Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.18",
%%%     date            = "28 April 2021",
%%%     time            = "15:39:23 MDT",
%%%     filename        = "internet2010.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "30190 1673 8062 79499",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; Internet; network",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This bibliography records books and other
%%%                        publications about the Internet for the
%%%                        decade 2010--2019.  Earlier material is
%%%                        covered in the companion bibliographies,
%%%                        internet.bib and internet2000.bib.
%%%
%%%                        At version 1.18, the year coverage looked
%%%                        like this:
%%%
%%%                             2010 (  10)    2014 (   6)    2018 (   3)
%%%                             2011 (   5)    2015 (   3)    2019 (   3)
%%%                             2012 (   4)    2016 (   1)
%%%                             2013 (   5)    2017 (   1)
%%%
%%%                             Article:          2
%%%                             Book:            39
%%%
%%%                             Total entries:   41
%%%
%%%                        Numerous errors in the sources noted above
%%%                        have been corrected.  Spelling has been
%%%                        verified with the UNIX spell and GNU ispell
%%%                        programs using the exception dictionary
%%%                        stored in the companion file with extension
%%%                        .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen as
%%%                        name:year:abbrev, where name is the family
%%%                        name of the first author or editor, year is a
%%%                        4-digit number, and abbrev is a 3-letter
%%%                        condensation of important title words.
%%%                        Citation tags were automatically generated by
%%%                        software developed for the BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted
%%%                        first by ascending year, and within each
%%%                        year, alphabetically by author or editor,
%%%                        and then, if necessary, by the 3-letter
%%%                        abbreviation at the end of the BibTeX
%%%                        citation tag, using the bibsort -byyear
%%%                        utility.  Year order has been chosen to
%%%                        make it easier to identify the most recent
%%%                        work.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{"\input bibnames.sty " #
  "\input path.sty " #
  "\hyphenation{
   } "
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-J-RES-NATL-INST-STAND-TECHNOL = "Journal of research of the National
                                  Institute of Standards and Technology"}

%%% ====================================================================
%%% Publishers and their addresses:
@String{pub-ACM                 = "ACM Press"}
@String{pub-ACM:adr             = "New York, NY 10036, USA"}

@String{pub-AW                  = "Ad{\-d}i{\-s}on-Wes{\-l}ey"}
@String{pub-AW:adr              = "Reading, MA, USA"}

@String{pub-ARTECH              = "Artech House Inc."}
@String{pub-ARTECH:adr          = "Norwood, MA, USA"}

@String{pub-CAMBRIDGE           = "Cambridge University Press"}
@String{pub-CAMBRIDGE:adr       = "Cambridge, UK"}

@String{pub-CHAPMAN-HALL-CRC    = "Chapman and Hall/CRC"}
@String{pub-CHAPMAN-HALL-CRC:adr = "Boca Raton, FL, USA"}

@String{pub-CRC                 = "CRC Press"}
@String{pub-CRC:adr             = "2000 N.W. Corporate Blvd., Boca Raton, FL
                                  33431-9868, USA"}

@String{pub-ELSEVIER            = "Elsevier"}
@String{pub-ELSEVIER:adr        = "Amsterdam, The Netherlands"}

@String{pub-MCGRAW-HILL         = "Mc{\-}Graw-Hill"}
@String{pub-MCGRAW-HILL:adr     = "New York, NY, USA"}

@String{pub-NO-STARCH           = "No Starch Press"}
@String{pub-NO-STARCH:adr       = "San Francisco, CA, USA"}

@String{pub-NORTON              = "W. W. Norton \& Co."}
@String{pub-NORTON:adr          = "New York, NY, USA"}

@String{pub-PACKT               = "Packt Publishing"}
@String{pub-PACKT:adr           = "Birmingham"}

@String{pub-PH                  = "Pren{\-}tice-Hall"}
@String{pub-PH:adr              = "Upper Saddle River, NJ 07458, USA"}

@String{pub-SYNGRESS            = "Syngress Publishing, Inc."}
@String{pub-SYNGRESS:adr        = "Rockland, MA, USA"}

@String{pub-YALE                = "Yale University Press"}
@String{pub-YALE:adr            = "New Haven, CT, USA"}

