Main Content
Communications Security, Reliability and Interoperability Council (CSRIC) III
3.2.2.6.1
https://www.fcc.gov/encyclopedia/communications-security-reliability-and-interoperability-council-iii
Council of Europe Convention on Cybercrime
3.1.2.5
http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT=185&CL=ENG
Dave Lee, Sky-high Thinking for African Internet, BBC, Aug 6, 2012
1.2.3.2.1
http://www.bbc.co.uk/news/business-19097878
David Clark and Susan Landau, Untangling Attribution, Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy, 2010.
2.2.3.1.1
http://sites.nationalacademies.org/CSTB/CSTB_059365
David Clark, An Insider’s Guide to the Internet, 2004
1.2.2.1
http://groups.csail.mit.edu/ana/Publications/PubPDFs/An-Insiders-Guide-to-the-Internet.pdf
David Clark, The Design Philosophy of the DARPA Internet Protocols, ACM SIGCOMM Computer Communication Review, 1988
1.2.1.1
http://dl.acm.org/citation.cfm?id=52336
David E. Sanger, Obama Ordered Sped Up Wave of Cyberattacks Against Iran, NY Times, Jun 1, 2012
2.1.3.2
http://www.nytimes.com/2009/03/29/technology/29spy.html?_r=1&hp=&pagewanted=all
David Goldman, Massive Gmail Phishing Attack Hits Top U.S. Officials, CNN Money, Jun 1, 2011
1.3.5.1.1
http://money.cnn.com/2011/06/01/technology/gmail_hack/index.htm
David G. Post, In Search of Jefferson’s Moose, Ch. 1: Chaos, 2009
1.2.1.3
http://books.google.com/books?id=8Y9bLgrZ4xIC&printsec=frontcover&source=gbs_ViewAPI#v=onepage&q&f=false
Department of Defense Cyberspace Policy Report, November 2011
3.2.2.2.2
http://www.defense.gov/home/features/2011/0411_cyberstrategy/docs/NDAA%20Section%20934%20Report_For%20webpage.pdf
This book, and all H2O books, are Creative Commons licensed for sharing and re-use. Material included from the American Legal Institute is reproduced with permission and is exempted from the open license.