Main Content
Abraham D. Sofaer, David Clark, and Whitfield Diffie, Cyber Security and International Agreements, Proceedings of a Workshop on Deterring Cyberattacks, pp. 179-206, 2010
3.2.1.4
http://www.cs.brown.edu/courses/csci1800/sources/lec17/Sofaer.pdf
Abraham D. Sofaer, David Clark, and Whitfield Diffie, Cyber Security and International Agreements, Proceedings of a Workshop on Deterring Cyberattacks, pp. 179-206, 2010
3.1.1.5
http://www.cs.brown.edu/courses/csci1800/sources/lec17/Sofaer.pdf
A Comprehensive Inter-American Cybersecurity Strategy
3.1.2.6.1
http://www.oas.org/juridico/english/cyb_pry_strategy.pdf
BBC, Lybia Jamming ‘exposed Vulnerability’, Jan 13, 2006
1.2.3.2.2
http://news.bbc.co.uk/2/hi/science/nature/4602674.stm
Blueprint for a Secure Cyber Future, DHS, “How We Will Protect Critical Information Infrastructure” and “How We Will Strengthen the Cyber Ecosystem”2, December 2011
3.2.2.3.3
http://www.dhs.gov/files/publications/blueprint-for-a-secure-cyber-future.shtm
Bruce Schneier, Lessons from the DNS Bug: Patching Isn’t Enough, Wired, Jul 23, 2008
1.3.3.1
http://www.wired.com/politics/security/commentary/securitymatters/2008/07/securitymatters_0723
Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, Tech America, Improving our Nation’s Cybersecurity through the Public-Private Partnership: a White Paper, Mar 8, 2011
2.2.4.1.1
http://www.cdt.org/files/pdfs/20110308_cbyersec_paper.pdf
Callegati, F., Man-in-the-Middle Attack to the HTTPS Protocol, Security & Privacy, IEEE, 2009
1.3.3.2
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4768661
Chitan Vaishnav, Nazli Choucri and David Clarke, Cyber International Relations as an Integrated System, Third International Engineering Symposium, Jun 2012
2.3.2.1
http://ecir.mit.edu/images/stories/CESUN_2012_Cyber_International_Relations_as_an_Integrated_System_Vaishnav_Choucri_Clark.pdf
Chris Clayton, Standard Cloud Taxonomies and Windows Azure, MSDN, 2011
1.3.4.1
http://blogs.msdn.com/b/cclayton/archive/2011/06/07/standard-cloud-taxonomies-and-windows-azure.aspx
This book, and all H2O books, are Creative Commons licensed for sharing and re-use with the exception of certain excerpts. Any excerpts from the Restatements of the Law, Principles of the Law, and the Model Penal Code are copyright by The American Law Institute. Excerpts are reproduced with permission, not as part of a Creative Commons license.