Further reading
To learn more about the topics that were covered in this chapter, take a look at the following resources:
- Charles Babbage: https://www.computerhistory.org/babbage/
- The Creeper virus: https://www.historyofinformation.com/detail.php?entryid=2860
- ARPANET: https://www.darpa.mil/about-us/timeline/arpanet
- LaPadula model: https://www.sciencedirect.com/topics/computer-science/lapadula-model
- How Alan Turing Cracked The Enigma Code: https://www.iwm.org.uk/history/how-alan-turing-cracked-the-enigma-code
- The Morris Worm: https://www.fbi.gov/news/stories/morris-worm-30-years-since-first-major-attack-on-internet-110218
- The Melissa Virus: https://www.fbi.gov/news/stories/melissa-virus-20th-anniversary-032519
- Titan Rain: https://www.cfr.org/cyber-operations/titan-rain
- WannaCry: https://www.cisa.gov/sites/default/files/FactSheets/NCCIC%20ICS_FactSheet_WannaCry_Ransomware_S508C.pdf
- The untold story of SolarWinds: https://www.npr.org/2021/04...