Main Content
Abraham D. Sofaer, David Clark, and Whitfield Diffie, Cyber Security and International Agreements, Proceedings of a Workshop on Deterring Cyberattacks, pp. 179-206, 2010
3.2.1.4
http://www.cs.brown.edu/courses/csci1800/sources/lec17/Sofaer.pdf
Abraham D. Sofaer, David Clark, and Whitfield Diffie, Cyber Security and International Agreements, Proceedings of a Workshop on Deterring Cyberattacks, pp. 179-206, 2010
3.1.1.5
http://www.cs.brown.edu/courses/csci1800/sources/lec17/Sofaer.pdf
A Comprehensive Inter-American Cybersecurity Strategy
3.1.2.6.1
http://www.oas.org/juridico/english/cyb_pry_strategy.pdf
BBC, Lybia Jamming ‘exposed Vulnerability’, Jan 13, 2006
1.2.3.2.2
http://news.bbc.co.uk/2/hi/science/nature/4602674.stm
Blueprint for a Secure Cyber Future, DHS, “How We Will Protect Critical Information Infrastructure” and “How We Will Strengthen the Cyber Ecosystem”2, December 2011
3.2.2.3.3
http://www.dhs.gov/files/publications/blueprint-for-a-secure-cyber-future.shtm
Bruce Schneier, Lessons from the DNS Bug: Patching Isn’t Enough, Wired, Jul 23, 2008
1.3.3.1
http://www.wired.com/politics/security/commentary/securitymatters/2008/07/securitymatters_0723
Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, Tech America, Improving our Nation’s Cybersecurity through the Public-Private Partnership: a White Paper, Mar 8, 2011
2.2.4.1.1
http://www.cdt.org/files/pdfs/20110308_cbyersec_paper.pdf
Callegati, F., Man-in-the-Middle Attack to the HTTPS Protocol, Security & Privacy, IEEE, 2009
1.3.3.2
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4768661
Chitan Vaishnav, Nazli Choucri and David Clarke, Cyber International Relations as an Integrated System, Third International Engineering Symposium, Jun 2012
2.3.2.1
http://ecir.mit.edu/images/stories/CESUN_2012_Cyber_International_Relations_as_an_Integrated_System_Vaishnav_Choucri_Clark.pdf
Chris Clayton, Standard Cloud Taxonomies and Windows Azure, MSDN, 2011
1.3.4.1
http://blogs.msdn.com/b/cclayton/archive/2011/06/07/standard-cloud-taxonomies-and-windows-azure.aspx
This book, and all H2O books, are Creative Commons licensed for sharing and re-use. Material included from the American Legal Institute is reproduced with permission and is exempted from the open license.