-
1
-
-
0037772982
-
Cyberwar is Coming!
-
Gerfried Stocker and Christine Schöpf (editors). New York: Springer-Verlag
-
John Arquilla and David Ronfeldt, 1998. "Cyberwar is Coming!" In: Gerfried Stocker and Christine Schöpf (editors). InfoWar. New York: Springer-Verlag, pp. 24-50.
-
(1998)
InfoWar
, pp. 24-50
-
-
Arquilla, J.1
Ronfeldt, D.2
-
2
-
-
84869169864
-
How Anarchy Works
-
(October) accessed 4 April 2003
-
Paulina Borsook, 1995. "How Anarchy Works," Wired, volume 3, issue 10 (October), at http://www.wired.com/wired/archive/3.10/ietf.html, accessed 4 April 2003.
-
(1995)
Wired
, vol.3
, Issue.10
-
-
Borsook, P.1
-
6
-
-
0344559509
-
-
Department of Homeland Security
-
Department of Homeland Security, 2003. The National Strategy to Secure Cyberspace, at http://www.whitehouse.gov/pcipb/.
-
(2003)
The National Strategy to Secure Cyberspace
-
-
-
7
-
-
71649112640
-
Circuits of Power: Security in the Internet Environment
-
Albany, N.Y.: State University of New York Press James Rosenau and J.P. Singh (editors)
-
Ronald Deibert, 2002a. "Circuits of Power: Security in the Internet Environment" In: James Rosenau and J.P. Singh (editors). Information Technologies and Global Politics: The Changing Scope of Power and Governance. Albany, N.Y.: State University of New York Press, pp. 115-142.
-
(2002)
Information Technologies and Global Politics: The Changing Scope of Power and Governance
, pp. 115-142
-
-
Deibert, R.1
-
8
-
-
0036206155
-
Dark Guests and Great Firewalls: The Internet and Chinese Security Policy
-
Ronald Deibert, 2002b. "Dark Guests and Great Firewalls: The Internet and Chinese Security Policy," Journal of Social Issues, volume 58, number 1, pp. 143-159.
-
(2002)
Journal of Social Issues
, vol.58
, Issue.1
, pp. 143-159
-
-
Deibert, R.1
-
9
-
-
0000327879
-
Postscripts on Control Societies
-
Translated by Martin Joughin. New York: Columbia University Press Gilles Deleuze
-
Gilles Deleuze, 1990. "Postscripts on Control Societies," In: Gilles Deleuze. Negotiations: 1972-1990. Translated by Martin Joughin. New York: Columbia University Press, pp. 177-182.
-
(1990)
Negotiations: 1972-1990
, pp. 177-182
-
-
Deleuze, G.1
-
10
-
-
79954330835
-
Constituents of a Theory of the Media
-
Tim Druckrey (editor). New York: Aperture
-
Hans Magnus Enzensberger, 1996. "Constituents of a Theory of the Media," In: Tim Druckrey (editor). Electronic Culture: Technology and Visual Representation. New York: Aperture, pp. 62-85.
-
(1996)
Electronic Culture: Technology and Visual Representation
, pp. 62-85
-
-
Enzensberger, H.M.1
-
11
-
-
84869169867
-
Cyber Plan's Future Bleak
-
(24 February), accessed 26 April 2003
-
Dennis Fisher, 2003. "Cyber Plan's Future Bleak," eWeek (24 February), at http://www.eweek.com/print_article/0,3668,a=37497,00.asp, accessed 26 April 2003.
-
(2003)
eWeek
-
-
Fisher, D.1
-
12
-
-
84869175118
-
Homeland Cybersecurity Efforts Doubted
-
(11 March), accessed 15 March 2003
-
Michael Fitzgerald, 2003. "Homeland Cybersecurity Efforts Doubted," SecurityFocus Online (11 March), at http://www.securityfocus.com/news/3043, accessed 15 March 2003.
-
(2003)
SecurityFocus Online
-
-
Fitzgerald, M.1
-
13
-
-
84869155635
-
America's National Cybersecurity Strategy: Same Stuff, Different Administration
-
accessed 23 April 2003
-
Richard Forno, 2002. "America's National Cybersecurity Strategy: Same Stuff, Different Administration," Infowarrior.org, http://www.infowarrior.org/articles/2002-11.html, accessed 23 April 2003.
