@Preamble{"\input bibnames.sty " #
"\input path.sty " #
"\hyphenation{
} "
}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|https://www.math.utah.edu/~beebe/|"}
@String{j-J-RES-NATL-INST-STAND-TECHNOL = "Journal of research of the National
Institute of Standards and Technology"}
@String{pub-ACM = "ACM Press"}
@String{pub-ACM:adr = "New York, NY 10036, USA"}
@String{pub-AW = "Ad{\-d}i{\-s}on-Wes{\-l}ey"}
@String{pub-AW:adr = "Reading, MA, USA"}
@String{pub-ARTECH = "Artech House Inc."}
@String{pub-ARTECH:adr = "Norwood, MA, USA"}
@String{pub-CAMBRIDGE = "Cambridge University Press"}
@String{pub-CAMBRIDGE:adr = "Cambridge, UK"}
@String{pub-CHAPMAN-HALL-CRC = "Chapman and Hall/CRC"}
@String{pub-CHAPMAN-HALL-CRC:adr = "Boca Raton, FL, USA"}
@String{pub-CRC = "CRC Press"}
@String{pub-CRC:adr = "2000 N.W. Corporate Blvd., Boca Raton, FL
33431-9868, USA"}
@String{pub-ELSEVIER = "Elsevier"}
@String{pub-ELSEVIER:adr = "Amsterdam, The Netherlands"}
@String{pub-MCGRAW-HILL = "Mc{\-}Graw-Hill"}
@String{pub-MCGRAW-HILL:adr = "New York, NY, USA"}
@String{pub-NO-STARCH = "No Starch Press"}
@String{pub-NO-STARCH:adr = "San Francisco, CA, USA"}
@String{pub-NORTON = "W. W. Norton \& Co."}
@String{pub-NORTON:adr = "New York, NY, USA"}
@String{pub-PACKT = "Packt Publishing"}
@String{pub-PACKT:adr = "Birmingham"}
@String{pub-PH = "Pren{\-}tice-Hall"}
@String{pub-PH:adr = "Upper Saddle River, NJ 07458, USA"}
@String{pub-SV = "Spring{\-}er-Ver{\-}lag"}
@String{pub-SV:adr = "Berlin, Germany~/ Heidelberg,
Germany~/ London, UK~/ etc."}
@String{pub-SYNGRESS = "Syngress Publishing, Inc."}
@String{pub-SYNGRESS:adr = "Rockland, MA, USA"}
@String{pub-WILEY = "Wiley"}
@String{pub-WILEY:adr = "New York, NY, USA"}
@String{pub-YALE = "Yale University Press"}
@String{pub-YALE:adr = "New Haven, CT, USA"}
@Book{Davies:2010:HIR,
editor = "Howard Davies and Beatrice Bressan",
title = "A History of International Research Networking: The
People who Made it Happen",
publisher = pub-WILEY,
address = pub-WILEY:adr,
pages = "xxviii + 317",
month = feb,
year = "2010",
DOI = "https://doi.org/10.1002/9783527629336",
ISBN = "3-527-32710-X (hardcover), 3-527-62933-5 (e-book)",
ISBN-13 = "978-3-527-32710-2 (hardcover), 978-3-527-62933-6
(e-book)",
LCCN = "TK5105.875.I57 H57 2010",
bibdate = "Thu Aug 1 06:49:03 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib",
abstract = "The first book written and edited by the people who
developed the Internet, this book deals with the
history of creating universal protocols and a global
data transfer network. The result is THE authoritative
source on the topic, providing a vast amount of insider
knowledge unavailable elsewhere. Despite the huge
number of contributors, the text is uniform in style
and level, and of interest to every scientist and a
must-have for all network developers as well as
agencies dealing with the Net.",
acknowledgement = ack-nhfb,
tableofcontents = "Early days \\
The role of funding bodies \\
Organized cooperation \\
Different approaches \\
The interviews \\
The bandwidth breakthrough \\
Support for applications \\
Regional perspectives \\
Transatlantic connections \\
A European achievement",
}
@Book{Boyle:2010:AIS,
author = "Randall Boyle",
title = "Applied information security: a hands-on guide to
information security software",
publisher = pub-PH,
address = pub-PH:adr,
pages = "viii + 226",
year = "2010",
ISBN = "0-13-612203-5",
ISBN-13 = "978-0-13-612203-6",
LCCN = "QA76.9.A25",
bibdate = "Thu Sep 24 19:01:49 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib",
acknowledgement = ack-nhfb,
}
@Book{Clarke:2010:CWN,
author = "Richard A. (Richard Alan) Clarke and Robert K. Knake",
title = "Cyber war: the next threat to national security and
what to do about it",
publisher = "Ecco",
address = "New York, NY, USA",
pages = "xiv + 290",
year = "2010",
ISBN = "0-06-196223-6 (hardcover)",
ISBN-13 = "978-0-06-196223-3 (hardcover)",
LCCN = "HV6773.2 .C53 2010",
bibdate = "Wed Apr 28 13:41:23 MDT 2010",
bibsource = "aubrey.tamu.edu:7090/voyager;
https://www.math.utah.edu/pub/tex/bib/internet2010.bib",
acknowledgement = ack-nhfb,
subject = "Cyberterrorism; United States; Information warfare;
Prevention",
}
@Book{DeFino:2010:OCE,
author = "Steven DeFino",
title = "Official certified ethical hacker review guide",
publisher = "Course Technology, Cengage Learning",
address = "Boston, MA, USA",
pages = "xxii + 361",
year = "2010",
ISBN = "1-4354-8853-9 (paperback)",
ISBN-13 = "978-1-4354-8853-3 (paperback)",
LCCN = "QA76.3 .D445 2010",
bibdate = "Tue Jun 24 08:10:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
remark = "Exam 312-50.",
subject = "Electronic data processing personnel; Certification;
Computer security; Examinations; Study guides;
Penetration testing (Computer security); Computer
hackers; Computer networks",
tableofcontents = "Ethical hacking \\
Hacking laws \\
Footprinting \\
Google hacking \\
Scanning \\
Enumeration \\
System hacking \\
Trojans and backdoors \\
Viruses and worms \\
Sniffers, spoofing, and session hijacking \\
Social engineering \\
Denial of service \\
Buffer overflows \\
Hacking Web servers and Web applications \\
Wireless networking \\
Cryptography \\
Hacking with Linux \\
IDSs, firewalls, and honeypots \\
Summary of optional modules \\
Penetration testing",
}
@Book{Franceschetti:2010:HSF,
editor = "Giorgio Franceschetti and Marina Grossi",
title = "Homeland Security Facets Threats: Countermeasures, and
the Privacy Issue",
publisher = pub-ARTECH,
address = pub-ARTECH:adr,
pages = "280 (est.)",
year = "2010",
ISBN = "1-60807-106-5",
ISBN-13 = "978-1-60807-106-7",
LCCN = "????",
bibdate = "Thu May 12 10:18:56 MDT 2011",
bibsource = "fsz3950.oclc.org:210/WorldCat;
https://www.math.utah.edu/pub/tex/bib/internet2010.bib",
URL = "http://www.artechhouse.com/Detail.aspx?strIsbn=978-1-60807-106-7",
acknowledgement = ack-nhfb,
tableofcontents = "General Overview Homeland Security and National
Defense in the 21st Century \\
The Appropriate Interdisciplinary Approach to Handle
the Asymmetric Homeland Security Challenge \\
Security Challenges in Information Systems \\
Threats and Possible Countermeasures Physical
Infrastructures and Wireless Sensor Networks \\
Analysis of the Domino Effect in Critical
Infrastructures \\
Model-Based Design of Trustworthy Health Information