%%% ====================================================================
%%% Series abbreviations:
%%% ====================================================================
%%% Bibliography entries, sorted by year, and then by citation label,
%%% with `bibsort -byyear':
@Book{Boyle:2010:AIS,
  author =       "Randall Boyle",
  title =        "Applied information security: a hands-on guide to
                 information security software",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  pages =        "viii + 226",
  year =         "2010",
  ISBN =         "0-13-612203-5",
  ISBN-13 =      "978-0-13-612203-6",
  LCCN =         "QA76.9.A25",
  bibdate =      "Thu Sep 24 19:01:49 2009",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib",
  acknowledgement = ack-nhfb,
}

@Book{Clarke:2010:CWN,
  author =       "Richard A. (Richard Alan) Clarke and Robert K. Knake",
  title =        "Cyber war: the next threat to national security and
                 what to do about it",
  publisher =    "Ecco",
  address =      "New York, NY, USA",
  pages =        "xiv + 290",
  year =         "2010",
  ISBN =         "0-06-196223-6 (hardcover)",
  ISBN-13 =      "978-0-06-196223-3 (hardcover)",
  LCCN =         "HV6773.2 .C53 2010",
  bibdate =      "Wed Apr 28 13:41:23 MDT 2010",
  bibsource =    "aubrey.tamu.edu:7090/voyager;
                 http://www.math.utah.edu/pub/tex/bib/internet2010.bib",
  acknowledgement = ack-nhfb,
  subject =      "Cyberterrorism; United States; Information warfare;
                 Prevention",
}

@Book{DeFino:2010:OCE,
  author =       "Steven DeFino",
  title =        "Official certified ethical hacker review guide",
  publisher =    "Course Technology, Cengage Learning",
  address =      "Boston, MA, USA",
  pages =        "xxii + 361",
  year =         "2010",
  ISBN =         "1-4354-8853-9 (paperback)",
  ISBN-13 =      "978-1-4354-8853-3 (paperback)",
  LCCN =         "QA76.3 .D445 2010",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  remark =       "Exam 312-50.",
  subject =      "Electronic data processing personnel; Certification;
                 Computer security; Examinations; Study guides;
                 Penetration testing (Computer security); Computer
                 hackers; Computer networks",
  tableofcontents = "Ethical hacking \\
                 Hacking laws \\
                 Footprinting \\
                 Google hacking \\
                 Scanning \\
                 Enumeration \\
                 System hacking \\
                 Trojans and backdoors \\
                 Viruses and worms \\
                 Sniffers, spoofing, and session hijacking \\
                 Social engineering \\
                 Denial of service \\
                 Buffer overflows \\
                 Hacking Web servers and Web applications \\
                 Wireless networking \\
                 Cryptography \\
                 Hacking with Linux \\
                 IDSs, firewalls, and honeypots \\
                 Summary of optional modules \\
                 Penetration testing",
}

@Book{Franceschetti:2010:HSF,
  editor =       "Giorgio Franceschetti and Marina Grossi",
  title =        "Homeland Security Facets Threats: Countermeasures, and
                 the Privacy Issue",
  publisher =    pub-ARTECH,
  address =      pub-ARTECH:adr,
  pages =        "280 (est.)",
  year =         "2010",
  ISBN =         "1-60807-106-5",
  ISBN-13 =      "978-1-60807-106-7",
  LCCN =         "????",
  bibdate =      "Thu May 12 10:18:56 MDT 2011",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 http://www.math.utah.edu/pub/tex/bib/internet2010.bib",
  URL =          "http://www.artechhouse.com/Detail.aspx?strIsbn=978-1-60807-106-7",
  acknowledgement = ack-nhfb,
  tableofcontents = "General Overview Homeland Security and National
                 Defense in the 21st Century \\
                 The Appropriate Interdisciplinary Approach to Handle
                 the Asymmetric Homeland Security Challenge \\
                 Security Challenges in Information Systems \\
                 Threats and Possible Countermeasures Physical
                 Infrastructures and Wireless Sensor Networks \\
                 Analysis of the Domino Effect in Critical
                 Infrastructures \\
                 Model-Based Design of Trustworthy Health Information
                 Systems \\
                 Detection, Identification, and Tracking of Dangerous
                 Materials \\
                 Urban Defense Using Mobile Sensor Platforms:
                 Surveillance and Protection \\
                 The Privacy Issue Toward a New Legal Framework by
                 Cybersecurity \\
                 Privacy vs Security: A Fight that May Turn into an
                 Alliance \\
                 Examples of Critical Security Implementation \\
                 The Large Event Security Issue: The G8 Case \\
                 Real Experiences on Homeland Security Systems",
}