-
(2002)
Infowarrior.org
-
-
Forno, R.1
-
16
-
-
0008484044
-
The Internet and State Control in Authoritarian Regimes: China, Cuba, and the Counterrevolution
-
Shanthi Kalathil and Taylor Boas, 2001. "The Internet and State Control in Authoritarian Regimes: China, Cuba, and the Counterrevolution," Carnegie Endowment, Information and World Politics Project, at http://www.ceip.org/files/Publications/wp21.asp.
-
(2001)
Carnegie Endowment, Information and World Politics Project
-
-
Kalathil, S.1
Boas, T.2
-
17
-
-
84869164289
-
White House Releases Cybersecurity Plan
-
(14 February), accessed 15 March 2003
-
Brian Krebs, 2003. "White House Releases Cybersecurity Plan," WashingtonPost.com (14 February), at http://www.washingtonpost.com/ac2/wp-dyn/A7970-2003Feb14?language=printer, accessed 15 March 2003.
-
(2003)
WashingtonPost.com
-
-
Krebs, B.1
-
18
-
-
84869200451
-
Cyber-Security Strategy Depends on Power of Suggestion
-
(15 February)
-
Jonathan Krim, 2003. "Cyber-Security Strategy Depends on Power of Suggestion," Washington Post (15 February), p. E1.
-
(2003)
Washington Post
-
-
Krim, J.1
-
19
-
-
27444443777
-
Cybersecurity Plan Lacks Muscle
-
(19 September), accessed 23 April 2003
-
Robert Lemos and Declan McCullagh, 2002. "Cybersecurity Plan Lacks Muscle," CNET News.com (19 September), at http://news.com.com/2100-1023-958545.html, accessed 23 April 2003.
-
(2002)
CNET News.com
-
-
Lemos, R.1
McCullagh, D.2
-
21
-
-
84869198386
-
Large-Scale Attack Cripples Internet Backbone
-
(23 October)
-
David McGuire and Brian Krebs, 2002. "Large-Scale Attack Cripples Internet Backbone," Washington Post (23 October), p. E5.
-
(2002)
Washington Post
-
-
McGuire, D.1
Krebs, B.2
-
22
-
-
84869175121
-
Request for Comments: 1958 Architectural Principles of the Internet
-
(editor) Network Working Group
-
Network Working Group, 1996a. "Request for Comments: 1958, Architectural Principles of the Internet," Brian Carpenter (editor), at http://ietf.org/rfc/rfc1958.txt.
-
(1996)
Brian Carpenter
-
-
-
23
-
-
84869175120
-
Request for Comments: 2026
-
S. Bradner (editor) Network Working Group
-
Network Working Group, 1996b. "Request for Comments: 2026: The Internet Standards Process - Revision 3," S. Bradner (editor), at http://ietf.org/rfc/rfc2026.txt
-
(1996)
The Internet Standards Process - Revision 3
-
-
-
24
-
-
84869155637
-
The Tao of IETF-A Novice's Guide to the Internet Engineering Task Force
-
S. Harris (editor) Network Working Group
-
Network Working Group, 2001. "Request for Comments: 3160: The Tao of IETF-A Novice's Guide to the Internet Engineering Task Force," S. Harris (editor), at http://ietf.org/rfc/rfc3160.txt
-
(2001)
Request for Comments: 3160
-
-
-
25
-
-
84869155638
-
-
End-to-End Arguments in System Design
-
Jerome Saltzer, David Reed and David Clark, 1997. "End-to-End Arguments in System Design," at http://web.mit.edu/Saltzer/www/publications/.
-
(1997)
-
-
Saltzer, J.1
Reed, D.2
Clark, D.3
-
26
-
-
0344523548
-
The Protocols
-
Reading, Mass.: Addison-Wesley
-
W. Richard Stevens, 1994. "The Protocols," TCP/IP Illustrated. Volume 1. Reading, Mass.: Addison-Wesley, pp. 1-20.
-
(1994)
TCP/IP Illustrated
, vol.1
, pp. 1-20
-
-
Stevens, W.R.1
-
28
-
-
34548836707
-
Information Warfare
-
Gerfried Stocker and Christine Schöpf (editors). New York: Springer-Verlag
-
Shen Weiguang, 1998. "Information Warfare," In: Gerfried Stocker and Christine Schöpf (editors). InfoWar. New York: Springer-Verlag, pp. 60-83.
-
(1998)
InfoWar
, pp. 60-83
-
-
Weiguang, S.1
|