Main Content
David Goldman, Massive Gmail Phishing Attack Hits Top U.S. Officials, CNN Money, Jun 1, 2011
2.3.5.1.1
http://money.cnn.com/2011/06/01/technology/gmail_hack/index.htm
David G. Post, In Search of Jefferson’s Moose, Ch. 1: Chaos, 2009
2.2.1.3
http://books.google.com/books?id=8Y9bLgrZ4xIC&printsec=frontcover&source=gbs_ViewAPI#v=onepage&q&f=false
Department of Defense, An Assessment of International Legal Issues in Information Operations, 1999
6.2.3
http://cyber.law.harvard.edu/cybersecurity/An_Assessment_of_International_Legal_Issues_in_Information_Operations
Department of Defense, An Assessment of International Legal Issues in Information Operations, 1999
6.4.3
http://cyber.law.harvard.edu/cybersecurity/An_Assessment_of_International_Legal_Issues_in_Information_Operations
Department of Defense, An Assessment of International Legal Issues in Information Operations, 1999
6.3.2
http://cyber.law.harvard.edu/cybersecurity/An_Assessment_of_International_Legal_Issues_in_Information_Operations
Department of Defense Cyberspace Policy Report, 2011
6.2.7
http://www.defense.gov/home/features/2011/0411_cyberstrategy/docs/NDAA Section 934 Report_For webpage.pdf
Department of Defense Cyberspace Policy Report, November 2011
4.2.2.2.2
http://www.defense.gov/home/features/2011/0411_cyberstrategy/docs/NDAA%20Section%20934%20Report_For%20webpage.pdf
Department of Defense, Strategy for Operating in Cyberspace, July 2011
4.2.2.2.1
http://www.defense.gov/news/d20110714cyber.pdf
D. Richard Kuhn et al., Introduction to Public Key Technology and the Federal PKI Infrastructure, NIST, 2001
2.2.4.1.3
http://csrc.nist.gov/publications/nistpubs/800-32/sp800-32.pdf
Economic Theft Case Studies - Berkman Cybersecurity Wiki
1.5.1
http://cyber.law.harvard.edu/cybersecurity/Category:Case_Studies
This book, and all H2O books, are Creative Commons licensed for sharing and re-use. Material included from the American Legal Institute is reproduced with permission and is exempted from the open license.