Systems \\
Detection, Identification, and Tracking of Dangerous
Materials \\
Urban Defense Using Mobile Sensor Platforms:
Surveillance and Protection \\
The Privacy Issue Toward a New Legal Framework by
Cybersecurity \\
Privacy vs Security: A Fight that May Turn into an
Alliance \\
Examples of Critical Security Implementation \\
The Large Event Security Issue: The G8 Case \\
Real Experiences on Homeland Security Systems",
}
@Book{Jackson:2010:NSA,
author = "Chris Jackson",
title = "Network security auditing",
publisher = "Cisco Press",
address = "Indianapolis, IN, USA",
pages = "xxiv + 488",
year = "2010",
ISBN = "1-58705-352-7 (paperback)",
ISBN-13 = "978-1-58705-352-8 (paperback)",
LCCN = "TK5105.59 .J325 2010",
bibdate = "Mon Apr 25 18:09:49 MDT 2011",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
series = "Cisco Press networking technology series",
acknowledgement = ack-nhfb,
subject = "Computer networks; Security measures; Evaluation",
}
@Book{Kurose:2010:CNT,
author = "James F. Kurose and Keith W. Ross",
title = "Computer networking: a top-down approach",
publisher = pub-AW,
address = pub-AW:adr,
edition = "Fifth",
pages = "xxiv + 862",
year = "2010",
ISBN = "0-13-607967-9",
ISBN-13 = "978-0-13-607967-5",
LCCN = "TK5105.875.I57 K88 2010",
bibdate = "Wed Dec 23 12:55:06 MST 2009",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
subject = "Internet; Computer networks",
}
@Book{Prowell:2010:SDN,
author = "Stacy J. Prowell and Rob Kraus and Mike Borkin",
title = "Seven deadliest network attacks",
publisher = pub-SYNGRESS,
address = pub-SYNGRESS:adr,
pages = "xiv + 142",
year = "2010",
ISBN = "1-59749-549-2 (paperback)",
ISBN-13 = "978-1-59749-549-3 (paperback)",
LCCN = "TK5105.59 .P76 2010",
bibdate = "Tue Jun 24 08:10:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
series = "Syngress seven deadliest attacks series",
acknowledgement = ack-nhfb,
subject = "Computer networks; Security measures; Access control",
tableofcontents = "Denial of service \\
War dialing \\
Penetration ``testing'' \\
Protocol tunneling \\
Spanning tree attacks \\
Man-in-the-middle \\
Password replay",
}
@Book{Szoka:2010:NDD,
author = "Berin Szoka and Adam Marcus and Jonathan L. Zittrain
and Yochai Benkler and John G. Palfrey",
title = "The Next Digital Decade: Essays on the Future of the
Internet",
publisher = "TechFreedom",
address = "Washington D.C",
pages = "575",
year = "2010",
ISBN = "1-4357-6786-1",
ISBN-13 = "978-1-4357-6786-7",
LCCN = "HM851 .N49 2010",
bibdate = "Mon Jul 8 08:48:22 MDT 2019",
bibsource = "fsz3950.oclc.org:210/WorldCat;
https://www.math.utah.edu/pub/tex/bib/internet2010.bib",
URL = "https://books.google.com/books?id=DZMSQHOfUKcC",
acknowledgement = ack-nhfb,
remark = "More information about this book in available at
NextDitigalDecade.com. This work is licensed under the
Creative Commons Attribution-NonCommercial-ShareAlike
3.0 Unported license.",
subject = "Internet; Cyberspace; Privacy, Right of; Information
society; Information technology; Web search engines;
Censorship; Censorship; Cyberspace; Information
society; Information technology; Internet; Privacy,
Right of; Web search engines.",
tableofcontents = "Foreword / Berin Szoka \\
25 years after .com: Ten questions / Berin Szoka \\
Why we must resist the temptation of web 2.0 / Andrew
Keen \\
The case for internet optimism, part 1: saving the net
from its detractors / Adam Thierer \\
Protecting the internet without wrecking it: how to
meet the security threat / Jonathan Zittrain \\
A portrait of the internet as a young man / Ann Bartow
\\
The case for internet optimism, part 2: saving the net
from its supporters / Adam Thierer \\
The third wave of internet exceptionalism / Eric
Goldman \\
A declaration of the dependence of cyberspace / Alex
Kozinski and Josh Goldfoot \\
Is internet exceptionalism dead? / Tim Wu \\
Section 230 of the CDA: internet exceptionalism as a
statutory construct / H. Brian Holland \\
Internet exceptionalism revisited / Mark MacCarthy \\
Computer--mediated transactions / Hal R. Varian \\
Decentralization, freedom to operate and human
sociality / Yochai Benkler \\
The economics of information: from dismal science to
strange tales / Larry Downes \\
The regulation of reputational information / Eric
Goldman \\
Imagining the future of global internet governance /
Milton Mueller \\
Democracy in cyberspace: self--governing netizens and a
new, global form of civic virtue, online / Robert R.
Johnson \\
Who's who in internet politics: a taxonomy of
information technology policy and politics / Robert D.
Atkinson \\
Trusting (and verifying) online intermediaries'
policing / Frank Pasquale \\
Online liability for payment systems / Mark MacCarthy
\\
Fuzzy boundaries: the potential impact of vague
secondary liability doctrines on technology innovation
/ Paul Szynol \\
Dominant search engines: an essential cultural and
facility / Frank Pasquale \\
The problem of search engines as essential facilities:
an economic and legal assessment / Geoffrey A. Manne
\\
Some skepticism about search neutrality / James
Grimmelmann \\
Search engine bias and the demise of search engine
utopianism / Eric Goldman \\
Privacy protection in the next digital decade:
``trading up'' or a ``race to the bottom''? / Michael
Zimmer \\
The privacy problem: what's wrong with privacy? /
Stewart Baker \\
A market approach to privacy policy / Larry Downs \\
The global problem of state censorship and the need to
confront it / John G. Palfrey, Jr. \\
The role of the internet community in combating hate
speech / Christopher Wolf \\
Can the internet liberate the world? / Evgeny Morozov
\\
Internet freedom: beyond circumvention / Ethan
Zuckermann",
}
@Book{Wilhelm:2010:PPT,
editor = "Thomas Wilhelm",
title = "Professional penetration testing: creating and
operating a formal hacking lab",
publisher = pub-SYNGRESS,
address = pub-SYNGRESS:adr,
pages = "xix + 504",
year = "2010",
ISBN = "1-59749-425-9 (paperback), 1-59749-466-6 (DVD)",
ISBN-13 = "978-1-59749-425-0 (paperback), 978-1-59749-466-3
(DVD)",
LCCN = "TK5105.59 .W544 2010",
bibdate = "Tue Jun 24 08:10:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
subject = "Computer networks; Security measures; Penetration
testing (Computer security); Testing; Computer
hackers",
