-
2
-
-
33746623454
-
-
Retrieved November 21, 2002
-
Anderson, R. J. (1996). The eternity service. Retrieved November 21, 2002 from http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html.
-
(1996)
The Eternity Service
-
-
Anderson, R.J.1
-
3
-
-
0037772953
-
The advent of netwar
-
J. Arquilla & D. Ronfeldt (Eds.). Santa Monica, CA: RAND
-
Arquilla, J., & Ronfeldt, D. (1997a). The advent of netwar. In J. Arquilla & D. Ronfeldt (Eds.), In Athena's camp (pp. 275-293). Santa Monica, CA: RAND.
-
(1997)
Athena's Camp
, pp. 275-293
-
-
Arquilla, J.1
Ronfeldt, D.2
-
4
-
-
53849149446
-
Looking ahead: Preparing for information-age conflict
-
J. Arquilla & D. Ronfeldt (Eds.). Santa Monica, CA: RAND
-
Arquilla, J., & Ronfeldt, D. (1997b). Looking ahead: Preparing for information-age conflict. In J. Arquilla & D. Ronfeldt (Eds.), In Athena's camp (pp. 439-493). Santa Monica, CA: RAND.
-
(1997)
Athena's Camp
, pp. 439-493
-
-
Arquilla, J.1
Ronfeldt, D.2
-
5
-
-
84876617059
-
Battening down the hatches with Bastille
-
Bauer, M. (2001). Battening down the hatches with Bastille. Linux Journal, 84, 30+.
-
(2001)
Linux Journal
, vol.84
, pp. 30
-
-
Bauer, M.1
-
6
-
-
0038024282
-
Leaderless resistance
-
Retrieved November 21, 2002
-
Beam, L. (1992). Leaderless resistance, The Seditionist 12. Retrieved November 21, 2002 from http://www.louisbeam.com/leaderless.htm.
-
(1992)
The Seditionist
, vol.12
-
-
Beam, L.1
-
9
-
-
0001078041
-
Small states and cyberboosterism
-
Brunn, S., & Cottle, C. (1997). Small states and cyberboosterism. The Geographical Review 87(2), 240-258.
-
(1997)
The Geographical Review
, vol.87
, Issue.2
, pp. 240-258
-
-
Brunn, S.1
Cottle, C.2
-
10
-
-
84876594257
-
Information interventions, media development and the Internet
-
M. Price & M. Thompson (Eds.). Edinburgh: Edinburgh University Press
-
Carmichael, P. (2002a). Information interventions, media development and the Internet. In M. Price & M. Thompson (Eds.), Forging peace: Information, human rights, and the management of media space (pp. 365-392). Edinburgh: Edinburgh University Press.
-
(2002)
Forging Peace: Information, Human Rights, and the Management of Media Space
, pp. 365-392
-
-
Carmichael, P.1
-
12
-
-
84876639551
-
-
CERT Coordination Center Software Engineering Institute. Retrieved November 21, 2002
-
CERT (1999). Distributed denial of service tools (CERT incident note IN-99-07). CERT Coordination Center Software Engineering Institute. Retrieved November 21, 2002 from http://www.cert.org/incident_notes/IN-99-07.html.
-
(1999)
Distributed Denial of Service Tools (CERT Incident Note IN-99-07)
-
-
-
14
-
-
84876641135
-
Gold water poured on Sealand security
-
June 6. Retrieved November 21, 2002
-
Cohen, D. (2000, June 6). Gold water poured on Sealand security. The Guardian. Retrieved November 21, 2002 from http://www.guardian.co.uk/business/ story/0,3604,328707,00.html.
-
(2000)
The Guardian
-
-
Cohen, D.1
-
16
-
-
84876612408
-
On guard: Fortifying your site against attack
-
Curtin, M. (2000). On guard: Fortifying your site against attack. Web Techniques, 5(4), 46-50.
-
(2000)
Web Techniques
, vol.5
, Issue.4
, pp. 46-50
-
-
Curtin, M.1
-
17
-
-
12444308748
-
Free haven
-
A. Oram (Ed.). Sebastopol, CA: O'Reilly Associates
-
Dingledine, R., Freedman M., & Molnar, D. (2001). Free haven. In A. Oram (Ed.), Peer-to-peer: Harnessing the power of disruptive technologies (pp. 159-187). Sebastopol, CA: O'Reilly Associates.
-
(2001)
Peer-to-peer: Harnessing the Power of Disruptive Technologies
, pp. 159-187
-
-
Dingledine, R.1
Freedman, M.2
Molnar, D.3
-
19
-
-
2942736657
-
Welcome to Sealand. Now bugger off
-
Retrieved November 21, 2002
-
Garfinkel, S. (2000). Welcome to Sealand. Now bugger off. Wired, 8(7). Retrieved November 21, 2002 from http://www.wired.eom/wired/archive/8.07/haven. html.
-
(2000)
Wired
, vol.8
, Issue.7
-
-
Garfinkel, S.1
-
24
-
-
0041052165
-
-
Richmond, VA: Historical Review Press
-
Harwood, R. [Richard Verrall] (1975) Did six million really die? Richmond, VA: Historical Review Press.
-
(1975)
Did Six Million Really Die?
