Published Works

Books | White Papers | Journal Articles | Papers & Newsletters

Peter is an internationally published writer for the listed books, white papers, magazines and journals. He has a reputation in the computer security world of being a straight shooter with experience.


Books

Peter is a natural as a writer and enjoys doing it; however, creating and heading his companies does not afford him that luxury. He wrote the white papers listed in this profile and is presently co-authoring a technical book on the subject of pattern analysis.

 

Published Title
2017 How to Build an Electronic Witness Well for Radionics (E-Well) (Mastering Radionics Series) (Volume 2)by Peter Radatti
2017 A Fun Course in Beginning Radionics: Miracles in the palms of your hands (Mastering Radionics Series) (Volume 1)by Peter Radatti
2014 VFind Security Tool Kit Handbook (5th Edition): Unix Linux Server Computer Security (Volume 1)by Peter Radatti
2008 Transportation SecurityButterworth-Heinemann Homeland Security Seriesby Clifford R. Bragdon

Chapter 8 – Computer and Transportation Systems Security

Pages 185 to 203

2004 Coauthoring a technical book presently being writtenon the subject of pattern analysis.Topic: Automated Computer Pattern Analysis
2004 Principal Author
“Quick Training Handbook for the VFind SecurityTool Kit(s) Volume 1CyberSoft Operating Corporation
1997 “VFind User’s Guide and Installation Manual Revised Edition”CyberSoft, Inc.
1996 “Protection Against Hostile Algorithms in UNIX Software”pp. 102-110
Information Protection and Network Security
edited by Viktor E. Hampel,Clifford B. Neuman, John P. BarlowProceedings of SPIE volume 2616The International Society for Optical Engineering
1996 “A Short Discussion on the Plausibility of UNIX Virus Attacks”pp. 167-174″Information Warfare: Cyberterrorism: Protecting Your Personal Security in the Electronic Age 2/E”

Winn Schwartau

Thunder’s Mouth Press

1995 “VFind User’s Guide and Installation Manual”CyberSoft, Inc.


White Papers

Journal Articles

Peter has had his articles and papers translated into several foreign languages, including Japanese, and have been distributed worldwide. His white papers have been cited in doctorial theses. Even though he is modest and unassuming, he enjoys a preeminent reputation in the computer security fileld.

 