}
@Book{Anonymous:2011:PT,
author = "Anonymous",
title = "Penetration testing",
publisher = "Course Technology, Cengage Learning",
address = "Clifton Park, NY, USA",
pages = "????",
year = "2011",
ISBN = "1-4354-8366-9 (vol. 1 : paperback), 1-4354-8367-7
(vol. 2 : paperback), 1-4354-8368-5 (vol. 3 :
paperback), 1-4354-8369-3 (vol. 4 : paperback),
1-4354-8370-7 (vol. 5 : paperback)",
ISBN-13 = "978-1-4354-8366-8 (vol. 1 : paperback),
978-1-4354-8367-5 (vol. 2 : paperback),
978-1-4354-8368-2 (vol. 3 : paperback),
978-1-4354-8369-9 (vol. 4 : paperback),
978-1-4354-8370-5 (vol. 5 : paperback)",
LCCN = "QA76.9.A25 P4355 2011",
bibdate = "Tue Jun 24 08:10:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
remark = "Volume \ldots{} of 5 mapping to EC-Council Certified
Security Analyst certification.",
subject = "Penetration testing (Computer security); Examinations;
Study guides; Computers; Access control; Computer
networks; Security measures; Electronic data processing
personnel; Certification; Telecommunications
engineers",
tableofcontents = "v. 1. Security analysis \\
v. 2. Procedures and methodologies \\
v. 3. Network and perimeter testing \\
v. 4. Communication media testing \\
v. 5. Network threat testing",
}
@Book{Engebretson:2011:BHP,
editor = "Pat (Patrick Henry) Engebretson and James {Broad,
CISSP.}",
title = "The basics of hacking and penetration testing: ethical
hacking and penetration testing made easy",
publisher = pub-SYNGRESS,
address = pub-SYNGRESS:adr,
pages = "xvii + 159",
year = "2011",
ISBN = "1-59749-655-3",
ISBN-13 = "978-1-59749-655-1",
LCCN = "QA76.9.A25 E5443 2011",
bibdate = "Tue Jun 24 08:10:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
series = "Syngress the basics",
acknowledgement = ack-nhfb,
author-dates = "1974--",
subject = "Penetration testing (Computer security); Computer
security; Computer hackers; Computer software; Testing;
Computer crimes; Prevention",
tableofcontents = "What is penetration testing? \\
Reconnaissance \\
Scanning \\
Exploitation \\
Web based exploitation \\
Maintaining access with backdoors and rootkits",
}
@Book{Luccio:2011:MAF,
author = "Fabrizio Luccio and Linda Pagli and Graham Steel",
title = "Mathematical and algorithmic foundations of the
{Internet}",
publisher = pub-CHAPMAN-HALL-CRC,
address = pub-CHAPMAN-HALL-CRC:adr,
pages = "xv + 205",
year = "2011",
ISBN = "1-4398-3138-6 (hardback)",
ISBN-13 = "978-1-4398-3138-0 (hardback)",
LCCN = "TK5105.875.I57 L835 2011",
bibdate = "Fri Nov 16 06:30:56 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
series = "Chapman and Hall/CRC Press applied algorithms and data
structures series",
acknowledgement = ack-nhfb,
subject = "Internet; Mathematical models; World Wide Web;
COMPUTERS / Programming / Algorithms; MATHEMATICS /
General; MATHEMATICS / Combinatorics",
}
@Book{Mills:2011:CNT,
author = "David L. Mills",
title = "Computer network time synchronization: the {Network
Time Protocol}",
publisher = "Taylor and Francis",
address = "Boca Raton, FL, USA",
edition = "Second",
pages = "????",
year = "2011",
ISBN = "1-4398-1463-5",
ISBN-13 = "978-1-4398-1463-5",
LCCN = "TK5105.575 .M55 2011",
bibdate = "Sat May 8 14:45:59 MDT 2010",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
subject = "Network Time Protocol (computer network protocol);
synchronous data transmission systems; computer
networks; management; synchronization",
}
@Book{Wilhelm:2011:NHU,
author = "Thomas Wilhelm and Jason Andress",
title = "Ninja hacking: unconventional penetration testing
tactics and techniques",
publisher = pub-SYNGRESS,
address = pub-SYNGRESS:adr,
pages = "xii + 310",
year = "2011",
ISBN = "1-59749-588-3",
ISBN-13 = "978-1-59749-588-2",
LCCN = "QA76.9.A25 W548 2011",
bibdate = "Tue Jun 24 08:10:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
subject = "Penetration testing (Computer security); Computer
security; Computer crimes; Prevention; Computer
hackers",
}
@Book{Blum:2012:TJC,
author = "Andrew Blum",
title = "Tubes: a journey to the center of the {Internet}",
publisher = "Ecco",
address = "New York, NY, USA",
pages = "294",
year = "2012",
ISBN = "0-06-199493-6",
ISBN-13 = "978-0-06-199493-7",
LCCN = "TK5105.875.I57 B58 2012",
bibdate = "Wed Jun 6 05:51:36 MDT 2012",
bibsource = "fsz3950.oclc.org:210/WorldCat;
https://www.math.utah.edu/pub/tex/bib/internet2010.bib",
acknowledgement = ack-nhfb,
subject = "Internet; History; Social aspects; Telecommunication
systems; Information technology; Information
superhighway",
tableofcontents = "The map \\
A network of networks \\
Only connect \\
The whole Internet \\
Cities of light \\
The longest tubes \\
Where data sleeps \\
Home",
}
@Book{Jacobson:2012:CSL,
author = "Douglas Jacobson and Joseph Idziorek",
title = "Computer security literacy: staying safe in a digital
world",
publisher = pub-CRC,
address = pub-CRC:adr,
pages = "????",
year = "2012",
ISBN = "1-4398-5618-4 (paperback)",
ISBN-13 = "978-1-4398-5618-5 (paperback)",
LCCN = "QA76.9.A25 J224 2013",
bibdate = "Fri Nov 16 06:28:42 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
subject = "Computer security; COMPUTERS / Security / General.;
COMPUTERS / Security / Cryptography.",
}
@TechReport{Martin:2012:HPE,
author = "Olivier H. Martin",
title = "The ``hidden'' Prehistory of {European} Research
Networking",
type = "Report",
institution = "ICTC Consulting",
address = "????, Switzerland",
pages = "125",
day = "25",
month = oct,
year = "2012",
bibdate = "Thu Aug 01 06:50:28 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib",
URL = "http://ictconsulting.ch/reports/European-Research-Internet-History.pdf",
acknowledgement = ack-nhfb,
}
@Book{Mjolsnes:2012:MII,
editor = "Stig F. Mj{\"o}lsnes",
title = "A multidisciplinary introduction to information
security",
publisher = pub-CRC,
address = pub-CRC:adr,
pages = "xxv + 322",
year = "2012",
ISBN = "1-4200-8590-5 (hardback)",
ISBN-13 = "978-1-4200-8590-7 (hardback)",
LCCN = "QA76.9.A25 M845 2012",
bibdate = "Fri Nov 16 06:32:35 MST 2012",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
series = "Discrete mathematics and its applications",
acknowledgement = ack-nhfb,
subject = "Computer security; Computer networks; Security
measures; Computers; Access control; Multidisciplinary
design optimization; COMPUTERS / Computer Engineering.
