Main Content
Jeremy Ferwerda, Nazli Choucri, and Stuart Madnick, Institutional Foundations for Cyber Security: Current Responses and New Challenges, Working Paper CISL# 2011-05, May 2011
4.1.1.3
http://web.mit.edu/smadnick/www/wp/2011-05.pdf
Jeremy Ferwerda, Nazli Choucri, and Stuart Madnick, Institutional Foundations for Cyber Security: Current Responses and New Challenges, Working Paper CISL# 2011-05, May 2011
4.1.2.4.1
http://web.mit.edu/smadnick/www/wp/2011-05.pdf
Jeremy Ferwerda, Nazli Choucri, and Stuart Madnick, Institutional Foundations for Cyber Security: Current Responses and New Challenges, Working Paper CISL# 2011-05, May 2011
4.2.1.2
http://web.mit.edu/smadnick/www/wp/2011-05.pdf
Joel Brenner, America the Vulnerable: Inside the New Matrix of Digital Espionage, Crime, and Warfare, 2011
3.2.2
http://books.google.com/books?id=UVKo2YoOQrEC&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false
John Markoff, Vast Spy System Loots Computers in 103 Countries, NY Times, Mar 28, 2009
1.2.2
http://www.nytimes.com/2009/03/29/technology/29spy.html?_r=1&hp=&pagewanted=all
John Savage, Computer Architecture, Lecture slides from CSCI 1800: Cybersecurity and International Relations, Feb 1, 2012
2.1.1.2
http://www.cs.brown.edu/courses/csci1800/lectures/Lect03_ComputerArchitecture.pdf
John Savage, Operating Systems and Applications, Lecture slides form CSCI 1800: Cybersecurity and International Relations, Feb 8, 2012
2.1.2.2
http://www.cs.brown.edu/courses/csci1800/lectures/Lect04_OS_Applications.pdf
Johnson, David R. and David G. Post, 1996, "Law and borders: The rise of law in cyberspace." Stanford Law Review, vol. 48, pp. 1367‐1402, May 1996
5.2.1.3
https://cyber.law.harvard.edu/is02/readings/johnson-post.html
Jonathan L. Zittrain, Jurisdiction. Internet Law Series, Foundation Press, 2005
5.2.1.2
http://books.google.com/books/about/Jurisdiction.html?id=wTQ6AQAAIAAJ
Jose MA. Emmanuel A. Caral, "Lessons from ICANN: Is self-regulation of the Internet fundamentally flawed?", International Journal of Law and Information Technology, vol. 12, no. 1, pp. 1-31. 2004
4.1.2.1.3
http://ijlit.oxfordjournals.org/content/12/1/1.abstract
This book, and all H2O books, are Creative Commons licensed for sharing and re-use with the exception of certain excerpts. Any excerpts from the Restatements of the Law, Principles of the Law, and the Model Penal Code are copyright by The American Law Institute. Excerpts are reproduced with permission, not as part of a Creative Commons license.