5 Cybersecurity 5 Cybersecurity
5.1 Historical Perspective 5.1 Historical Perspective
5.1.1. Ronald S. Rosen, Music and Copyright, Oxford University Press (2008), pp. 400 - 414 (.pdf)
5.2 Security Theory 5.2 Security Theory
5.2.1. Newton v. Diamond, Case No. 00-04909 (NM) (MANx) (C.D. Cal.), Rule 26 Expert Disclosure by Defendants Michael Diamond, Adam Horovitz, Adam Yauch, Beastie Boys, Capitol Records, Inc., Grand Royal Records, Inc., Universal Polygram Int'l Pub., Inc., Brooklyn Dust Music and Mario Caldato, Jr. (July 30, 2001), read pp. 1 - 9 and 12 - 13
5.2.2. David J. Prince and Gary Graff, "Coldplay, Satriani Copyright Lawsuit Dismissed," Billboard.com (September 15, 2009)
5.2.3. FRCP 3
5.3 Security Examples 5.3 Security Examples
5.3.1. Federal Copyright Protection of Sound Recordings Fixed Before February 15, 1972, Library of Congress, 75 FR 212, 67777 - 67781 (November 3, 2010) (.pdf), read pp. 67777 - 67779 (printed pages 1 - 3)
5.3.2. GateHouse Media Massachusetts, I, Inc. v. New York Times Company Civil Action No. 08-12114-WGY (D. Mass. 2008), Expert Report of Douglas Gary Lichtman Professor of Law UCLA School of Law (January 19, 2009) (.pdf)
5.3.3. Randy Lewis, "Beach Boys vs. Katy Perry? A warning, not a lawsuit," Pop & Hiss, The L.A. Times Music Blog (August 5, 2010)
5.4 [SKIM] State-based Attacks 5.4 [SKIM] State-based Attacks
[SKIM] State-based Attacks