; COMPUTERS / Networking / General.; TECHNOLOGY and
ENGINEERING / Electrical.",
}
@Book{Tiller:2012:CGP,
author = "James S. Tiller",
title = "{CISO}'s guide to penetration testing: a framework to
plan, manage, and maximize benefits",
publisher = pub-CRC,
address = pub-CRC:adr,
pages = "xiv + 374",
year = "2012",
ISBN = "1-4398-8027-1 (hardcover)",
ISBN-13 = "978-1-4398-8027-2 (hardcover)",
LCCN = "QA76.9.A25 T56 2012",
bibdate = "Tue Jun 24 08:10:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
subject = "Penetration testing (Computer security); Computer
networks; Security measures; Testing; Business
enterprises; Data processing",
}
@Book{Basta:2013:CSP,
author = "Alfred Basta",
title = "Computer security and penetration testing",
publisher = "Course Technology, Cengage Learning",
address = "Boston, MA",
edition = "Second",
pages = "????",
year = "2013",
ISBN = "0-8400-2093-7",
ISBN-13 = "978-0-8400-2093-2",
LCCN = "????",
bibdate = "Tue Jun 24 08:10:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
}
@Book{Bergman:2013:HEM,
author = "Neil Bergman and Mike Stanfield and Jason Rouse and
Joel Scambray",
title = "Hacking exposed: mobile security secrets and
solutions",
publisher = pub-MCGRAW-HILL,
address = pub-MCGRAW-HILL:adr,
pages = "xxvii + 289",
year = "2013",
ISBN = "0-07-181701-8 (paperback)",
ISBN-13 = "978-0-07-181701-1 (paperback)",
LCCN = "TK5105.59 .B464 2013",
bibdate = "Thu Apr 2 07:18:49 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
abstract = "Proven methodologies, technical rigor, and
from-the-trenches experience to countering mobile
security exploits--from the bestselling coauthor of the
original Hacking Exposed. Hacking Exposed Mobile
focuses on the security of applications running on
mobile devices, specifically mobile phones. This book
focuses on Android OS, as well as operating systems
from Microsoft and Apple. As businesses rush their
mobile products to market and conduct business
transactions via mobile devices, vast new security
risks, vulnerabilities, and exploits are of great
concern. This book addresses all of these issues and
provides proven solutions for securing mobile
applications. No other book on hacking rivals the
original, bulletproof pedagogy of this book's clear-cut
Hack/Countermeasure approach. Proven strategies for
preventing, detecting, and remediating common
technology and architecture weaknesses and maintaining
tight security controls permanently. Accessible style
and format: attacks/countermeasures; risk ratings; case
studies; self-assessment tips; check lists; and
organizational strategies.\par
Identify and evade key threats across the expanding
mobile risk landscape. Hacking Exposed Mobile :
Security Secrets and Solutions covers the wide range of
attacks to your mobile deployment alongside
ready-to-use countermeasures. Find out how attackers
compromise networks and devices, attack mobile
services, and subvert mobile apps. Learn how to encrypt
mobile data, fortify mobile platforms, and eradicate
malware. This cutting-edge guide reveals secure mobile
development guidelines, how to leverage mobile OS
features and MDM to isolate apps and data, and the
techniques the pros use to secure mobile payment
systems.",
acknowledgement = ack-nhfb,
subject = "Computer networks; Security measures; Mobile
computing; Mobile communication systems; Computer
hackers; Computer crimes; Prevention; COMPUTERS /
Networking / Security.",
tableofcontents = "The Mobile Risk Ecosystem \\
Hacking the Cellular Network \\
iOS \\
Android \\
Mobile Malware \\
Mobile Services and Mobile Web \\
Mobile Device Management \\
Mobile Development Security \\
Mobile Payments \\
Consumer Security Checklist \\
Security Checklist \\
Mobile Application Penetration Testing Toolkit \\
iOS Pen Test Toolkit \\
Android Pen Test Toolkit",
}
@Book{Carpenter:2013:NGH,
author = "Brian E. Carpenter",
title = "Network Geeks --- How They Built the {Internet}",
publisher = pub-SV,
address = pub-SV:adr,
pages = "ix + 161 + 15",
year = "2013",
DOI = "https://doi.org/10.1007/978-1-4471-5025-1",
ISBN = "1-4471-5024-4 (paperback), 1-4471-5025-2 (e-book)",
ISBN-13 = "978-1-4471-5024-4 (paperback), 978-1-4471-5025-1
(e-book)",
LCCN = "QA76.17; TK5105.875.I57 C37 2013",
bibdate = "Thu Aug 01 06:53:07 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib",
URL = "https://sites.google.com/site/bcabrc/network-geeks-book",
abstract = "The impact on modern society made by the Internet is
immeasurable. Yet some questioned ``why anyone would
want such a thing'' when the idea was first introduced.
Part history, part memoir and part cultural study,
\booktitle{Network Geeks} charts the creation of the
Internet and the establishment of the Internet
Engineering Task Force, from the viewpoint of a
self-proclaimed geek who witnessed these developments
first-hand. With boundless enthusiasm and abundant
humour, Brian Carpenter leads the reader on a journey
from post-war Britain to post-millennium New Zealand,
describing how the Internet grew into today's
ubiquitous, global network, including the genesis of
the World-Wide Web in the hotbeds of a particle
collider at CERN. Illuminating the science and
technology behind the apparent ``magic trick'' of the
Internet, \booktitle{Network Geeks} opens a window into
the initially bewildering world of the Internet
engineering geek. After reading this book, you may wish
to join this world yourself.",
acknowledgement = ack-nhfb,
tableofcontents = "Front Matter / i--ix \\
Hey folks! / 1--7 \\
Before my time / 9--25 \\
Where do geeks come from? / 27--37 \\
Going up / 39--52 \\
In control / 53--62 \\
Two ivory towers / 63--77 \\
Diversity / 79--95 \\
Economy class / 97--109 \\
Parallel universes / 111--125 \\
The years of miraculous growth / 127--140 \\
Going under / 141--150 \\
Back matter / 151--161",
}
@Book{Engebretson:2013:BHP,
editor = "Pat (Patrick Henry) Engebretson",
title = "The basics of hacking and penetration testing: ethical
hacking and penetration testing made easy",
publisher = "Syngress, an imprint of Elsevier",
address = "Amsterdam, The Netherlands",
edition = "Second",
pages = "xviii + 204",
year = "2013",
ISBN = "0-12-411644-2 (paperback)",
ISBN-13 = "978-0-12-411644-3 (paperback)",
LCCN = "QA76.9.A25 E5443 2013",
bibdate = "Tue Jun 24 08:10:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
author-dates = "1974--",
subject = "Penetration testing (Computer security); Computer
hackers; Computer software; Testing; Computer crimes;
Prevention",
tableofcontents = "What is Penetration Testing? \\
Reconnaissance \\
Scanning \\
Exploitation \\
Web Based Exploitation \\
Maintaining Access with Backdoors and Rootkits
\\
Wrapping Up the Penetration Test",
}
@Book{Neely:2013:WRP,
author = "Matthew Neely and Alex Hamerstone and Chris Sanyk",
title = "Wireless reconnaissance in penetration testing",
publisher = "Elsevier/Syngress",
address = "Amsterdam, The Netherlands",
pages = "xvi + 166",
year = "2013",
ISBN = "1-59749-731-2",
ISBN-13 = "978-1-59749-731-2",
LCCN = "TK7882.E2 N44 2013",
bibdate = "Tue Jun 24 08:10:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
subject = "Electronic surveillance; Penetration testing (Computer
security); Wireless communication systems; Security
measures",
tableofcontents = "Why radio profiling? \\
Basic radio theory and introduction to radio systems
\\
Targets (wireless headsets, guard radios, wireless
cameras, etc.) \\
Offsite profiling \\
Offsite profiling case study \\
Onsite profiling \\
Onsite profiling case study \\
How to use the information you gather \\
Basic overview of equipment and how it works \\
Case study to pull it all together \\
New technology and the future of radios in penetration
testing",
}
@Book{Wilhelm:2013:PPT,
editor = "Thomas Wilhelm",
title = "Professional penetration testing",
publisher = pub-SYNGRESS,
address = pub-SYNGRESS:adr,
edition = "Second",
pages = "????",
year = "2013",
ISBN = "1-59749-993-5",
ISBN-13 = "978-1-59749-993-4",
LCCN = "TK5105.59 .W544 2013",
bibdate = "Tue Jun 24 08:10:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
subject = "Computer networks; Security measures; Penetration
testing (Computer security); Testing; Computer
hackers",
tableofcontents = "Volume 1. Creating and Learning in a Hacking Lab",
}
@Book{Baloch:2014:EHP,
author = "Rafay Baloch",
title = "Ethical hacking and penetration testing guide",
publisher = pub-CRC,
address = pub-CRC:adr,
pages = "????",
year = "2014",
ISBN = "1-4822-3161-1 (paperback)",
ISBN-13 = "978-1-4822-3161-8 (paperback)",
LCCN = "QA76.9.A25 B356 2014",
bibdate = "Tue Jun 24 08:10:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
abstract = "This book introduces the steps required to complete
a penetration test, or ethical hack. Requiring no prior
hacking experience, the book explains how to utilize
and interpret the results of modern day hacking tools,
which are required to complete a penetration test.