-
-
Harwood, R.1
-
28
-
-
0034440650
-
OceanStore: An architecture for global-scale persistent storage
-
Cambridge, MA. Retrieved November 21, 2002
-
Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S., Eaton, P., Geels, D., Gummadi, R., Rhea, S., Weatherspoon, H., Weimer, W., Wells, C., & Zhao, B. (2000). OceanStore: An architecture for global-scale persistent storage. In Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), Cambridge, MA. Retrieved November 21, 2002 from http://delivery.acm.org/10.1145/380000/379239/ p190-kubiatowicz.pdf?key1=379239&key2=1049652401&coll=portal&dl= ACM&CFID=6858380&CFTQKEN=51718380
-
(2000)
Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000)
-
-
Kubiatowicz, J.1
Bindel, D.2
Chen, Y.3
Czerwinski, S.4
Eaton, P.5
Geels, D.6
Gummadi, R.7
Rhea, S.8
Weatherspoon, H.9
Weimer, W.10
Wells, C.11
Zhao, B.12
-
29
-
-
84876644421
-
Tactical media as a tool for survival in the war zone
-
February. J. Beasley-Murray, P. Husbands, & V. Brown (Chairs), Duke University, Durham, North Carolina
-
Markovic, I. (1998, February). Tactical media as a tool for survival in the war zone. In J. Beasley-Murray, P. Husbands, & V. Brown (Chairs), Globalization from below: Contingency, conflict, contestation in historical perspective, Duke University, Durham, North Carolina.
-
(1998)
Globalization from below: Contingency, Conflict, Contestation in Historical Perspective
-
-
Markovic, I.1
-
30
-
-
84876637579
-
-
February 17. Message posted to the BIND Users electronic mailing list
-
Miller, A. (2000, February 17). NNTP IP Address spoofing, tracing abuse. Message posted to the BIND Users electronic mailing list, archived at http://www.isc.org/ml-archives/bind-users/2000/02/msg00597.html.
-
(2000)
NNTP IP Address Spoofing, Tracing Abuse
-
-
Miller, A.1
-
31
-
-
84937325621
-
Increasing the reusability of qualitative data with XML
-
Retrieved November 20, 2002
-
Muhr, T. (2000) Increasing the reusability of qualitative data with XML. Forum Qualitative Sozialforschung, 1(3). Retrieved November 20, 2002 from http://qualitative-research.net/fqs-texte/3-00/3-00muhr-e.htm.
-
(2000)
Forum Qualitative Sozialforschung
, vol.1
, Issue.3
-
-
Muhr, T.1
-
36
-
-
0038244140
-
-
National Institute of Standards and Technology, U.S. Department of Commerce. Retrieved November 21, 2002
-
Wack, J., & Carnahan, L. (1995). Keeping your site comfortably secure: An introduction to Internet firewalls. National Institute of Standards and Technology, U.S. Department of Commerce. Retrieved November 21, 2002, from http://csrc.nist.gov/publications/nistpubs/800-10/node31.html.
-
(1995)
Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls
-
-
Wack, J.1
Carnahan, L.2
-
37
-
-
85084163931
-
Publius: A robust, tamper-evident, censorship-resistant Web publishing system
-
August. S. Bellovin & G. Rose (Chairs), Denver, Colorado
-
Waldman, M., Rubin, A., & and Cranor, L. (2000, August). Publius: A robust, tamper-evident, censorship-resistant Web publishing system. In S. Bellovin & G. Rose (Chairs), 9th Usenix Security Symposium, Denver, Colorado.
-
(2000)
9th Usenix Security Symposium
-
-
Waldman, M.1
Rubin, A.2
Cranor, L.3
-
38
-
-
0003249767
-
Trust
-
A. Oram (Ed.). Sebastopol, CA: O'Reilly Associates
-
Waldman, M., Cranor, L., & Rubin, A. (2001). Trust. In A. Oram (Ed.), Peer-to-Peer: Harnessing disruptive technologies (pp. 242-270). Sebastopol, CA: O'Reilly Associates.
-
(2001)
Peer-to-peer: Harnessing Disruptive Technologies
, pp. 242-270
-
-
Waldman, M.1
Cranor, L.2
Rubin, A.3
-
39
-
-
84944416435
-
Cyberspace: A new medium for communication and command and control by extremists
-
Whine, M. (1999). Cyberspace: A new medium for communication and command and control by extremists. Studies in Conflict and Terrorism 22(3), 231-245.
-
(1999)
Studies in Conflict and Terrorism
, vol.22
, Issue.3
, pp. 231-245
-
-
Whine, M.1
-
40
-
-
2942711144
-
Interoperability through gateways
-
A. Oram (Ed.). Sebastopol, CA: O'Reilly Associates
-
Wiley, B. (2001). Interoperability through gateways. In A. Oram (Ed.), Peer-to-peer: Harnessing disruptive technologies (pp.381-392). Sebastopol, CA: O'Reilly Associates.
-
(2001)
Peer-to-peer: Harnessing Disruptive Technologies
, pp. 381-392
-
-
Wiley, B.1
-
41
-
-
84876594922
-
-
Retrieved November 21, 2002
-
Yee, D. (2001). Cyberhate conference report. Retrieved November 21, 2002 from http://danny.oz.au/freedom/hate/cyberhate.htm.
-
(2001)
Cyberhate Conference Report
-
-
Yee, D.1
-
43
-
-
0004210998
-
-
Sebastopol, CA: O'Reilly Associates
-
Zwicky, E., Cooper, S., & Chapman, D. (2000). Building Internet firewalls (2nd Ed.). Sebastopol, CA: O'Reilly Associates.
-
(2000)
Building Internet Firewalls (2nd Ed.)
-
-
Zwicky, E.1
Cooper, S.2
Chapman, D.3
|