Published Title
October 1998 The 12 Step CureUnisys World October 1998
February 1998 That Old 12-Step ProgramSun Server February 1998
October 1997 Mister Mean the HackerPublication: ;login: vol. 22, no. 5,October 1997, pp. 49-51
October 1996 Security: Use Common SensePublication: Sun Server vol. 10, no. 10,October 1996, pp. 20, 23
May 1996 How to Win the Computer Security GamePublication: The Sun Observer vol. 10, no. 5, May 1996, pp. 12-13
October 1995 SAP Program Brings It All TogetherPublication: The Sun Observer vol. 9, no. 10, October 1995, pp. 18, 20
June 1995 Manipulating Files’ ContentsPublication: The Sun Observer vol. 8, no. 6, June 1995, pp. 17, 22
June 1995 The Facts of Life, ArtificialPoint & Click June 1995, pp. 8-9
May 1995 Exploring Unix CommandsPublication: The Sun Observer vol. 8, no. 5, May 1995, p. 25
March 1993 Cohen/Radatti on Unix and VirusesPublication: The Risks Digest vol. 14, no. 37
May 1992 Computer Virus Awareness for UNIXPublication: NCSA News vol. 3, no. 8
May 1992 Budding Programmers Should Learn to Fry an EggPublication: The Sun Observer vol. 5, no. 5, May 1992, p. 44
February 1992 Staying Alive With Your ‘Obsolete’ SystemPublication: The Sun Observer vol. 5, no. 2, February 1992, pp. 45, 47
December 1991 Solving Moderate System ProblemsPublication: The Sun Observer vol. 4, no. 12, December 1991, pp. 53-4
November 1991 System Architecture: Standalone vs. NetworkPublication: The Sun Observer vol. 4, no. 11, November 1991, p. 48
August 1991 Offline Backups Are No Laughing MatterPublication: The Sun Observer vol. 4, no. 8, August 1991, pp. 42-3
July 1991 Writing csh Programs by Applying Unix Script LanguagePublication: The Sun Observer vol. 4, no. 7, July 1991, pp. 62-3, 70
June 1991 Lengthy Tasks May Execute Well in the BackgroundPublication: The Sun Observer vol. 4, no. 6, June 1991, pp. 55, 57
May 1991 Following the Proper Path Through the SunOS HierarchyPublication: The Sun Observer vol. 4, no. 5, May 1991, pp. 72-3
January 1991 Disk Partitionings Made Easy By Counting Disk BlocksPublication: The Sun Observer vol. 4, no. 1, January 1991, p. 54
November 1990 Built-In Tools – Accessing a Rolodex, a Calculator and a CursorPublication: The Sun Observer vol. 3, no. 11, November 1990, p. 61
October 1990 Routines Help Identify UsersPublication: The Sun Observer vol. 3, no. 10, October 1990, p. 60
September 1990 Powering Down On a Network: Don’t Just Pull the Plug!Publication: The Sun Observer vol. 3, no. 9, September 1990, p. 45
July 1990 Unix System, IBM-PC Confusion Ends With AppearancePublication: The Sun Observer vol. 3, no. 7, July 1990, pp. 64, 66
June 1990 A Look at cron, Nice, Sleep – the Timer UtilitiesPublication: The Sun Observer vol. 3, no. 6, June 1990, p. 49
May 1990 Do You Understand SunOS? Time For a Mid-Term ExamPublication: The Sun Observer vol. 3, no. 5, May 1990, pp. 75, 86
April 1990 Thinking of the Network As the Ultimate ResourcePublication: The Sun Observer vol. 3, no. 4, April 1990, pp. 58, 66
February 1990 Backing Up Regularly An Important Habit to FormPublication: The Sun Observer vol. 3, no. 2, February 1990, pp. 58-9
January 1990 Mounting Disks Easy To Do Once You Know the BasicsPublication: The Sun Observer vol. 3, no. 1, January 1990, pp. 56-7
October 1989 Danger, Frustration AvertedPublication: The Sun Observer vol. 2, no. 10, October 1989, pp. 39-40
September 1989 Unix’ Background Processing an Easy-to-Use Time SaverPublication: The Sun Observer vol. 2, no. 9 September 1989, pp. 54-5
September 1989 The Pros and Cons of FiberopticsPublication: The Sun Observer vol. 2, no. 9, September 1989, pp. 20-8, 48-9
August 1989 Manipulating Unix Files and Their AttributesPublication: The Sun Observer vol. 2, no. 8, August 1989, pp. 50-1
August 1989 A Winner! The TrailBlazer Plus can pay for itself in savings on long distancePublication: The Sun Observer vol. 2, no. 8, August 1989, pp. 13-5, 36
July 1989 Getting Started with SunOSby Peter V. RadattiPublication: The Sun Observer vol. 2, no. 7, July 1989, pp. 57-8
March 1989 An Introduction to viPublication: The Sun Observer vol. 2, no. 3, March 1989, p. 4
February 1989 “A Short Index to the Sun User Group’s Public Domain Software Library”Publication: The Sun Observer vol. 2, no. 2, February 1989, pp. 40, 46
May 1987 How to Control the Cursor Function of the 186 NGENPublication: Convergent World vol. 5, no. 5, May 1987, p. 31
April 1987 Golden Keyboard Awards Salute Best Products in Convergent CommunityPublication: Convergent World vol. 5, no. 4, April 1987, pp. 9, 15
March 1987 WpConvert Helps to Gather TRASHPublication: Convergent World vol. 5, no. 3, March 1987, p. 23
December 1986 Why Sremmagorps Dance the Winchester ShufflePublication: Unisys World vol. 7, no. 12, p. 9
October 1986 Looking at the Big Blue World From an XE520Burroughs World vol.7, no. 10, pp. 18-21Convergent World vol. 4, no. 10, pp. 14-17
April 1986 Hexadecimal MadnessPublication: Business microWorld vol. 4, no. 4, p. 36
March 1986 Programming in the Public Domainby Peter V. RadattiPublication: Business microWorld vol. 4, no. 3, pp. 34-35
February 1986 Of Sealing Wax and Expo KingsPublication: Business microWorld vol. 4, no. 2, p. 42
January 1986 Centronics Standard Interface and the B25/NGENPublication: Business microWorld vol. 4 no. 1, p. 33
December 1985 The First Annual Golden Keyboard AwardsPublication: Business microWorld vol. 3, no. 12, p. 28
August 1985 Library Utility ProgramsPublication: Business microWorld vol. 3, no. 8, p. 43
July 1985 Undocumented Features of the C/BTOS Operating SystemPublication: Business microWorld vol. 3, no. 7, p. 41
June 1985 Printer Selection from BASICPublication: Business microWorld vol. 3, no. 6, pp. 22-3
May 1985 More SubroutinesPublication: Business microWorld vol. 3, no. 5, pp. 24-6
March 1985 More SubroutinesPublication: Business microWorld vol. 3, no. 3, pp. 23-5
February 1985 PROC-like Languages and Commands of the MonthPublication: Business microWorld vol. 3, no. 2, pp. 36-7
January 1985 Double Precision FORTRANPublication: Business microWorld vol. 3, no. 1, pp. 25-9
January 1985 Making Life Easier for the B25 FORTRAN UserPublication: Business microWorld vol. 3, no. 1, pp. 16-8
October 1984 Fortran on BTOS Release 3.0Publication: Business microWorld vol. 2, no. 10, p. 35
September 1984 Multiplan Graphics: Charting the ‘Plan’Publication: Business microWorld vol. 2, no. 9, pp. 10-12
September 1984 MS-Dos Pseudo IBM PCPublication: Business microWorld vol. 2, no. 9, pp. 8-9
September 1984 Plot It!Publication: Business microWorld vol. 2, no. 9, p. 12
August 1983 Running WordStar Under TP/MPublication: Microsystems vol. 4, no. 8, pp. 120-21