Coverage includes Backtrack Linux, Google
reconnaissance, MetaGooFil, dig, Nmap, Nessus,
Metasploit, Fast Track Autopwn, Netcat, and Hacker
Defender rootkit. Simple explanations of how to use
these tools and a four-step methodology for conducting
a penetration test provide readers with a better
understanding of offensive security.",
acknowledgement = ack-nhfb,
subject = "Penetration testing (Computer security); COMPUTERS /
Security / General.; COMPUTERS / Networking / General.;
LAW / Forensic Science.",
}
@Book{Broad:2014:HKP,
author = "James Broad and Andrew Bindner",
title = "Hacking with {Kali}: practical penetration testing
techniques",
publisher = "Syngress, an imprint of Elsevier",
address = "Amsterdam, The Netherlands",
edition = "First",
pages = "ix + 227",
year = "2014",
ISBN = "0-12-407749-8 (alkaline paper)",
ISBN-13 = "978-0-12-407749-2 (alkaline paper)",
LCCN = "QA76.9.A25 B772 2014",
bibdate = "Tue Jun 24 08:10:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
subject = "Penetration testing (Computer security); Kali Linux;
Computer hackers",
tableofcontents = "Introduction \\
Download and install Kali Linux \\
Software, patches, and upgrades \\
Configuring Kali Linux \\
Building a penetration testing lab \\
Introduction to the penetration test lifecycle
\\
Reconnaissance \\
Scanning \\
Exploitation \\
Maintaining access \\
Reports and templates \\
Appendix A: Tribal Chicken \\
Appendix B: Kali penetration testing tools",
}
@Book{Krebs:2014:SNI,
author = "Brian Krebs",
title = "Spam nation: the inside story of organized cybercrime
--- from global epidemic to your front door",
publisher = "Sourcebooks, Inc.",
address = "Naperville, IL, USA",
pages = "????",
year = "2014",
ISBN = "1-4022-9561-8 (hardcover)",
ISBN-13 = "978-1-4022-9561-4 (hardcover)",
LCCN = "HV6773.2 .K74 2014",
bibdate = "Mon Nov 24 12:24:28 MST 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
abstract = "Explores ``the criminal masterminds driving some of
the biggest spam and hacker operations targeting
Americans and their bank accounts. Tracing the rise,
fall, and alarming resurrection of the digital mafia
behind the two largest spam pharmacies --- and
countless viruses, phishing, and spyware attacks --- he
delivers the first definitive narrative of the global
spam problem and its threat to consumers
everywhere''.",
acknowledgement = ack-nhfb,
subject = "Computer crimes; United States; Internet fraud; Spam
(Electronic mail); Phishing; Organized crime",
}
@Book{Lane:2014:PBD,
editor = "Julia I. Lane and Victoria Stodden and Stefan Bender
and Helen Nissenbaum",
booktitle = "Privacy, big data, and the public good: frameworks for
engagement",
title = "Privacy, big data, and the public good: frameworks for
engagement",
publisher = pub-CAMBRIDGE,
address = pub-CAMBRIDGE:adr,
pages = "xix + 322",
year = "2014",
ISBN = "1-107-06735-9 (hardcover), 1-107-63768-6 (paperback)",
ISBN-13 = "978-1-107-06735-6 (hardcover), 978-1-107-63768-9
(paperback)",
LCCN = "JC596 .P747 2015",
bibdate = "Sat Jun 28 10:20:29 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
abstract = "Massive amounts of data on human beings can now be
analyzed. Pragmatic purposes abound, including selling
goods and services, winning political campaigns, and
identifying possible terrorists. Yet 'big data' can
also be harnessed to serve the public good: scientists
can use big data to do research that improves the lives
of human beings, improves government services, and
reduces taxpayer costs. In order to achieve this goal,
researchers must have access to this data - raising
important privacy questions. What are the ethical and
legal requirements? What are the rules of engagement?
What are the best ways to provide access while also
protecting confidentiality? Are there reasonable
mechanisms to compensate citizens for privacy loss? The
goal of this book is to answer some of these questions.
The book's authors paint an intellectual landscape that
includes legal, economic, and statistical frameworks.
