 Aug. 2002. 8 Mar. 2007 <http://lrs.ed.uiuc.edu/wp/crime-2002/hacking.htm>. Lo , Joseph. "Denial of Service or "Nuke" Attacks." 12 Mar 2005. 2 Apr 2007 <http://www.irchelp.org/irchelp/nuke/>. Palmer, C. C.. "Ethical Hacking." IBM. 13 Apr. 2001. IBM. 15 Mar 2007 <http://www.research.ibm.com/journal/sj/403/palmer.html>. (Script Kiddie. WordSpy. 07 Oct.1998. Paul McFedries and Logophilia Limited . 20 Mar. 2007 <http://www.wordspy.com/words/scriptkiddie.asp>.) "SearchSecurity." Ethical Hacker. 05 Jul. 2006. 15 Mar 2007 <http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci921117,00.html>. Rupley , Sebastian. "Hack Everything." PC Magazine 30 Aug. 2006 22 Mar. 2007 <http://www.pcmag.com/article2/0,1895,2010280,00.asp>. "The Year Hacking Became a Business." The Australian 30 Jan. 2007: 31. Newspaper Source. EbscoHost. Pittsburgh Technical Institute. 15 Mar. 2007 <http://search.ebscohost.com/login.aspx?direct=true&db=nfh&AN=200701301031832081&site=ehost-live>. "White Hat/Black Hat Hackers." CSO Online. The Resource for Security Executives. 22 Mar 2007 <http://www.csoonline.com/glossary/term.cfm?ID=1094>.