%%% -*-BibTeX-*- %%% ==================================================================== %%% BibTeX-file{ %%% author = "Nelson H. F. Beebe", %%% version = "1.20", %%% date = "08 August 2024", %%% time = "07:04:05 MDT", %%% filename = "internet2010.bib", %%% address = "University of Utah %%% Department of Mathematics, 110 LCB %%% 155 S 1400 E RM 233 %%% Salt Lake City, UT 84112-0090 %%% USA", %%% telephone = "+1 801 581 5254", %%% URL = "https://www.math.utah.edu/~beebe", %%% checksum = "54626 1822 8815 86955", %%% email = "beebe at math.utah.edu, beebe at acm.org, %%% beebe at computer.org (Internet)", %%% codetable = "ISO/ASCII", %%% keywords = "bibliography; BibTeX; Internet; network", %%% license = "public domain", %%% supported = "yes", %%% docstring = "This bibliography records books and other %%% publications about the Internet for the %%% decade 2010--2019. Earlier material is %%% covered in the companion bibliographies, %%% internet.bib and internet2000.bib. %%% %%% At version 1.20, the year coverage looked %%% like this: %%% %%% 2010 ( 11) 2014 ( 6) 2018 ( 3) %%% 2011 ( 5) 2015 ( 3) 2019 ( 3) %%% 2012 ( 5) 2016 ( 1) %%% 2013 ( 6) 2017 ( 1) %%% %%% Article: 2 %%% Book: 41 %%% TechReport: 1 %%% %%% Total entries: 44 %%% %%% Numerous errors in the sources noted above %%% have been corrected. Spelling has been %%% verified with the UNIX spell and GNU ispell %%% programs using the exception dictionary %%% stored in the companion file with extension %%% .sok. %%% %%% BibTeX citation tags are uniformly chosen as %%% name:year:abbrev, where name is the family %%% name of the first author or editor, year is a %%% 4-digit number, and abbrev is a 3-letter %%% condensation of important title words. %%% Citation tags were automatically generated by %%% software developed for the BibNet Project. %%% %%% In this bibliography, entries are sorted %%% first by ascending year, and within each %%% year, alphabetically by author or editor, %%% and then, if necessary, by the 3-letter %%% abbreviation at the end of the BibTeX %%% citation tag, using the bibsort -byyear %%% utility. Year order has been chosen to %%% make it easier to identify the most recent %%% work. %%% %%% The checksum field above contains a CRC-16 %%% checksum as the first value, followed by the %%% equivalent of the standard UNIX wc (word %%% count) utility output of lines, words, and %%% characters. This is produced by Robert %%% Solovay's checksum utility.", %%% } %%% ==================================================================== @Preamble{"\input bibnames.sty " # "\input path.sty " # "\hyphenation{ } " } %%% ==================================================================== %%% Acknowledgement abbreviations: @String{ack-nhfb = "Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, e-mail: \path|beebe@math.utah.edu|, \path|beebe@acm.org|, \path|beebe@computer.org| (Internet), URL: \path|https://www.math.utah.edu/~beebe/|"} %%% ==================================================================== %%% Journal abbreviations: @String{j-J-RES-NATL-INST-STAND-TECHNOL = "Journal of research of the National Institute of Standards and Technology"} %%% ==================================================================== %%% Publishers and their addresses: @String{pub-ACM = "ACM Press"} @String{pub-ACM:adr = "New York, NY 10036, USA"} @String{pub-AW = "Ad{\-d}i{\-s}on-Wes{\-l}ey"} @String{pub-AW:adr = "Reading, MA, USA"} @String{pub-ARTECH = "Artech House Inc."} @String{pub-ARTECH:adr = "Norwood, MA, USA"} @String{pub-CAMBRIDGE = "Cambridge University Press"} @String{pub-CAMBRIDGE:adr = "Cambridge, UK"} @String{pub-CHAPMAN-HALL-CRC = "Chapman and Hall/CRC"} @String{pub-CHAPMAN-HALL-CRC:adr = "Boca Raton, FL, USA"} @String{pub-CRC = "CRC Press"} @String{pub-CRC:adr = "2000 N.W. Corporate Blvd., Boca Raton, FL 33431-9868, USA"} @String{pub-ELSEVIER = "Elsevier"} @String{pub-ELSEVIER:adr = "Amsterdam, The Netherlands"} @String{pub-MCGRAW-HILL = "Mc{\-}Graw-Hill"} @String{pub-MCGRAW-HILL:adr = "New York, NY, USA"} @String{pub-NO-STARCH = "No Starch Press"} @String{pub-NO-STARCH:adr = "San Francisco, CA, USA"} @String{pub-NORTON = "W. W. Norton \& Co."} @String{pub-NORTON:adr = "New York, NY, USA"} @String{pub-PACKT = "Packt Publishing"} @String{pub-PACKT:adr = "Birmingham"} @String{pub-PH = "Pren{\-}tice-Hall"} @String{pub-PH:adr = "Upper Saddle River, NJ 07458, USA"} @String{pub-SV = "Spring{\-}er-Ver{\-}lag"} @String{pub-SV:adr = "Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ etc."} @String{pub-SYNGRESS = "Syngress Publishing, Inc."} @String{pub-SYNGRESS:adr = "Rockland, MA, USA"} @String{pub-WILEY = "Wiley"} @String{pub-WILEY:adr = "New York, NY, USA"} @String{pub-YALE = "Yale University Press"} @String{pub-YALE:adr = "New Haven, CT, USA"} %%% ==================================================================== %%% Series abbreviations: %%% ==================================================================== %%% Bibliography entries, sorted by year, and then by citation label, %%% with `bibsort -byyear': @Book{Davies:2010:HIR, editor = "Howard Davies and Beatrice Bressan", title = "A History of International Research Networking: The People who Made it Happen", publisher = pub-WILEY, address = pub-WILEY:adr, pages = "xxviii + 317", month = feb, year = "2010", DOI = "https://doi.org/10.1002/9783527629336", ISBN = "3-527-32710-X (hardcover), 3-527-62933-5 (e-book)", ISBN-13 = "978-3-527-32710-2 (hardcover), 978-3-527-62933-6 (e-book)", LCCN = "TK5105.875.I57 H57 2010", bibdate = "Thu Aug 1 06:49:03 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib", abstract = "The first book written and edited by the people who developed the Internet, this book deals with the history of creating universal protocols and a global data transfer network. The result is THE authoritative source on the topic, providing a vast amount of insider knowledge unavailable elsewhere. Despite the huge number of contributors, the text is uniform in style and level, and of interest to every scientist and a must-have for all network developers as well as agencies dealing with the Net.", acknowledgement = ack-nhfb, tableofcontents = "Early days \\ The role of funding bodies \\ Organized cooperation \\ Different approaches \\ The interviews \\ The bandwidth breakthrough \\ Support for applications \\ Regional perspectives \\ Transatlantic connections \\ A European achievement", } @Book{Boyle:2010:AIS, author = "Randall Boyle", title = "Applied information security: a hands-on guide to information security software", publisher = pub-PH, address = pub-PH:adr, pages = "viii + 226", year = "2010", ISBN = "0-13-612203-5", ISBN-13 = "978-0-13-612203-6", LCCN = "QA76.9.A25", bibdate = "Thu Sep 24 19:01:49 2009", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib", acknowledgement = ack-nhfb, } @Book{Clarke:2010:CWN, author = "Richard A. (Richard Alan) Clarke and Robert K. Knake", title = "Cyber war: the next threat to national security and what to do about it", publisher = "Ecco", address = "New York, NY, USA", pages = "xiv + 290", year = "2010", ISBN = "0-06-196223-6 (hardcover)", ISBN-13 = "978-0-06-196223-3 (hardcover)", LCCN = "HV6773.2 .C53 2010", bibdate = "Wed Apr 28 13:41:23 MDT 2010", bibsource = "aubrey.tamu.edu:7090/voyager; https://www.math.utah.edu/pub/tex/bib/internet2010.bib", acknowledgement = ack-nhfb, subject = "Cyberterrorism; United States; Information warfare; Prevention", } @Book{DeFino:2010:OCE, author = "Steven DeFino", title = "Official certified ethical hacker review guide", publisher = "Course Technology, Cengage Learning", address = "Boston, MA, USA", pages = "xxii + 361", year = "2010", ISBN = "1-4354-8853-9 (paperback)", ISBN-13 = "978-1-4354-8853-3 (paperback)", LCCN = "QA76.3 .D445 2010", bibdate = "Tue Jun 24 08:10:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, remark = "Exam 312-50.", subject = "Electronic data processing personnel; Certification; Computer security; Examinations; Study guides; Penetration testing (Computer security); Computer hackers; Computer networks", tableofcontents = "Ethical hacking \\ Hacking laws \\ Footprinting \\ Google hacking \\ Scanning \\ Enumeration \\ System hacking \\ Trojans and backdoors \\ Viruses and worms \\ Sniffers, spoofing, and session hijacking \\ Social engineering \\ Denial of service \\ Buffer overflows \\ Hacking Web servers and Web applications \\ Wireless networking \\ Cryptography \\ Hacking with Linux \\ IDSs, firewalls, and honeypots \\ Summary of optional modules \\ Penetration testing", } @Book{Franceschetti:2010:HSF, editor = "Giorgio Franceschetti and Marina Grossi", title = "Homeland Security Facets Threats: Countermeasures, and the Privacy Issue", publisher = pub-ARTECH, address = pub-ARTECH:adr, pages = "280 (est.)", year = "2010", ISBN = "1-60807-106-5", ISBN-13 = "978-1-60807-106-7", LCCN = "????", bibdate = "Thu May 12 10:18:56 MDT 2011", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/internet2010.bib", URL = "http://www.artechhouse.com/Detail.aspx?strIsbn=978-1-60807-106-7", acknowledgement = ack-nhfb, tableofcontents = "General Overview Homeland Security and National Defense in the 21st Century \\ The Appropriate Interdisciplinary Approach to Handle the Asymmetric Homeland Security Challenge \\ Security Challenges in Information Systems \\ Threats and Possible Countermeasures Physical Infrastructures and Wireless Sensor Networks \\ Analysis of the Domino Effect in Critical Infrastructures \\ Model-Based Design of Trustworthy Health Information Systems \\ Detection, Identification, and Tracking of Dangerous Materials \\ Urban Defense Using Mobile Sensor Platforms: Surveillance and Protection \\ The Privacy Issue Toward a New Legal Framework by Cybersecurity \\ Privacy vs Security: A Fight that May Turn into an Alliance \\ Examples of Critical Security Implementation \\ The Large Event Security Issue: The G8 Case \\ Real Experiences on Homeland Security Systems", } @Book{Jackson:2010:NSA, author = "Chris Jackson", title = "Network security auditing", publisher = "Cisco Press", address = "Indianapolis, IN, USA", pages = "xxiv + 488", year = "2010", ISBN = "1-58705-352-7 (paperback)", ISBN-13 = "978-1-58705-352-8 (paperback)", LCCN = "TK5105.59 .J325 2010", bibdate = "Mon Apr 25 18:09:49 MDT 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", series = "Cisco Press networking technology series", acknowledgement = ack-nhfb, subject = "Computer networks; Security measures; Evaluation", } @Book{Kurose:2010:CNT, author = "James F. Kurose and Keith W. Ross", title = "Computer networking: a top-down approach", publisher = pub-AW, address = pub-AW:adr, edition = "Fifth", pages = "xxiv + 862", year = "2010", ISBN = "0-13-607967-9", ISBN-13 = "978-0-13-607967-5", LCCN = "TK5105.875.I57 K88 2010", bibdate = "Wed Dec 23 12:55:06 MST 2009", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Internet; Computer networks", } @Book{Prowell:2010:SDN, author = "Stacy J. Prowell and Rob Kraus and Mike Borkin", title = "Seven deadliest network attacks", publisher = pub-SYNGRESS, address = pub-SYNGRESS:adr, pages = "xiv + 142", year = "2010", ISBN = "1-59749-549-2 (paperback)", ISBN-13 = "978-1-59749-549-3 (paperback)", LCCN = "TK5105.59 .P76 2010", bibdate = "Tue Jun 24 08:10:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", series = "Syngress seven deadliest attacks series", acknowledgement = ack-nhfb, subject = "Computer networks; Security measures; Access control", tableofcontents = "Denial of service \\ War dialing \\ Penetration ``testing'' \\ Protocol tunneling \\ Spanning tree attacks \\ Man-in-the-middle \\ Password replay", } @Book{Szoka:2010:NDD, author = "Berin Szoka and Adam Marcus and Jonathan L. Zittrain and Yochai Benkler and John G. Palfrey", title = "The Next Digital Decade: Essays on the Future of the Internet", publisher = "TechFreedom", address = "Washington D.C", pages = "575", year = "2010", ISBN = "1-4357-6786-1", ISBN-13 = "978-1-4357-6786-7", LCCN = "HM851 .N49 2010", bibdate = "Mon Jul 8 08:48:22 MDT 2019", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/internet2010.bib", URL = "https://books.google.com/books?id=DZMSQHOfUKcC", acknowledgement = ack-nhfb, remark = "More information about this book in available at NextDitigalDecade.com. This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported license.", subject = "Internet; Cyberspace; Privacy, Right of; Information society; Information technology; Web search engines; Censorship; Censorship; Cyberspace; Information society; Information technology; Internet; Privacy, Right of; Web search engines.", tableofcontents = "Foreword / Berin Szoka \\ 25 years after .com: Ten questions / Berin Szoka \\ Why we must resist the temptation of web 2.0 / Andrew Keen \\ The case for internet optimism, part 1: saving the net from its detractors / Adam Thierer \\ Protecting the internet without wrecking it: how to meet the security threat / Jonathan Zittrain \\ A portrait of the internet as a young man / Ann Bartow \\ The case for internet optimism, part 2: saving the net from its supporters / Adam Thierer \\ The third wave of internet exceptionalism / Eric Goldman \\ A declaration of the dependence of cyberspace / Alex Kozinski and Josh Goldfoot \\ Is internet exceptionalism dead? / Tim Wu \\ Section 230 of the CDA: internet exceptionalism as a statutory construct / H. Brian Holland \\ Internet exceptionalism revisited / Mark MacCarthy \\ Computer--mediated transactions / Hal R. Varian \\ Decentralization, freedom to operate and human sociality / Yochai Benkler \\ The economics of information: from dismal science to strange tales / Larry Downes \\ The regulation of reputational information / Eric Goldman \\ Imagining the future of global internet governance / Milton Mueller \\ Democracy in cyberspace: self--governing netizens and a new, global form of civic virtue, online / Robert R. Johnson \\ Who's who in internet politics: a taxonomy of information technology policy and politics / Robert D. Atkinson \\ Trusting (and verifying) online intermediaries' policing / Frank Pasquale \\ Online liability for payment systems / Mark MacCarthy \\ Fuzzy boundaries: the potential impact of vague secondary liability doctrines on technology innovation / Paul Szynol \\ Dominant search engines: an essential cultural and facility / Frank Pasquale \\ The problem of search engines as essential facilities: an economic and legal assessment / Geoffrey A. Manne \\ Some skepticism about search neutrality / James Grimmelmann \\ Search engine bias and the demise of search engine utopianism / Eric Goldman \\ Privacy protection in the next digital decade: ``trading up'' or a ``race to the bottom''? / Michael Zimmer \\ The privacy problem: what's wrong with privacy? / Stewart Baker \\ A market approach to privacy policy / Larry Downs \\ The global problem of state censorship and the need to confront it / John G. Palfrey, Jr. \\ The role of