The authors also identify new practical approaches that
simultaneously maximize the utility of data access
while minimizing information risk.",
acknowledgement = ack-nhfb,
subject = "privacy, right of; research; moral and ethical
aspects; big data; social aspects; common good",
tableofcontents = "Part I. Conceptual Framework: Editors' introduction
/ Julia Lane, Victoria Stodden, Stefan Bender and Helen
Nissenbaum \\
1. Monitoring, datafication, and consent: legal
approaches to privacy in the big data context /
Katherine J. Strandburg \\
2. Big data's end run around anonymity and consent /
Solon Barocas and Helen Nissenbaum \\
3. The economics and behavioral economics of privacy /
Alessandro Acquisti \\
4. The legal and regulatory framework: what do the
rules say about data analysis? / Paul Ohm \\
5. Enabling reproducibility in big data research:
balancing confidentiality and scientific transparency /
Victoria Stodden \\
Part II. Practical Framework: Editors' introduction /
Julia Lane, Victoria Stodden, Stefan Bender and Helen
Nissenbaum \\
6. The value of big data for urban science / Steven E.
Koonin and Michael J. Holland \\
7. The new role of cities in creating value / Robert
Goerge \\
8. A European perspective / Peter Elias \\
9. Institutional controls: the new deal on data /
Daniel Greenwood, Arkadiusz Stopczynski, Brian Sweatt,
Thomas Hardjono and Alex Pentland \\
10. The operational framework: engineered controls /
Carl Landwehr \\
11. Portable approaches to informed consent and open
data / John Wilbanks \\
Part III. Statistical Framework: Editors' introduction
/ Julia Lane, Victoria Stodden, Stefan Bender and Helen
Nissenbaum \\
12. Extracting information from big data / Frauke
Kreuter and Roger Peng \\
13. Using statistics to protect privacy / Alan F. Karr
and Jerome P. Reiter \\
14. Differential privacy: a cryptographic approach to
private data analysis / Cynthia Dwork",
}
@Book{Watson:2014:SEP,
author = "Gavin Watson",
title = "Social engineering penetration testing: executing
social engineering pen tests, assessments and defense",
publisher = pub-SYNGRESS,
address = pub-SYNGRESS:adr,
pages = "????",
year = "2014",
ISBN = "0-12-420124-5",
ISBN-13 = "978-0-12-420124-8",
LCCN = "HM668 .W38 2014",
bibdate = "Tue Jun 24 08:10:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
author-dates = "1982--",
subject = "Social engineering",
}
@Book{Weidman:2014:PTH,
author = "Georgia Weidman",
title = "Penetration testing: a hands-on introduction to
hacking",
publisher = pub-NO-STARCH,
address = pub-NO-STARCH:adr,
pages = "????",
year = "2014",
ISBN = "1-59327-564-1 (paperback)",
ISBN-13 = "978-1-59327-564-8 (paperback)",
LCCN = "QA76.9.A25 W4258 2014",
bibdate = "Tue Jun 24 08:10:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
abstract = "In \booktitle{Penetration Testing}, security
researcher and trainer Georgia Weidman provides you
with a survey of important skills that any aspiring
pentester needs. This beginner-friendly book opens with
some basics of programming and helps you navigate Kali
Linux, an operating system that comes preloaded with
useful computer security tools like Wireshark and
Metasploit. You'll learn about gathering information on
a target, social engineering, capturing network
traffic, analyzing vulnerabilities, developing
exploits, and more. Hands-on examples discuss even
advanced topics like mobile device security and
bypassing anti-virus software.",
acknowledgement = ack-nhfb,
subject = "Penetration testing (Computer security); Kali Linux;
computer hackers; computers / internet / security.;
computers / networking / security.; computers /
security / general.",
tableofcontents = "Foreward by Peter Van Eeckhoutte \\
\\
Acknowledgements \\
\\
Introduction \\
\\
Penetration Testing Primer \\
\\
Part 1: The Basics \\
\\
Chapter 1: Setting Up Your Virtual Lab \\
Chapter 2: Using Kali Linux \\
Chapter 3: Programming \\
Chapter 4: Using the Metasploit Framework \\
\\
Part 2: Assessments \\
\\
Chapter 5: Information Gathering \\
Chapter 6: Finding Vulnerabilities \\
Chapter 7: Capturing Traffic \\
\\
Part 3: Attacks \\
\\
Chapter 8: Exploitation \\
Chapter 9: Password Attacks \\
Chapter 10: Client-Side Exploitation \\
Chapter 11: Social Engineering \\
Chapter 12: Bypassing Antivirus Applications \\
Chapter 13: Post Exploitation \\
Chapter 14: Web Application Testing \\
Chapter 15: Wireless Attacks \\
\\
Part 4: Exploit Development \\
\\
Chapter 16: A Stack-Based Buffer Overflow in Linux \\
Chapter 17: A Stack-Based Buffer Overflow in Windows
\\
Chapter 18: Structured Exception Handler Overwrites \\
Chapter 19: Fuzzing, Porting Exploits, and Metasploit
Modules \\
\\
Part 5: Mobile Hacking \\
\\
Chapter 20: Using the Smartphone Pentest Framework \\
\\
Resources \\
\\
Index",
}
@Book{Lemstra:2015:DBM,
editor = "W. (Wolter) Lemstra and William H. Melody",
title = "The Dynamics of broadband markets in {Europe}:
realizing the 2020 digital agenda",
publisher = pub-CAMBRIDGE,
address = pub-CAMBRIDGE:adr,
pages = "xx + 409",
year = "2015",
ISBN = "1-107-07358-8 (hardcover)",
ISBN-13 = "978-1-107-07358-6 (hardcover)",
LCCN = "HE8084 .D96 2015",
bibdate = "Wed Mar 25 10:52:37 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
URL = "http://assets.cambridge.org/97811070/73586/cover/9781107073586.jpg",
abstract = "The European Commission's Digital Agenda for Europe
sets the targets for broadband development by 2020, yet
current broadband market outcomes vary widely amongst
the EU Member States and the objectives seem
challenging for many. In this book, a group of
in-country experts follows a framework of qualitative
and quantitative analysis to capture patterns,
commonalities and differences between 12 different
European countries, in terms of infrastructure
endowments, institutional arrangements, time of joining
the EU, behavior of market actors, personal
interventions of regulators, the role of
municipalities, and the role perception of governments.
By exploring how the past explains present broadband
market outcomes, these longitudinal country case
studies look to how improvements can be made for the
future. As the first in-depth study of broadband
developments in Europe, this book will be invaluable to
policy-makers, regulators, academic researchers,
advisors, and consultants working in the fields of
telecommunications, broadband development, technology
and innovation.",
acknowledgement = ack-nhfb,
subject = "Telecommunication; Europe; Digital communications;
Broadband communication systems; Telecommunication
policy; Information technology; Government policy;
BUSINESS and ECONOMICS / Entrepreneurship.",
}
@Book{Polstra:2015:HPT,
editor = "Philip Polstra and Vivek Ramachandran",
title = "Hacking and penetration testing with low power
devices",
publisher = pub-ELSEVIER,
address = pub-ELSEVIER:adr,
pages = "xv + 243",
year = "2015",
ISBN = "0-12-800751-6, 0-12-800824-5 (e-book), 1-322-09763-1
(e-book)",
ISBN-13 = "978-0-12-800751-8, 978-0-12-800824-9 (e-book),
978-1-322-09763-3 (e-book)",
LCCN = "QA76.9.A25 P5965 2015",
bibdate = "Thu Feb 26 13:54:03 MST 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
URL = "http://www.sciencedirect.com/science/book/9780128007518",
acknowledgement = ack-nhfb,
subject = "Penetration testing (Computer security); Equipment and
supplies; BeagleBone (Computer)",
tableofcontents = "Meet the deck \\
Meet the Beagles \\
Installing a base operating system \\
Filling the toolbox \\
Powering the deck \\
Input and output devices \\
Building an army of devices \\
Keeping your army secret \\
Adding air support \\
Future directions",
}
@Book{Schneier:2015:DGH,
author = "Bruce Schneier",
title = "Data and {Goliath}: the hidden battles to collect your
data and control your world",
publisher = pub-NORTON,
address = pub-NORTON:adr,
pages = "383",
year = "2015",
ISBN = "0-393-24481-4 (hardcover)",
ISBN-13 = "978-0-393-24481-6 (hardcover)",
LCCN = "HM846 .S362 2015",
bibdate = "Mon Jul 17 15:16:22 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
author-dates = "1963--",
subject = "Electronic surveillance; Social aspects; Information
technology; Computer security; Privacy, Right of;
Social control",
tableofcontents = "Data as a by-product of computing \\
Data as surveillance \\
Analyzing our data \\
The business of surveillance \\
Government surveillance and control \\
Consolidation of institutional control \\
Political liberty and justice \\
Commercial fairness and equality \\
Business competitiveness \\
Privacy \\
Security \\
Principles \\
Solutions for government \\
Solutions for corporations \\
Solutions for the rest of us \\
Social norms and the big data trade-off",
}
@Article{Lombardi:2016:ATV,
author = "Michael A. Lombardi and Andrew N. Novick and George
Neville-Neil and Ben Cooke",
title = "Accurate, Traceable, and Verifiable Time
Synchronization for World Financial Markets",
journal = j-J-RES-NATL-INST-STAND-TECHNOL,
volume = "121",
number = "??",
pages = "436--463",
day = "7",
month = oct,
year = "2016",
CODEN = "JRITEF",
DOI = "https://doi.org/10.6028/jres.121.023",
ISSN = "1044-677X (print), 2165-7254 (electronic)",
ISSN-L = "1044-677X",
bibdate = "Wed Oct 19 09:46:04 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib",
URL = "http://nvlpubs.nist.gov/nistpubs/jres/121/jres.121.023.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of research of the National Institute of
Standards and Technology",
journal-URL = "http://www.nist.gov/nvl/jres.cfm",
remark = "This paper provides an excellent survey of the current
status of accurate time keeping, showing that
geographically-separated NIST clocks can often be
synchronized to within less than one nanosecond, and
that commercial clocks that supply computer time via
NTP (Network Time Protocol) and PTP (Precision Time
Protocol) in North America can maintain an average
deviation of 2.2 microseconds, although the time
fluctuates within a range of 114 microseconds.",
}
@Book{Tufekci:2017:TTG,
author = "Zeynep Tufekci",
title = "{Twitter} and Tear Gas: the Power and Fragility of
Networked Protest",
publisher = pub-YALE,
address = pub-YALE:adr,
pages = "xxxi + 326",
year = "2017",
ISBN = "0-300-21512-6 (hardcover)",
ISBN-13 = "978-0-300-21512-0 (hardcover)",
LCCN = "HM742 .T84 2017",
bibdate = "Mon Jul 17 15:10:40 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
subject = "Social media; Political aspects; Online social
networks; Social movements; Protest movements;
COMPUTERS / Web / Social Media; POLITICAL SCIENCE /
Political Freedom; SOCIAL SCIENCE / Media Studies;
Protestbewegung; Social Media; Governance; Soziale
Bewegung; Internet; Tr{\"a}nenreizstoff",
tableofcontents = "Part one: Making a movement \\
A networked public \\
Censorship and attention \\
Leading the leaderless \\
Movement cultures \\
Part two: A protester's tools \\
Technology and people \\
Platforms and algorithms \\
Names and connections \\
Part three: After the protests \\
Signaling power and signaling to power \\
Governments strike back \\
Epilogue: The uncertain climb",
}
@Book{Evans:2018:BBU,
author = "Claire Lisa Evans",
title = "Broad band: the untold story of the women who made the
{Internet}",
publisher = "Portfolio",
address = "New York, NY, USA",
pages = "278",
year = "2018",
ISBN = "0-7352-1175-2 (hardcover), 0-7352-1176-0 (e-pub)",
ISBN-13 = "978-0-7352-1175-9 (hardcover), 978-0-7352-1176-6
(e-pub)",
LCCN = "QA76.2.A2 E93 2018",
bibdate = "Sun Mar 18 09:07:24 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/adabooks.bib;
https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
abstract = "The history of technology you probably know is one of
men and machines, garages and riches, alpha nerds and
programmers. But the little-known fact is that female
visionaries have always been at the vanguard of
technology and innovation --- they've just been erased
from the story. Until now. Women are not ancillary to
the history of technology; they turn up at the very
beginning of every important wave. But they've often
been hidden in plain sight, their inventions and
contributions touching our lives in ways we don't even
realize. VICE reporter and YACHT lead singer Claire L.