@Book{Jackson:2010:NSA,
  author =       "Chris Jackson",
  title =        "Network security auditing",
  publisher =    "Cisco Press",
  address =      "Indianapolis, IN, USA",
  pages =        "xxiv + 488",
  year =         "2010",
  ISBN =         "1-58705-352-7 (paperback)",
  ISBN-13 =      "978-1-58705-352-8 (paperback)",
  LCCN =         "TK5105.59 .J325 2010",
  bibdate =      "Mon Apr 25 18:09:49 MDT 2011",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Cisco Press networking technology series",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures; Evaluation",
}

@Book{Kurose:2010:CNT,
  author =       "James F. Kurose and Keith W. Ross",
  title =        "Computer networking: a top-down approach",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  edition =      "Fifth",
  pages =        "xxiv + 862",
  year =         "2010",
  ISBN =         "0-13-607967-9",
  ISBN-13 =      "978-0-13-607967-5",
  LCCN =         "TK5105.875.I57 K88 2010",
  bibdate =      "Wed Dec 23 12:55:06 MST 2009",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Internet; Computer networks",
}

@Book{Prowell:2010:SDN,
  author =       "Stacy J. Prowell and Rob Kraus and Mike Borkin",
  title =        "Seven deadliest network attacks",
  publisher =    pub-SYNGRESS,
  address =      pub-SYNGRESS:adr,
  pages =        "xiv + 142",
  year =         "2010",
  ISBN =         "1-59749-549-2 (paperback)",
  ISBN-13 =      "978-1-59749-549-3 (paperback)",
  LCCN =         "TK5105.59 .P76 2010",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Syngress seven deadliest attacks series",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures; Access control",
  tableofcontents = "Denial of service \\
                 War dialing \\
                 Penetration ``testing'' \\
                 Protocol tunneling \\
                 Spanning tree attacks \\
                 Man-in-the-middle \\
                 Password replay",
}

@Book{Szoka:2010:NDD,
  author =       "Berin Szoka and Adam Marcus and Jonathan L. Zittrain
                 and Yochai Benkler and John G. Palfrey",
  title =        "The Next Digital Decade: Essays on the Future of the
                 Internet",
  publisher =    "TechFreedom",
  address =      "Washington D.C",
  pages =        "575",
  year =         "2010",
  ISBN =         "1-4357-6786-1",
  ISBN-13 =      "978-1-4357-6786-7",
  LCCN =         "HM851 .N49 2010",
  bibdate =      "Mon Jul 8 08:48:22 MDT 2019",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 http://www.math.utah.edu/pub/tex/bib/internet2010.bib",
  URL =          "https://books.google.com/books?id=DZMSQHOfUKcC",
  acknowledgement = ack-nhfb,
  remark =       "More information about this book in available at
                 NextDitigalDecade.com. This work is licensed under the
                 Creative Commons Attribution-NonCommercial-ShareAlike
                 3.0 Unported license.",
  subject =      "Internet; Cyberspace; Privacy, Right of; Information
                 society; Information technology; Web search engines;
                 Censorship; Censorship; Cyberspace; Information
                 society; Information technology; Internet; Privacy,
                 Right of; Web search engines.",
  tableofcontents = "Foreword / Berin Szoka \\
                 25 years after .com: Ten questions / Berin Szoka \\
                 Why we must resist the temptation of web 2.0 / Andrew
                 Keen \\
                 The case for internet optimism, part 1: saving the net
                 from its detractors / Adam Thierer \\
                 Protecting the internet without wrecking it: how to
                 meet the security threat / Jonathan Zittrain \\
                 A portrait of the internet as a young man / Ann Bartow
                 \\
                 The case for internet optimism, part 2: saving the net
                 from its supporters / Adam Thierer \\
                 The third wave of internet exceptionalism / Eric
                 Goldman \\
                 A declaration of the dependence of cyberspace / Alex
                 Kozinski and Josh Goldfoot \\
                 Is internet exceptionalism dead? / Tim Wu \\
                 Section 230 of the CDA: internet exceptionalism as a
                 statutory construct / H. Brian Holland \\
                 Internet exceptionalism revisited / Mark MacCarthy \\
                 Computer--mediated transactions / Hal R. Varian \\
                 Decentralization, freedom to operate and human
                 sociality / Yochai Benkler \\
                 The economics of information: from dismal science to
                 strange tales / Larry Downes \\
                 The regulation of reputational information / Eric
                 Goldman \\
                 Imagining the future of global internet governance /
                 Milton Mueller \\
                 Democracy in cyberspace: self--governing netizens and a
                 new, global form of civic virtue, online / Robert R.
                 Johnson \\
                 Who's who in internet politics: a taxonomy of
                 information technology policy and politics / Robert D.
                 Atkinson \\
                 Trusting (and verifying) online intermediaries'
                 policing / Frank Pasquale \\
                 Online liability for payment systems / Mark MacCarthy
                 \\
                 Fuzzy boundaries: the potential impact of vague
                 secondary liability doctrines on technology innovation
                 / Paul Szynol \\
                 Dominant search engines: an essential cultural and
                 facility / Frank Pasquale \\
                 The problem of search engines as essential facilities:
                 an economic and legal assessment / Geoffrey A. Manne
                 \\
                 Some skepticism about search neutrality / James
                 Grimmelmann \\
                 Search engine bias and the demise of search engine
                 utopianism / Eric Goldman \\
                 Privacy protection in the next digital decade:
                 ``trading up'' or a ``race to the bottom''? / Michael
                 Zimmer \\
                 The privacy problem: what's wrong with privacy? /
                 Stewart Baker \\
                 A market approach to privacy policy / Larry Downs \\
                 The global problem of state censorship and the need to
                 confront it / John G. Palfrey, Jr. \\
                 The role of the internet community in combating hate
                 speech / Christopher Wolf \\
                 Can the internet liberate the world? / Evgeny Morozov
                 \\
                 Internet freedom: beyond circumvention / Ethan
                 Zuckermann",
}