the internet community in combating hate speech / Christopher Wolf \\ Can the internet liberate the world? / Evgeny Morozov \\ Internet freedom: beyond circumvention / Ethan Zuckermann", } @Book{Wilhelm:2010:PPT, editor = "Thomas Wilhelm", title = "Professional penetration testing: creating and operating a formal hacking lab", publisher = pub-SYNGRESS, address = pub-SYNGRESS:adr, pages = "xix + 504", year = "2010", ISBN = "1-59749-425-9 (paperback), 1-59749-466-6 (DVD)", ISBN-13 = "978-1-59749-425-0 (paperback), 978-1-59749-466-3 (DVD)", LCCN = "TK5105.59 .W544 2010", bibdate = "Tue Jun 24 08:10:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Computer networks; Security measures; Penetration testing (Computer security); Testing; Computer hackers", } @Book{Anonymous:2011:PT, author = "Anonymous", title = "Penetration testing", publisher = "Course Technology, Cengage Learning", address = "Clifton Park, NY, USA", pages = "????", year = "2011", ISBN = "1-4354-8366-9 (vol. 1 : paperback), 1-4354-8367-7 (vol. 2 : paperback), 1-4354-8368-5 (vol. 3 : paperback), 1-4354-8369-3 (vol. 4 : paperback), 1-4354-8370-7 (vol. 5 : paperback)", ISBN-13 = "978-1-4354-8366-8 (vol. 1 : paperback), 978-1-4354-8367-5 (vol. 2 : paperback), 978-1-4354-8368-2 (vol. 3 : paperback), 978-1-4354-8369-9 (vol. 4 : paperback), 978-1-4354-8370-5 (vol. 5 : paperback)", LCCN = "QA76.9.A25 P4355 2011", bibdate = "Tue Jun 24 08:10:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, remark = "Volume \ldots{} of 5 mapping to EC-Council Certified Security Analyst certification.", subject = "Penetration testing (Computer security); Examinations; Study guides; Computers; Access control; Computer networks; Security measures; Electronic data processing personnel; Certification; Telecommunications engineers", tableofcontents = "v. 1. Security analysis \\ v. 2. Procedures and methodologies \\ v. 3. Network and perimeter testing \\ v. 4. Communication media testing \\ v. 5. Network threat testing", } @Book{Engebretson:2011:BHP, editor = "Pat (Patrick Henry) Engebretson and James {Broad, CISSP.}", title = "The basics of hacking and penetration testing: ethical hacking and penetration testing made easy", publisher = pub-SYNGRESS, address = pub-SYNGRESS:adr, pages = "xvii + 159", year = "2011", ISBN = "1-59749-655-3", ISBN-13 = "978-1-59749-655-1", LCCN = "QA76.9.A25 E5443 2011", bibdate = "Tue Jun 24 08:10:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", series = "Syngress the basics", acknowledgement = ack-nhfb, author-dates = "1974--", subject = "Penetration testing (Computer security); Computer security; Computer hackers; Computer software; Testing; Computer crimes; Prevention", tableofcontents = "What is penetration testing? \\ Reconnaissance \\ Scanning \\ Exploitation \\ Web based exploitation \\ Maintaining access with backdoors and rootkits", } @Book{Luccio:2011:MAF, author = "Fabrizio Luccio and Linda Pagli and Graham Steel", title = "Mathematical and algorithmic foundations of the {Internet}", publisher = pub-CHAPMAN-HALL-CRC, address = pub-CHAPMAN-HALL-CRC:adr, pages = "xv + 205", year = "2011", ISBN = "1-4398-3138-6 (hardback)", ISBN-13 = "978-1-4398-3138-0 (hardback)", LCCN = "TK5105.875.I57 L835 2011", bibdate = "Fri Nov 16 06:30:56 MST 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", series = "Chapman and Hall/CRC Press applied algorithms and data structures series", acknowledgement = ack-nhfb, subject = "Internet; Mathematical models; World Wide Web; COMPUTERS / Programming / Algorithms; MATHEMATICS / General; MATHEMATICS / Combinatorics", } @Book{Mills:2011:CNT, author = "David L. Mills", title = "Computer network time synchronization: the {Network Time Protocol}", publisher = "Taylor and Francis", address = "Boca Raton, FL, USA", edition = "Second", pages = "????", year = "2011", ISBN = "1-4398-1463-5", ISBN-13 = "978-1-4398-1463-5", LCCN = "TK5105.575 .M55 2011", bibdate = "Sat May 8 14:45:59 MDT 2010", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Network Time Protocol (computer network protocol); synchronous data transmission systems; computer networks; management; synchronization", } @Book{Wilhelm:2011:NHU, author = "Thomas Wilhelm and Jason Andress", title = "Ninja hacking: unconventional penetration testing tactics and techniques", publisher = pub-SYNGRESS, address = pub-SYNGRESS:adr, pages = "xii + 310", year = "2011", ISBN = "1-59749-588-3", ISBN-13 = "978-1-59749-588-2", LCCN = "QA76.9.A25 W548 2011", bibdate = "Tue Jun 24 08:10:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Penetration testing (Computer security); Computer security; Computer crimes; Prevention; Computer hackers", } @Book{Olivier:2012:HPE, author = "Martin Olivier", title = "``{Hidden}'' Prehistory of {European} Research Networking", publisher = "Trafford Publishing", address = "[unknown]", year = "2012", ISBN = "1-4669-3872-2", ISBN-13 = "978-1-4669-3872-4 (e-book)", LCCN = "????", bibdate = "Thu Sep 4 18:11:41 MDT 2025", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/internet2010.bib", URL = "http://www.ictconsulting.ch/reports/European-Research-Internet-History.pdf; https://www.amazon.com/Hidden-Prehistory-European-Research-Networking-ebook/dp/B0792XPN4G", abstract = "The main purpose of this book, which mostly covers the period 1984--1993, is about the history of European research networking. In particular, it strives to throw some light on some lesser known, sometimes forgotten, aspects of the European research networking history, as the EARN and EASInet initiatives from IBM but also DEC (EARN/OSI), thanks to operational pan-European networks, which were built during the period 19841990 thus allowing the start of operational European academic and research networking services in a very effective and swift manner. A secondary purpose of this article is to make a critical assessment of the political and technical achievements of the European NRENs and especially those of DANTE, the company set up by these same NRENs to build and operate a pan-European backbone interconnecting their national networking infrastructures as well as establishing international connections to other NRENs worldwide.", acknowledgement = ack-nhfb, } @Book{Blum:2012:TJC, author = "Andrew Blum", title = "Tubes: a journey to the center of the {Internet}", publisher = "Ecco", address = "New York, NY, USA", pages = "294", year = "2012", ISBN = "0-06-199493-6", ISBN-13 = "978-0-06-199493-7", LCCN = "TK5105.875.I57 B58 2012", bibdate = "Wed Jun 6 05:51:36 MDT 2012", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/internet2010.bib", acknowledgement = ack-nhfb, subject = "Internet; History; Social aspects; Telecommunication systems; Information technology; Information superhighway", tableofcontents = "The map \\ A network of networks \\ Only connect \\ The whole Internet \\ Cities of light \\ The longest tubes \\ Where data sleeps \\ Home", } @Book{Jacobson:2012:CSL, author = "Douglas Jacobson and Joseph Idziorek", title = "Computer security literacy: staying safe in a digital world", publisher = pub-CRC, address = pub-CRC:adr, pages = "????", year = "2012", ISBN = "1-4398-5618-4 (paperback)", ISBN-13 = "978-1-4398-5618-5 (paperback)", LCCN = "QA76.9.A25 J224 2013", bibdate = "Fri Nov 16 06:28:42 MST 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Computer security; COMPUTERS / Security / General.; COMPUTERS / Security / Cryptography.", } @TechReport{Martin:2012:HPE, author = "Olivier H. Martin", title = "The ``hidden'' Prehistory of {European} Research Networking", type = "Report", institution = "ICTC Consulting", address = "????, Switzerland", pages = "125", day = "25", month = oct, year = "2012", bibdate = "Thu Aug 01 06:50:28 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib", URL = "http://ictconsulting.ch/reports/European-Research-Internet-History.pdf", acknowledgement = ack-nhfb, } @Book{Mjolsnes:2012:MII, editor = "Stig F. Mj{\"o}lsnes", title = "A multidisciplinary introduction to information security", publisher = pub-CRC, address = pub-CRC:adr, pages = "xxv + 322", year = "2012", ISBN = "1-4200-8590-5 (hardback)", ISBN-13 = "978-1-4200-8590-7 (hardback)", LCCN = "QA76.9.A25 M845 2012", bibdate = "Fri Nov 16 06:32:35 MST 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", series = "Discrete mathematics and its applications", acknowledgement = ack-nhfb, subject = "Computer security; Computer networks; Security measures; Computers; Access control; Multidisciplinary design optimization; COMPUTERS / Computer Engineering. ; COMPUTERS / Networking / General.; TECHNOLOGY and ENGINEERING / Electrical.", } @Book{Tiller:2012:CGP, author = "James S. Tiller", title = "{CISO}'s guide to penetration testing: a framework to plan, manage, and maximize benefits", publisher = pub-CRC, address = pub-CRC:adr, pages = "xiv + 374", year = "2012", ISBN = "1-4398-8027-1 (hardcover)", ISBN-13 = "978-1-4398-8027-2 (hardcover)", LCCN = "QA76.9.A25 T56 2012", bibdate = "Tue Jun 24 08:10:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Penetration testing (Computer security); Computer networks; Security measures; Testing; Business enterprises; Data processing", } @Book{Basta:2013:CSP, author = "Alfred Basta", title = "Computer security and penetration testing", publisher = "Course Technology, Cengage Learning", address = "Boston, MA", edition = "Second", pages = "????", year = "2013", ISBN = "0-8400-2093-7", ISBN-13 = "978-0-8400-2093-2", LCCN = "????", bibdate = "Tue Jun 24 08:10:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, } @Book{Bergman:2013:HEM, author = "Neil Bergman and Mike Stanfield and Jason Rouse and Joel Scambray", title = "Hacking exposed: mobile security secrets and solutions", publisher = pub-MCGRAW-HILL, address = pub-MCGRAW-HILL:adr, pages = "xxvii + 289", year = "2013", ISBN = "0-07-181701-8 (paperback)", ISBN-13 = "978-0-07-181701-1 (paperback)", LCCN = "TK5105.59 .B464 2013", bibdate = "Thu Apr 2 07:18:49 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", abstract = "Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits--from the bestselling coauthor of the original Hacking Exposed. Hacking Exposed Mobile focuses on the security of applications running on mobile devices, specifically mobile phones. This book focuses on Android OS, as well as operating systems from Microsoft and Apple. As businesses rush their mobile products to market and conduct business transactions via mobile devices, vast new security risks, vulnerabilities, and exploits are of great concern. This book addresses all of these issues and provides proven solutions for securing mobile applications. No other book on hacking rivals the original, bulletproof pedagogy of this book's clear-cut Hack/Countermeasure approach. Proven strategies for preventing, detecting, and remediating common technology and architecture weaknesses and maintaining tight security controls permanently. Accessible style and format: attacks/countermeasures; risk ratings; case studies; self-assessment tips; check lists; and organizational strategies.\par Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile : Security Secrets and Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems.", acknowledgement = ack-nhfb, subject = "Computer networks; Security measures; Mobile computing; Mobile communication systems; Computer hackers; Computer crimes; Prevention; COMPUTERS / Networking / Security.", tableofcontents = "The Mobile Risk Ecosystem \\ Hacking the Cellular Network \\ iOS \\ Android \\ Mobile Malware \\ Mobile Services and Mobile Web \\ Mobile Device Management \\ Mobile Development Security \\ Mobile Payments \\ Consumer Security Checklist \\ Security Checklist \\ Mobile Application Penetration Testing Toolkit \\ iOS Pen Test Toolkit \\ Android Pen Test Toolkit", } @Book{Carpenter:2013:NGH, author = "Brian E. Carpenter", title = "Network Geeks --- How They Built the {Internet}", publisher = pub-SV, address = pub-SV:adr, pages = "ix + 161 + 15", year = "2013", DOI = "https://doi.org/10.1007/978-1-4471-5025-1", ISBN = "1-4471-5024-4 (paperback), 1-4471-5025-2 (e-book)", ISBN-13 = "978-1-4471-5024-4 (paperback), 978-1-4471-5025-1 (e-book)", LCCN = "QA76.17; TK5105.875.I57 C37 2013", bibdate = "Thu Aug 01 06:53:07 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib", URL = "https://sites.google.com/site/bcabrc/network-geeks-book", abstract = "The impact on modern society made by the Internet is immeasurable. Yet some questioned ``why anyone would want such a thing'' when the idea was first introduced. Part history, part memoir and part cultural study, \booktitle{Network Geeks} charts the creation of the Internet and the establishment of the Internet Engineering Task Force, from the viewpoint of a self-proclaimed geek who witnessed these developments first-hand. With boundless enthusiasm and abundant humour, Brian Carpenter leads the reader on a journey from post-war Britain to post-millennium New Zealand, describing how the Internet grew into today's ubiquitous, global network, including the genesis of the World-Wide Web in the hotbeds of a particle collider at CERN. Illuminating the science and technology behind the apparent ``magic trick'' of the Internet, \booktitle{Network Geeks} opens a window into the initially bewildering world of the Internet engineering geek. After reading this book, you may wish to join this world yourself.", acknowledgement = ack-nhfb, tableofcontents = "Front Matter / i--ix \\ Hey folks! / 1--7 \\ Before my time / 9--25 \\ Where do geeks come from? / 27--37 \\ Going up / 39--52 \\ In control / 53--62 \\ Two ivory towers / 63--77 \\ Diversity / 79--95 \\ Economy class / 97--109 \\ Parallel universes / 111--125 \\ The years of miraculous growth / 127--140 \\ Going under / 141--150 \\ Back matter / 151--161", } @Book{Engebretson:2013:BHP, editor = "Pat (Patrick Henry) Engebretson", title = "The basics of hacking and penetration testing: ethical hacking and penetration testing made easy", publisher = "Syngress, an imprint of Elsevier", address = "Amsterdam, The Netherlands", edition = "Second", pages = "xviii + 204", year = "2013", ISBN = "0-12-411644-2 (paperback)", ISBN-13 = "978-0-12-411644-3 (paperback)", LCCN = "QA76.9.A25 E5443 2013", bibdate = "Tue Jun 24 08:10:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, author-dates = "1974--", subject = "Penetration testing (Computer security); Computer hackers; Computer software; Testing; Computer crimes; Prevention", tableofcontents = "What is Penetration Testing? \\ Reconnaissance \\ Scanning \\ Exploitation \\ Web Based Exploitation \\ Maintaining Access with Backdoors and Rootkits \\ Wrapping Up the Penetration Test", } @Book{Neely:2013:WRP, author = "Matthew Neely and Alex Hamerstone and Chris Sanyk", title = "Wireless reconnaissance in penetration testing", publisher = "Elsevier/Syngress", address = "Amsterdam, The Netherlands", pages = "xvi + 166", year = "2013", ISBN = "1-59749-731-2", ISBN-13 = "978-1-59749-731-2", LCCN = "TK7882.E2 N44 2013", bibdate = "Tue Jun 24 08:10:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Electronic surveillance; Penetration testing (Computer security); Wireless communication systems; Security measures", tableofcontents = "Why radio profiling? \\ Basic radio theory and introduction to radio systems \\ Targets (wireless headsets, guard radios, wireless cameras, etc.) \\ Offsite profiling \\ Offsite profiling case study \\ Onsite profiling \\ Onsite profiling case study \\ How to use the information you gather \\ Basic overview of equipment and how it works \\ Case study to pull it all together \\ New technology and the future of radios in penetration testing", } @Book{Wilhelm:2013:PPT, editor = "Thomas Wilhelm", title = "Professional penetration testing", publisher = pub-SYNGRESS, address = pub-SYNGRESS:adr, edition = "Second", pages = "????", year = "2013", ISBN = "1-59749-993-5", ISBN-13 = "978-1-59749-993-4", LCCN = "TK5105.59 .W544 2013", bibdate = "Tue Jun 24 08:10:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Computer networks; Security measures; Penetration testing (Computer security); Testing; Computer hackers", tableofcontents = "Volume 1. Creating and Learning in a Hacking Lab", } @Book{Baloch:2014:EHP, author = "Rafay Baloch", title = "Ethical hacking and penetration testing guide", publisher = pub-CRC, address = pub-CRC:adr, pages = "????", year = "2014", ISBN = "1-4822-3161-1 (paperback)", ISBN-13 = "978-1-4822-3161-8 (paperback)", LCCN = "QA76.9.A25 B356 2014", bibdate = "Tue Jun 24 08:10:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", abstract = "This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security.", acknowledgement = ack-nhfb, subject = "Penetration testing (Computer security); COMPUTERS / Security / General.; COMPUTERS / Networking / General.; LAW / Forensic Science.", } @Book{Broad:2014:HKP, author = "James Broad and Andrew Bindner", title = "Hacking with {Kali}: practical penetration testing techniques", publisher = "Syngress, an imprint of Elsevier", address = "Amsterdam, The Netherlands", edition = "First", pages = "ix + 227", year = "2014", ISBN = "0-12-407749-8 (alkaline paper)", ISBN-13 = "978-0-12-407749-2 (alkaline paper)", LCCN = "QA76.9.A25 B772 2014", bibdate = "Tue Jun 24 08:10:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Penetration testing (Computer security); Kali Linux; Computer hackers", tableofcontents = "Introduction \\ Download and install Kali Linux \\ Software, patches, and upgrades \\ Configuring Kali Linux \\ Building a penetration testing lab \\ Introduction to the penetration test lifecycle \\ Reconnaissance \\ Scanning \\ Exploitation \\ Maintaining access \\ Reports and templates \\ Appendix A: Tribal Chicken \\ Appendix B: Kali penetration testing tools", } @Book{Krebs:2014:SNI, author = "Brian Krebs", title = "Spam nation: the inside story of organized cybercrime --- from global epidemic to your front door", publisher = "Sourcebooks, Inc.", address = "Naperville, IL, USA", pages = "????", year = "2014", ISBN = "1-4022-9561-8 (hardcover)", ISBN-13 = "978-1-4022-9561-4 (hardcover)", LCCN = "HV6773.2 .K74 2014", bibdate = "Mon Nov 24 12:24:28 MST 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", abstract = "Explores ``the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies --- and countless viruses, phishing, and spyware attacks --- he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere''.", acknowledgement = ack-nhfb, subject = "Computer crimes; United States; Internet fraud; Spam (Electronic mail); Phishing; Organized crime", } @Book{Lane:2014:PBD, editor = "Julia I. Lane and Victoria Stodden and Stefan Bender and Helen Nissenbaum", booktitle = "Privacy, big data, and the public good: frameworks for engagement", title = "Privacy, big data, and the public good: frameworks for engagement", publisher = pub-CAMBRIDGE, address = pub-CAMBRIDGE:adr, pages = "xix + 322", year = "2014", ISBN = "1-107-06735-9 (hardcover), 1-107-63768-6 (paperback)", ISBN-13 = "978-1-107-06735-6 (hardcover), 978-1-107-63768-9 (paperback)", LCCN = "JC596 .P747 2015", bibdate = "Sat Jun 28 10:20:29 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", abstract = "Massive amounts of data on human beings can now be analyzed. Pragmatic purposes abound, including selling goods and services, winning political campaigns, and identifying possible terrorists. Yet 'big data' can also be harnessed to serve the public good: scientists can use big data to do research that improves the lives of human beings, improves government services, and reduces taxpayer costs. In order to achieve this goal, researchers must have access to this data - raising important privacy questions. What are the ethical and legal requirements? What are the rules of engagement? What are the best ways to provide access while also protecting confidentiality? Are there reasonable mechanisms to compensate citizens for privacy loss? The goal of this book is to answer some of these questions. The book's authors paint an intellectual landscape that includes legal, economic, and statistical frameworks. The authors also identify new practical approaches that simultaneously maximize the utility of data access while minimizing information risk.", acknowledgement = ack-nhfb, subject = "privacy, right of; research; moral and ethical aspects; big data; social aspects; common good", tableofcontents = "Part I. Conceptual Framework: Editors' introduction / Julia Lane, Victoria Stodden, Stefan Bender and Helen Nissenbaum \\ 1. Monitoring, datafication, and consent: legal approaches to privacy in the big data context / Katherine J. Strandburg \\ 2. Big data's end run around anonymity and consent / Solon Barocas and Helen Nissenbaum \\ 3. The economics and behavioral economics of privacy / Alessandro Acquisti \\ 4. The legal and regulatory framework: what do the rules say about data analysis? / Paul Ohm \\ 5. Enabling reproducibility in big data research: balancing confidentiality and scientific transparency / Victoria Stodden \\ Part II. Practical Framework: Editors' introduction / Julia Lane, Victoria Stodden, Stefan Bender and Helen Nissenbaum \\ 6. The value of big data for urban science / Steven E. Koonin and Michael J. Holland \\ 7. The new role of cities in creating value / Robert Goerge \\ 8. A European perspective / Peter Elias \\ 9. Institutional controls: the new deal on data / Daniel Greenwood, Arkadiusz Stopczynski, Brian Sweatt, Thomas Hardjono and Alex Pentland \\ 10. The operational framework: engineered controls / Carl Landwehr \\ 11. Portable approaches to informed consent and open data / John Wilbanks \\ Part III. Statistical Framework: Editors' introduction / Julia Lane, Victoria Stodden, Stefan Bender and Helen Nissenbaum \\ 12. Extracting information from big data / Frauke Kreuter and Roger Peng \\ 13. Using statistics to protect privacy / Alan F. Karr and Jerome P. Reiter \\ 14. Differential privacy: a cryptographic approach to private data analysis / Cynthia Dwork", } @Book{Watson:2014:SEP, author = "Gavin Watson", title = "Social engineering penetration testing: executing social engineering pen tests, assessments and defense", publisher = pub-SYNGRESS, address = pub-SYNGRESS:adr, pages = "????", year = "2014", ISBN = "0-12-420124-5", ISBN-13 = "978-0-12-420124-8", LCCN = "HM668 .W38 2014", bibdate = "Tue Jun 24 08:10:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, author-dates = "1982--", subject = "Social engineering", } @Book{Weidman:2014:PTH, author = "Georgia Weidman", title = "Penetration testing: a hands-on introduction to hacking", publisher = pub-NO-STARCH, address = pub-NO-STARCH:adr, pages = "????", year = "2014", ISBN = "1-59327-564-1 (paperback)", ISBN-13 = "978-1-59327-564-8 (paperback)", LCCN = "QA76.9.A25 W4258 2014", bibdate = "Tue Jun 24 08:10:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", abstract = "In \booktitle{Penetration Testing}, security researcher and trainer Georgia Weidman provides you with a survey of important skills that any aspiring pentester needs. This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device security and bypassing anti-virus software.", acknowledgement = ack-nhfb, subject = "Penetration testing (Computer security); Kali Linux; computer hackers; computers / internet / security.; computers / networking / security.; computers / security / general.", tableofcontents = "Foreward by Peter Van Eeckhoutte \\ \\ Acknowledgements \\ \\ Introduction \\ \\ Penetration Testing Primer \\ \\ Part 1: The Basics \\ \\ Chapter 1: Setting Up Your Virtual Lab \\ Chapter 2: Using Kali Linux \\ Chapter 3: Programming \\ Chapter 4: Using the Metasploit Framework \\ \\ Part 2: Assessments \\ \\ Chapter 5: Information Gathering \\ Chapter 6: Finding Vulnerabilities \\ Chapter 7: Capturing Traffic \\ \\ Part 3: Attacks \\ \\ Chapter 8: Exploitation \\ Chapter 9: Password Attacks \\ Chapter 10: Client-Side Exploitation \\ Chapter 11: Social Engineering \\ Chapter 12: Bypassing Antivirus Applications \\ Chapter 13: Post Exploitation \\ Chapter 14: Web Application Testing \\ Chapter 15: Wireless Attacks \\ \\ Part 4: Exploit Development \\ \\ Chapter 16: A Stack-Based Buffer Overflow in Linux \\ Chapter 17: A Stack-Based Buffer Overflow in Windows \\ Chapter 18: Structured Exception Handler Overwrites \\ Chapter 19: Fuzzing, Porting Exploits, and Metasploit Modules \\ \\ Part 5: Mobile Hacking \\ \\ Chapter 20: Using the Smartphone Pentest Framework \\ \\ Resources \\ \\ Index", } @Book{Lemstra:2015:DBM, editor = "W. (Wolter) Lemstra and William H. Melody", title = "The Dynamics of broadband markets in {Europe}: realizing the 2020 digital agenda", publisher = pub-CAMBRIDGE, address = pub-CAMBRIDGE:adr, pages = "xx + 409", year = "2015", ISBN = "1-107-07358-8 (hardcover)", ISBN-13 = "978-1-107-07358-6 (hardcover)", LCCN = "HE8084 .D96 2015", bibdate = "Wed Mar 25 10:52:37 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", URL = "http://assets.cambridge.org/97811070/73586/cover/9781107073586.jpg", abstract = "The European Commission's Digital Agenda for Europe sets the targets for broadband development by 2020, yet current broadband market outcomes vary widely amongst the EU Member States and the objectives seem challenging for many. In this book, a group of in-country experts follows a framework of qualitative and quantitative analysis to capture patterns, commonalities and differences between 12 different European countries, in terms of infrastructure endowments, institutional arrangements, time of joining the EU, behavior of market actors, personal interventions of regulators, the role of municipalities, and the role perception of governments. By exploring how the past explains present broadband market outcomes, these longitudinal country case studies look to how improvements can be made for the future. As the first in-depth study of broadband developments in Europe, this book will be invaluable to policy-makers, regulators, academic researchers, advisors, and consultants working in the fields of telecommunications, broadband development, technology and innovation.", acknowledgement = ack-nhfb, subject = "Telecommunication; Europe; Digital communications; Broadband communication systems; Telecommunication policy; Information technology; Government policy; BUSINESS and ECONOMICS / Entrepreneurship.", } @Book{Polstra:2015:HPT, editor = "Philip Polstra and Vivek Ramachandran", title = "Hacking and penetration testing with low power devices", publisher = pub-ELSEVIER, address = pub-ELSEVIER:adr, pages = "xv + 243", year = "2015", ISBN = "0-12-800751-6, 0-12-800824-5 (e-book), 1-322-09763-1 (e-book)", ISBN-13 = "978-0-12-800751-8, 978-0-12-800824-9 (e-book), 978-1-322-09763-3 (e-book)", LCCN = "QA76.9.A25 P5965 2015", bibdate = "Thu Feb 26 13:54:03 MST 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", URL = "http://www.sciencedirect.com/science/book/9780128007518", acknowledgement = ack-nhfb, subject = "Penetration testing (Computer security); Equipment and supplies; BeagleBone (Computer)", tableofcontents = "Meet the deck \\ Meet the Beagles \\ Installing a base operating system \\ Filling the toolbox \\ Powering the deck \\ Input and output devices \\ Building an army of devices \\ Keeping your army secret \\ Adding air support \\ Future directions", } @Book{Schneier:2015:DGH, author = "Bruce Schneier", title = "Data and {Goliath}: the hidden battles to collect your data and control your world", publisher = pub-NORTON, address = pub-NORTON:adr, pages = "383", year = "2015", ISBN = "0-393-24481-4 (hardcover)", ISBN-13 = "978-0-393-24481-6 (hardcover)", LCCN = "HM846 .S362 2015", bibdate = "Mon Jul 17 15:16:22 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, author-dates = "1963--", subject = "Electronic surveillance; Social aspects; Information technology; Computer security; Privacy, Right of; Social control", tableofcontents = "Data as a by-product of computing \\ Data as surveillance \\ Analyzing our data \\ The business of surveillance \\ Government surveillance and control \\ Consolidation of institutional control \\ Political liberty and justice \\ Commercial fairness and equality \\ Business competitiveness \\ Privacy \\ Security \\ Principles \\ Solutions for government \\ Solutions for corporations \\ Solutions for the rest of us \\ Social norms and the big data trade-off", } @Article{Lombardi:2016:ATV, author = "Michael A. Lombardi and Andrew N. Novick and George Neville-Neil and Ben Cooke", title = "Accurate, Traceable, and Verifiable Time Synchronization for World Financial Markets", journal = j-J-RES-NATL-INST-STAND-TECHNOL, volume = "121", number = "??", pages = "436--463", day = "7", month = oct, year = "2016", CODEN = "JRITEF", DOI = "https://doi.org/10.6028/jres.121.023", ISSN = "1044-677X (print), 2165-7254 (electronic)", ISSN-L = "1044-677X", bibdate = "Wed Oct 19 09:46:04 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib", URL = "http://nvlpubs.nist.gov/nistpubs/jres/121/jres.121.023.