Evans finally gives these unsung female heroes their
due with her insightful social history of the Broad
Band, the women who made the internet what it is today.
Learn from Ada Lovelace, the tortured, imaginative
daughter of Lord Byron, who wove numbers into the first
program for a mechanical computer in 1842. Seek
inspiration from Grace Hopper, the tenacious
mathematician who democratized computing by leading the
charge for machine-independent programming languages
after World War II. Meet Elizabeth ``Jake'' Feinler,
the one-woman Google who kept the earliest version of
the Internet online, and Stacy Horn, who ran one of the
first-ever social networks on a shoestring out of her
New York City apartment in the 1980s. Evans shows us
how these women built and colored the technologies we
can't imagine life without. Join the ranks of the
pioneers who defied social convention and the longest
odds to become database poets, information-wranglers,
hypertext dreamers, and glass ceiling-shattering dot
com-era entrepreneurs. This inspiring call to action is
a revelation: women have embraced technology from the
start. It shines a light on the bright minds whom
history forgot, and shows us how they will continue to
shape our world in ways we can no longer ignore.
Welcome to the Broad Band. You're next.",
acknowledgement = ack-nhfb,
subject = "women computer scientists; biography; Internet;
history; biography and autobiography / women; biography
and autobiography / science and technology",
tableofcontents = "The Dell / 1 \\
A Computer Wanted / 9 \\
Amazing Grace / 27 \\
The Salad Days / 53 \\
Tower of Babel / 64 \\
The Computer Girls / 75 \\
The Longest Cave / 83 \\
Resource on E95 / 109 \\
Communities / 129 \\
Miss Outer Boro / 177 \\
Women Com 204 / 222 \\
The Cyber Feminists / 237 \\
Acknowledgments / 243 \\
Index / 269",
}
@Book{Gregory:2018:TBUb,
author = "Nathan Gregory",
title = "The {Tym} before: the untold origins of cloud
computing",
publisher = "lulu.com",
address = "Lexington, KY, USA",
pages = "476",
year = "2018",
ISBN = "1-973430-18-5",
ISBN-13 = "978-1-973430-18-6",
LCCN = "QA76.585 .G74 2018",
bibdate = "Tue Mar 2 14:22:46 MST 2021",
bibsource = "fsz3950.oclc.org:210/WorldCat;
https://www.math.utah.edu/pub/tex/bib/internet2010.bib",
abstract = "The Cloud! It sounds so fluffy and soft. Amorphous,
remote, floating above the world. Run it in the Cloud,
we cay. A modern metaphor, but once we had another
name, a more descriptive name for using someone else's
computer. We called it time-sharing. Today we mix the
idea of using distant computers and the idea of
communicating via a network and call the combination
The Cloud, imagining we have invented something new.
But it isn't so new after all. Beginning in the 1960s,
a company created a successful business making remote
computer services available inexpensively to anyone via
a network built for that purpose. Companies offered
online resources from banking to research, email to
instant messaging, and the ability to run applications
on powerful, remote computers and access them from
anywhere. In doing so, they created the first cloud.
They called it Tymnet, and the company was Tymshare. I
worked for Tymnet for more that 12 years, from the
beginning of 1980 until 1992. The people I worked with
were some of the finest anywhere, and the memories of
my years with Tymnet are among my fondest. It gives me
great pleasure to present the story of the first cloud,
as told by those who created it.",
acknowledgement = ack-nhfb,
subject = "Cloud computing; History",
}
@Book{Marshall:2018:HBH,
author = "Joseph Marshall",
title = "Hands-on bug hunting for penetration testers: a
practical guide to help ethical hackers discover web
application security flaws",
publisher = pub-PACKT,
address = pub-PACKT:adr,
pages = "viii + 234",
year = "2018",
ISBN = "1-78934-420-4 (paperback), 1-78934-989-3 (e-book)",
ISBN-13 = "978-1-78934-420-2 (paperback), 978-1-78934-989-4
(e-book)",
LCCN = "TK5105.5485",
bibdate = "Mon May 27 11:34:39 MDT 2019",
bibsource = "fsz3950.oclc.org:210/WorldCat;
https://www.math.utah.edu/pub/tex/bib/internet2010.bib",
URL = "https://international.scholarvox.com/book/88863226",
acknowledgement = ack-nhfb,
subject = "Computer networks; Monitoring; Security measures;
Penetration testing (Computer security); Web
applications; Monitoring.; Security measures.;
Penetration testing (Computer security); Web
applications.",
}
@Book{Greenberg:2019:SNE,
author = "Andy Greenberg",
title = "{Sandworm}: a New Era of Cyberwar and the Hunt for the
{Kremlin}'s Most Dangerous Hackers",
publisher = "Doubleday",
address = "New York, NY, USA",
pages = "xiii + 348",
year = "2019",
ISBN = "0-385-54440-5 (hardcover), 0-525-56463-2 (paperback),
0-385-54441-3 (e-book)",
ISBN-13 = "978-0-385-54440-5 (hardcover), 978-0-525-56463-8
(paperback), 978-0-385-54441-2 (e-book)",
LCCN = "HV6773.R8 G74 2019",
bibdate = "Fri Nov 22 16:30:44 MST 2019",
bibsource = "fsz3950.oclc.org:210/WorldCat;
https://www.math.utah.edu/pub/tex/bib/internet2010.bib",
abstract = "In 2014, the world witnessed the start of a mysterious
series of cyberattacks. Targeting American utility
companies, NATO, and electric grids in Eastern Europe,
the strikes grew ever more brazen, including the
first-ever blackouts triggered by hackers. They
culminated in the summer of 2017, when the malware
known as NotPetya was unleashed, penetrating,
disrupting, and paralyzing some of the world's largest
companies --- from drug manufacturing to software to
shipping. At the attack's epicenter in Ukraine, ATMs
froze. The railway and postal systems shut down.
Hospitals went dark. NotPetya spread around the world,
inflicting an unprecedented ten billion dollars in
damage --- the largest, most devastating cyberattack
the world had ever seen. The hackers behind these
attacks are quickly gaining a reputation as the most
dangerous team of cyberwarriors in history: Sandworm.