Papers & Newsletters

In the early years when he had just started up his companies, Peter had some time to devote to writing and did so. As the business grew, it demanded more and more of his time. In 1999, he decided to withdraw from writing any more papers or articles to concentrate
on growing his fledgling company.

Published Title
1998 Malicious Software in Multi-Vendor Networks
An Opinion on the State of Patents inthe Antivirus Industry
November 1997 The Fallacy of Computer Virus Disinfection
June 1995 VFind User’s Guide and Installation Manual
December 1989 Series of Papers on SunOS Unix:Saying Hello to Unix,
Doing Things in Foreground,Doing Things in Background,
Manipulating Data,Shell Scripts,Mounting Disks,System
Backup,Sun’s Architecture,Public Networks,Trouble
Shooting, Security,How To Setup a Network,A Little Knowledge Is Dangerous
July 1987 Unisys Operators Tool Box Guide Version 1.10
October 1986 1st Semi-Annual WorkStation Productivity ReviewTechnical PresentationsEditor
July 1986 General Electric XE520 SRP Gen Code (GE6)
June 1986 Purposed M&DSO Network Solution
May 1986 Network Security RequirementsGeneral Electric
June-1984 Work Station News 1983 Year in ReviewFifth Printing, 1985Seventh Printing, 1991
May 1984 CCU: Crisis Capture UtilitySpace DivisionGeneral Electric Company
1984 Work Station Newsvol. 3, no. 1, January 1984vol. 3, no. 2, Feb/Mar/Apr 1984

vol. 3, no. 3, May 1984

1983 B20 Newsvol. 1, no. 1, August 1983vol. 1, no. 2, September 1983

vol. 1, no. 3, October 1983

1983 Work Station Newsvol. 2, no. 1, November 1983vol. 2, no. 2, December 1983
April 1980 Product Test OLDPL Installation and MaintenanceComputer Department Naval Air Development CenterWarminster, PA 18974

by Peter V. Radatti