@Book{Wilhelm:2010:PPT,
  editor =       "Thomas Wilhelm",
  title =        "Professional penetration testing: creating and
                 operating a formal hacking lab",
  publisher =    pub-SYNGRESS,
  address =      pub-SYNGRESS:adr,
  pages =        "xix + 504",
  year =         "2010",
  ISBN =         "1-59749-425-9 (paperback), 1-59749-466-6 (DVD)",
  ISBN-13 =      "978-1-59749-425-0 (paperback), 978-1-59749-466-3
                 (DVD)",
  LCCN =         "TK5105.59 .W544 2010",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures; Penetration
                 testing (Computer security); Testing; Computer
                 hackers",
}

@Book{Anonymous:2011:PT,
  author =       "Anonymous",
  title =        "Penetration testing",
  publisher =    "Course Technology, Cengage Learning",
  address =      "Clifton Park, NY, USA",
  pages =        "????",
  year =         "2011",
  ISBN =         "1-4354-8366-9 (vol. 1 : paperback), 1-4354-8367-7
                 (vol. 2 : paperback), 1-4354-8368-5 (vol. 3 :
                 paperback), 1-4354-8369-3 (vol. 4 : paperback),
                 1-4354-8370-7 (vol. 5 : paperback)",
  ISBN-13 =      "978-1-4354-8366-8 (vol. 1 : paperback),
                 978-1-4354-8367-5 (vol. 2 : paperback),
                 978-1-4354-8368-2 (vol. 3 : paperback),
                 978-1-4354-8369-9 (vol. 4 : paperback),
                 978-1-4354-8370-5 (vol. 5 : paperback)",
  LCCN =         "QA76.9.A25 P4355 2011",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  remark =       "Volume \ldots{} of 5 mapping to EC-Council Certified
                 Security Analyst certification.",
  subject =      "Penetration testing (Computer security); Examinations;
                 Study guides; Computers; Access control; Computer
                 networks; Security measures; Electronic data processing
                 personnel; Certification; Telecommunications
                 engineers",
  tableofcontents = "v. 1. Security analysis \\
                 v. 2. Procedures and methodologies \\
                 v. 3. Network and perimeter testing \\
                 v. 4. Communication media testing \\
                 v. 5. Network threat testing",
}

@Book{Engebretson:2011:BHP,
  editor =       "Pat (Patrick Henry) Engebretson and James {Broad,
                 CISSP.}",
  title =        "The basics of hacking and penetration testing: ethical
                 hacking and penetration testing made easy",
  publisher =    pub-SYNGRESS,
  address =      pub-SYNGRESS:adr,
  pages =        "xvii + 159",
  year =         "2011",
  ISBN =         "1-59749-655-3",
  ISBN-13 =      "978-1-59749-655-1",
  LCCN =         "QA76.9.A25 E5443 2011",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Syngress the basics",
  acknowledgement = ack-nhfb,
  author-dates = "1974--",
  subject =      "Penetration testing (Computer security); Computer
                 security; Computer hackers; Computer software; Testing;
                 Computer crimes; Prevention",
  tableofcontents = "What is penetration testing? \\
                 Reconnaissance \\
                 Scanning \\
                 Exploitation \\
                 Web based exploitation \\
                 Maintaining access with backdoors and rootkits",
}