Working in the service of Russia's military
intelligence agency, they represent a persistent,
highly skilled, state-sponsored force, one whose
talents are matched by their willingness to launch
broad, unrestrained attacks on the most critical
infrastructure of their adversaries. They target
government and private sector, military and civilians
alike. A chilling, globe-spanning detective story,
Sandworm considers the danger this force poses to our
national stability and security. As the Kremlin's role
in meddling in the 2016 election, manipulating foreign
governments, and sparking chaos comes into greater
focus, Sandworm exposes the realities not just of
Russia's global digital offensive, but of an era where
warfare ceases to be waged on the battlefield. It
reveals how the line between digital and physical
conflict, between wartime and peacetime, have begun to
blur --- with world-shaking implications.",
acknowledgement = ack-nhfb,
subject = "Computer crimes; Russia (Federation); Hackers;
Computers / Security / Viruses and Malware",
}
@Book{Ilyas:2019:DCf,
author = "Ihab F. Ilyas and Xu Chu",
title = "Data Cleaning",
volume = "28",
publisher = pub-ACM,
address = pub-ACM:adr,
pages = "xix + 260",
year = "2019",
DOI = "https://doi.org/10.1145/3310205",
ISBN = "1-4503-7152-3 (hardcover), 1-4503-7153-1 (paperback),
1-4503-7154-X (e-pub), 1-4503-7155-8 (e-book)",
ISBN-13 = "978-1-4503-7152-0 (hardcover), 978-1-4503-7153-7
(paperback), 978-1-4503-7154-4 (e-pub),
978-1-4503-7155-1 (e-book)",
LCCN = "QA76.9.D3 I483 2019",
bibdate = "Wed Apr 28 15:35:33 MDT 2021",
bibsource = "fsz3950.oclc.org:210/WorldCat;
https://www.math.utah.edu/pub/tex/bib/internet2010.bib",
series = "ACM Books",
abstract = "Data quality is one of the most important problems in
data management, since dirty data often leads to
inaccurate data analytics results and incorrect
business decisions. Poor data across businesses and the
U.S. government are reported to cost trillions of
dollars a year. Multiple surveys show that dirty data
is the most common barrier faced by data scientists.
Not surprisingly, developing effective and efficient
data cleaning solutions is challenging and is rife with
deep theoretical and engineering problems. This book is
about data cleaning, which is used to refer to all
kinds of tasks and activities to detect and repair
errors in the data. Rather than focus on a particular
data cleaning task, we give an overview of the
end=to-end data cleaning process, describing various
error detection and repair methods, and attempt to
anchor these proposals with multiple taxonomies and
views. Specifically, we cover four of the most common
and important data cleaning tasks, namely, outlier
detection, data transformation, error repair (including
imputing missing values), and data deduplication.
Furthermore, due to the increasing popularity and
applicability of machine learning techniques, we
include a chapter that specifically explores how
machine learning techniques are used for data cleaning,
and how data cleaning is used to improve machine
learning models. This book is intended to serve as a
useful reference for researchers and practitioners who
are interested in the area of data quality and data
cleaning. It can also be used as a textbook for a
graduate course. Although we aim at covering
state-of-the-art algorithms and techniques, we
recognize that data cleaning is still an active field
of research and therefore provide future directions of
research whenever appropriate.",
acknowledgement = ack-nhfb,
subject = "Data editing; Database management; Electronic data
processing",
tableofcontents = "Introduction: Data Cleaning Workflow \\
Book Scope \\
Outlier Detection: A Taxonomy of Outlier Detection
Methods \\
Statistics-Based Outlier Detection \\
Distance-Based Outlier Detection --- Model-Based
Outlier Detection \\
Outlier Detection in High-Dimensional Data \\
Conclusion \\
Data Deduplication: Similarity Metrics \\
Predicting Duplicate Pairs \\
Clustering \\
Blocking for Deduplication \\
Distributed Data Deduplication \\
Record Fusion and Entity Consolidation \\
Human-Involved Data Deduplication \\
Data Deduplication Tools \\
Conclusion \\
Data Transformation: Syntactic Data Transformations \\
Semantic Data Transformations \\
ETL Tools \\
Conclusion \\
Data Quality Rule Definition and Discovery: Functional
Dependencies \\
Conditional Functional Dependencies \\
Denial Constraints \\
Other Types of Constraints \\
Conclusion --- Rule-Based Data Cleaning: Violation
Detection \\
Error Repair \\
Conclusion --- Machine Learning and Probabilistic Data
Cleaning: Machine Learning for Data Deduplication \\
Machine Learning for Data Repair \\
Data Cleaning for Analytics and Machine Learning
--Conclusion and Future Thoughts",
}
@Article{Mcilroy:2019:SHS,
author = "Ross Mcilroy and Jaroslav Sevcik and Tobias Tebbi and
Ben L. Titzer and Toon Verwaest",
title = "{Spectre} is here to stay: An analysis of
side-channels and speculative execution",
journal = "arxiv.org",
volume = "??",
number = "??",
pages = "1--26",
day = "14",
month = feb,
year = "2019",
bibdate = "Thu Aug 22 09:08:00 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib",
URL = "https://arxiv.org/abs/1902.05178",
abstract = "The recent discovery of the Spectre and Meltdown
attacks represents a watershed moment not just for the
field of Computer Security, but also of Programming
Languages. This paper explores speculative side-channel
attacks and their implications for programming
languages. These attacks leak information through
micro-architectural side-channels which we show are not
mere bugs, but in fact lie at the foundation of
optimization. We identify three open problems, (1)
finding side-channels, (2) understanding speculative
vulnerabilities, and (3) mitigating them. For (1) we
introduce a mathematical meta-model that clarifies the
source of side-channels in simulations and CPUs. For
(2) we introduce an architectural model with
speculative semantics to study recently-discovered
vulnerabilities. For (3) we explore and evaluate
software mitigations and prove one correct for this
model. Our analysis is informed by extensive offensive
research and defensive implementation work for V8, the
production JavaScript virtual machine in Chrome.
Straightforward extensions to model real hardware
suggest these vulnerabilities present formidable
challenges for effective, efficient mitigation. As a
result of our work, we now believe that speculative
vulnerabilities on today's hardware defeat all
language-enforced confidentiality with no known
comprehensive software mitigations, as we have
discovered that untrusted code can construct a
universal read gadget to read all memory in the same
address space through side-channels. In the face of
this reality, we have shifted the security model of the
Chrome web browser and V8 to process isolation.",
acknowledgement = ack-nhfb,
}
@Book{Vacca:2010:MIS,
editor = "John R. Vacca",
booktitle = "Managing information security",
title = "Managing information security",
publisher = pub-ELSEVIER,
address = pub-ELSEVIER:adr,
pages = "xxiv + 296",
year = "2010",
ISBN = "1-59749-533-6 (papercover)",
ISBN-13 = "978-1-59749-533-2 (papercover)",
LCCN = "QA76.9.A25 M31845 2010",
bibdate = "Tue Jun 24 08:10:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
subject = "Computer security; Management; Computer networks;
Security measures; Penetration testing (Computer
security)",
tableofcontents = "Information security essentials for IT managers:
protecting mission-critical systems / Albert Caballero
\\
Security management systems / Joe Wright and James
Harmening \\
Information technology security management / Rahul
Bhasker, Bhushan Kapoor \\
Identity management / Jean-Marc Seigneur, Tewfiq El
Maliki \\
Intrusion prevention and detection systems /
Christopher Day \\
Computer forensics / Scott R. Ellis \\
Network forensics / Yong Guan, Linfeng Zhang
\\
Firewalls / Errin W. Fulp \\
Penetration testing / Jay Bavisi \\
What is vulnerability assessment? / Almantas Kakareka",
}