[1] Alef0 , “Computer Recreations,” Software—Practice and Experience, Vol. 2, pp. 93–96, 1972.
[2] A. K. Dewdney , “Computer Recreations: In the game called Core War hostile programs engage in a battle of bits,” Scientific American, pp. 14–22, 1984.
[3] John Walker , “The Animal Episode,” Open letter to A. K. Dewdney, February 1985, www.fourmilab.ch/documents/univac/animal.html.
[4] Rich Skrenta , “Elk Cloner (circa 1982),” www.skrenta.com/cloner.
[5] Jeremy Paquette , “A History of Viruses,” July 2000, www.securityfocus.com/infocus/1286.
[6] Phil Goetz , “Risks Digest,” Volume 6, Issue 71, April 1988, http://catless.ncl.ac.uk/Risks/6.71.html.
[7] Joe Dellinger , “Risks Digest,” Volume 12, Issue 12, September 1991, http://catless.ncl.ac.uk/Risks/12.30.html ...
Get Malware: Fighting Malicious Code now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.