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of research of the National Institute of Standards and Technology", journal-URL = "http://www.nist.gov/nvl/jres.cfm", remark = "This paper provides an excellent survey of the current status of accurate time keeping, showing that geographically-separated NIST clocks can often be synchronized to within less than one nanosecond, and that commercial clocks that supply computer time via NTP (Network Time Protocol) and PTP (Precision Time Protocol) in North America can maintain an average deviation of 2.2 microseconds, although the time fluctuates within a range of 114 microseconds.", } @Book{Tufekci:2017:TTG, author = "Zeynep Tufekci", title = "{Twitter} and Tear Gas: the Power and Fragility of Networked Protest", publisher = pub-YALE, address = pub-YALE:adr, pages = "xxxi + 326", year = "2017", ISBN = "0-300-21512-6 (hardcover)", ISBN-13 = "978-0-300-21512-0 (hardcover)", LCCN = "HM742 .T84 2017", bibdate = "Mon Jul 17 15:10:40 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Social media; Political aspects; Online social networks; Social movements; Protest movements; COMPUTERS / Web / Social Media; POLITICAL SCIENCE / Political Freedom; SOCIAL SCIENCE / Media Studies; Protestbewegung; Social Media; Governance; Soziale Bewegung; Internet; Tr{\"a}nenreizstoff", tableofcontents = "Part one: Making a movement \\ A networked public \\ Censorship and attention \\ Leading the leaderless \\ Movement cultures \\ Part two: A protester's tools \\ Technology and people \\ Platforms and algorithms \\ Names and connections \\ Part three: After the protests \\ Signaling power and signaling to power \\ Governments strike back \\ Epilogue: The uncertain climb", } @Book{Evans:2018:BBU, author = "Claire Lisa Evans", title = "Broad band: the untold story of the women who made the {Internet}", publisher = "Portfolio", address = "New York, NY, USA", pages = "278", year = "2018", ISBN = "0-7352-1175-2 (hardcover), 0-7352-1176-0 (e-pub)", ISBN-13 = "978-0-7352-1175-9 (hardcover), 978-0-7352-1176-6 (e-pub)", LCCN = "QA76.2.A2 E93 2018", bibdate = "Sun Mar 18 09:07:24 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/adabooks.bib; https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", abstract = "The history of technology you probably know is one of men and machines, garages and riches, alpha nerds and programmers. But the little-known fact is that female visionaries have always been at the vanguard of technology and innovation --- they've just been erased from the story. Until now. Women are not ancillary to the history of technology; they turn up at the very beginning of every important wave. But they've often been hidden in plain sight, their inventions and contributions touching our lives in ways we don't even realize. VICE reporter and YACHT lead singer Claire L. Evans finally gives these unsung female heroes their due with her insightful social history of the Broad Band, the women who made the internet what it is today. Learn from Ada Lovelace, the tortured, imaginative daughter of Lord Byron, who wove numbers into the first program for a mechanical computer in 1842. Seek inspiration from Grace Hopper, the tenacious mathematician who democratized computing by leading the charge for machine-independent programming languages after World War II. Meet Elizabeth ``Jake'' Feinler, the one-woman Google who kept the earliest version of the Internet online, and Stacy Horn, who ran one of the first-ever social networks on a shoestring out of her New York City apartment in the 1980s. Evans shows us how these women built and colored the technologies we can't imagine life without. Join the ranks of the pioneers who defied social convention and the longest odds to become database poets, information-wranglers, hypertext dreamers, and glass ceiling-shattering dot com-era entrepreneurs. This inspiring call to action is a revelation: women have embraced technology from the start. It shines a light on the bright minds whom history forgot, and shows us how they will continue to shape our world in ways we can no longer ignore. Welcome to the Broad Band. You're next.", acknowledgement = ack-nhfb, subject = "women computer scientists; biography; Internet; history; biography and autobiography / women; biography and autobiography / science and technology", tableofcontents = "The Dell / 1 \\ A Computer Wanted / 9 \\ Amazing Grace / 27 \\ The Salad Days / 53 \\ Tower of Babel / 64 \\ The Computer Girls / 75 \\ The Longest Cave / 83 \\ Resource on E95 / 109 \\ Communities / 129 \\ Miss Outer Boro / 177 \\ Women Com 204 / 222 \\ The Cyber Feminists / 237 \\ Acknowledgments / 243 \\ Index / 269", } @Book{Gregory:2018:TBUb, author = "Nathan Gregory", title = "The {Tym} before: the untold origins of cloud computing", publisher = "lulu.com", address = "Lexington, KY, USA", pages = "476", year = "2018", ISBN = "1-973430-18-5", ISBN-13 = "978-1-973430-18-6", LCCN = "QA76.585 .G74 2018", bibdate = "Tue Mar 2 14:22:46 MST 2021", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/internet2010.bib", abstract = "The Cloud! It sounds so fluffy and soft. Amorphous, remote, floating above the world. Run it in the Cloud, we cay. A modern metaphor, but once we had another name, a more descriptive name for using someone else's computer. We called it time-sharing. Today we mix the idea of using distant computers and the idea of communicating via a network and call the combination The Cloud, imagining we have invented something new. But it isn't so new after all. Beginning in the 1960s, a company created a successful business making remote computer services available inexpensively to anyone via a network built for that purpose. Companies offered online resources from banking to research, email to instant messaging, and the ability to run applications on powerful, remote computers and access them from anywhere. In doing so, they created the first cloud. They called it Tymnet, and the company was Tymshare. I worked for Tymnet for more that 12 years, from the beginning of 1980 until 1992. The people I worked with were some of the finest anywhere, and the memories of my years with Tymnet are among my fondest. It gives me great pleasure to present the story of the first cloud, as told by those who created it.", acknowledgement = ack-nhfb, subject = "Cloud computing; History", } @Book{Marshall:2018:HBH, author = "Joseph Marshall", title = "Hands-on bug hunting for penetration testers: a practical guide to help ethical hackers discover web application security flaws", publisher = pub-PACKT, address = pub-PACKT:adr, pages = "viii + 234", year = "2018", ISBN = "1-78934-420-4 (paperback), 1-78934-989-3 (e-book)", ISBN-13 = "978-1-78934-420-2 (paperback), 978-1-78934-989-4 (e-book)", LCCN = "TK5105.5485", bibdate = "Mon May 27 11:34:39 MDT 2019", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/internet2010.bib", URL = "https://international.scholarvox.com/book/88863226", acknowledgement = ack-nhfb, subject = "Computer networks; Monitoring; Security measures; Penetration testing (Computer security); Web applications; Monitoring.; Security measures.; Penetration testing (Computer security); Web applications.", } @Book{Greenberg:2019:SNE, author = "Andy Greenberg", title = "{Sandworm}: a New Era of Cyberwar and the Hunt for the {Kremlin}'s Most Dangerous Hackers", publisher = "Doubleday", address = "New York, NY, USA", pages = "xiii + 348", year = "2019", ISBN = "0-385-54440-5 (hardcover), 0-525-56463-2 (paperback), 0-385-54441-3 (e-book)", ISBN-13 = "978-0-385-54440-5 (hardcover), 978-0-525-56463-8 (paperback), 978-0-385-54441-2 (e-book)", LCCN = "HV6773.R8 G74 2019", bibdate = "Fri Nov 22 16:30:44 MST 2019", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/internet2010.bib", abstract = "In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen, including the first-ever blackouts triggered by hackers. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest companies --- from drug manufacturing to software to shipping. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage --- the largest, most devastating cyberattack the world had ever seen. The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike. A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national stability and security. As the Kremlin's role in meddling in the 2016 election, manipulating foreign governments, and sparking chaos comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the line between digital and physical conflict, between wartime and peacetime, have begun to blur --- with world-shaking implications.", acknowledgement = ack-nhfb, subject = "Computer crimes; Russia (Federation); Hackers; Computers / Security / Viruses and Malware", } @Book{Ilyas:2019:DCf, author = "Ihab F. Ilyas and Xu Chu", title = "Data Cleaning", volume = "28", publisher = pub-ACM, address = pub-ACM:adr, pages = "xix + 260", year = "2019", DOI = "https://doi.org/10.1145/3310205", ISBN = "1-4503-7152-3 (hardcover), 1-4503-7153-1 (paperback), 1-4503-7154-X (e-pub), 1-4503-7155-8 (e-book)", ISBN-13 = "978-1-4503-7152-0 (hardcover), 978-1-4503-7153-7 (paperback), 978-1-4503-7154-4 (e-pub), 978-1-4503-7155-1 (e-book)", LCCN = "QA76.9.D3 I483 2019", bibdate = "Wed Apr 28 15:35:33 MDT 2021", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/internet2010.bib", series = "ACM Books", abstract = "Data quality is one of the most important problems in data management, since dirty data often leads to inaccurate data analytics results and incorrect business decisions. Poor data across businesses and the U.S. government are reported to cost trillions of dollars a year. Multiple surveys show that dirty data is the most common barrier faced by data scientists. Not surprisingly, developing effective and efficient data cleaning solutions is challenging and is rife with deep theoretical and engineering problems. This book is about data cleaning, which is used to refer to all kinds of tasks and activities to detect and repair errors in the data. Rather than focus on a particular data cleaning task, we give an overview of the end=to-end data cleaning process, describing various error detection and repair methods, and attempt to anchor these proposals with multiple taxonomies and views. Specifically, we cover four of the most common and important data cleaning tasks, namely, outlier detection, data transformation, error repair (including imputing missing values), and data deduplication. Furthermore, due to the increasing popularity and applicability of machine learning techniques, we include a chapter that specifically explores how machine learning techniques are used for data cleaning, and how data cleaning is used to improve machine learning models. This book is intended to serve as a useful reference for researchers and practitioners who are interested in the area of data quality and data cleaning. It can also be used as a textbook for a graduate course. Although we aim at covering state-of-the-art algorithms and techniques, we recognize that data cleaning is still an active field of research and therefore provide future directions of research whenever appropriate.", acknowledgement = ack-nhfb, subject = "Data editing; Database management; Electronic data processing", tableofcontents = "Introduction: Data Cleaning Workflow \\ Book Scope \\ Outlier Detection: A Taxonomy of Outlier Detection Methods \\ Statistics-Based Outlier Detection \\ Distance-Based Outlier Detection --- Model-Based Outlier Detection \\ Outlier Detection in High-Dimensional Data \\ Conclusion \\ Data Deduplication: Similarity Metrics \\ Predicting Duplicate Pairs \\ Clustering \\ Blocking for Deduplication \\ Distributed Data Deduplication \\ Record Fusion and Entity Consolidation \\ Human-Involved Data Deduplication \\ Data Deduplication Tools \\ Conclusion \\ Data Transformation: Syntactic Data Transformations \\ Semantic Data Transformations \\ ETL Tools \\ Conclusion \\ Data Quality Rule Definition and Discovery: Functional Dependencies \\ Conditional Functional Dependencies \\ Denial Constraints \\ Other Types of Constraints \\ Conclusion --- Rule-Based Data Cleaning: Violation Detection \\ Error Repair \\ Conclusion --- Machine Learning and Probabilistic Data Cleaning: Machine Learning for Data Deduplication \\ Machine Learning for Data Repair \\ Data Cleaning for Analytics and Machine Learning --Conclusion and Future Thoughts", } @Article{Mcilroy:2019:SHS, author = "Ross Mcilroy and Jaroslav Sevcik and Tobias Tebbi and Ben L. Titzer and Toon Verwaest", title = "{Spectre} is here to stay: An analysis of side-channels and speculative execution", journal = "arxiv.org", volume = "??", number = "??", pages = "1--26", day = "14", month = feb, year = "2019", bibdate = "Thu Aug 22 09:08:00 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib", URL = "https://arxiv.org/abs/1902.05178", abstract = "The recent discovery of the Spectre and Meltdown attacks represents a watershed moment not just for the field of Computer Security, but also of Programming Languages. This paper explores speculative side-channel attacks and their implications for programming languages. These attacks leak information through micro-architectural side-channels which we show are not mere bugs, but in fact lie at the foundation of optimization. We identify three open problems, (1) finding side-channels, (2) understanding speculative vulnerabilities, and (3) mitigating them. For (1) we introduce a mathematical meta-model that clarifies the source of side-channels in simulations and CPUs. For (2) we introduce an architectural model with speculative semantics to study recently-discovered vulnerabilities. For (3) we explore and evaluate software mitigations and prove one correct for this model. Our analysis is informed by extensive offensive research and defensive implementation work for V8, the production JavaScript virtual machine in Chrome. Straightforward extensions to model real hardware suggest these vulnerabilities present formidable challenges for effective, efficient mitigation. As a result of our work, we now believe that speculative vulnerabilities on today's hardware defeat all language-enforced confidentiality with no known comprehensive software mitigations, as we have discovered that untrusted code can construct a universal read gadget to read all memory in the same address space through side-channels. In the face of this reality, we have shifted the security model of the Chrome web browser and V8 to process isolation.", acknowledgement = ack-nhfb, } %%% ==================================================================== %%% Cross-referenced entries must come last: @Book{Vacca:2010:MIS, editor = "John R. Vacca", booktitle = "Managing information security", title = "Managing information security", publisher = pub-ELSEVIER, address = pub-ELSEVIER:adr, pages = "xxiv + 296", year = "2010", ISBN = "1-59749-533-6 (papercover)", ISBN-13 = "978-1-59749-533-2 (papercover)", LCCN = "QA76.9.A25 M31845 2010", bibdate = "Tue Jun 24 08:10:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Computer security; Management; Computer networks; Security measures; Penetration testing (Computer security)", tableofcontents = "Information security essentials for IT managers: protecting mission-critical systems / Albert Caballero \\ Security management systems / Joe Wright and James Harmening \\ Information technology security management / Rahul Bhasker, Bhushan Kapoor \\ Identity management / Jean-Marc Seigneur, Tewfiq El Maliki \\ Intrusion prevention and detection systems / Christopher Day \\ Computer forensics / Scott R. Ellis \\ Network forensics / Yong Guan, Linfeng Zhang \\ Firewalls / Errin W. Fulp \\ Penetration testing / Jay Bavisi \\ What is vulnerability assessment? / Almantas Kakareka", }