@Book{Luccio:2011:MAF,
  author =       "Fabrizio Luccio and Linda Pagli and Graham Steel",
  title =        "Mathematical and algorithmic foundations of the
                 {Internet}",
  publisher =    pub-CHAPMAN-HALL-CRC,
  address =      pub-CHAPMAN-HALL-CRC:adr,
  pages =        "xv + 205",
  year =         "2011",
  ISBN =         "1-4398-3138-6 (hardback)",
  ISBN-13 =      "978-1-4398-3138-0 (hardback)",
  LCCN =         "TK5105.875.I57 L835 2011",
  bibdate =      "Fri Nov 16 06:30:56 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Chapman and Hall/CRC Press applied algorithms and data
                 structures series",
  acknowledgement = ack-nhfb,
  subject =      "Internet; Mathematical models; World Wide Web;
                 COMPUTERS / Programming / Algorithms; MATHEMATICS /
                 General; MATHEMATICS / Combinatorics",
}

@Book{Mills:2011:CNT,
  author =       "David L. Mills",
  title =        "Computer network time synchronization: the {Network
                 Time Protocol}",
  publisher =    "Taylor and Francis",
  address =      "Boca Raton, FL, USA",
  edition =      "Second",
  pages =        "????",
  year =         "2011",
  ISBN =         "1-4398-1463-5",
  ISBN-13 =      "978-1-4398-1463-5",
  LCCN =         "TK5105.575 .M55 2011",
  bibdate =      "Sat May 8 14:45:59 MDT 2010",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Network Time Protocol (computer network protocol);
                 synchronous data transmission systems; computer
                 networks; management; synchronization",
}

@Book{Wilhelm:2011:NHU,
  author =       "Thomas Wilhelm and Jason Andress",
  title =        "Ninja hacking: unconventional penetration testing
                 tactics and techniques",
  publisher =    pub-SYNGRESS,
  address =      pub-SYNGRESS:adr,
  pages =        "xii + 310",
  year =         "2011",
  ISBN =         "1-59749-588-3",
  ISBN-13 =      "978-1-59749-588-2",
  LCCN =         "QA76.9.A25 W548 2011",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Penetration testing (Computer security); Computer
                 security; Computer crimes; Prevention; Computer
                 hackers",
}

@Book{Blum:2012:TJC,
  author =       "Andrew Blum",
  title =        "Tubes: a journey to the center of the {Internet}",
  publisher =    "Ecco",
  address =      "New York, NY, USA",
  pages =        "294",
  year =         "2012",
  ISBN =         "0-06-199493-6",
  ISBN-13 =      "978-0-06-199493-7",
  LCCN =         "TK5105.875.I57 B58 2012",
  bibdate =      "Wed Jun 6 05:51:36 MDT 2012",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 http://www.math.utah.edu/pub/tex/bib/internet2010.bib",
  acknowledgement = ack-nhfb,
  subject =      "Internet; History; Social aspects; Telecommunication
                 systems; Information technology; Information
                 superhighway",
  tableofcontents = "The map \\
                 A network of networks \\
                 Only connect \\
                 The whole Internet \\
                 Cities of light \\
                 The longest tubes \\
                 Where data sleeps \\
                 Home",
}

@Book{Jacobson:2012:CSL,
  author =       "Douglas Jacobson and Joseph Idziorek",
  title =        "Computer security literacy: staying safe in a digital
                 world",
  publisher =    pub-CRC,
  address =      pub-CRC:adr,
  pages =        "????",
  year =         "2012",
  ISBN =         "1-4398-5618-4 (paperback)",
  ISBN-13 =      "978-1-4398-5618-5 (paperback)",
  LCCN =         "QA76.9.A25 J224 2013",
  bibdate =      "Fri Nov 16 06:28:42 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; COMPUTERS / Security / General.;
                 COMPUTERS / Security / Cryptography.",
}

@Book{Mjolsnes:2012:MII,
  editor =       "Stig F. Mj{\"o}lsnes",
  title =        "A multidisciplinary introduction to information
                 security",
  publisher =    pub-CRC,
  address =      pub-CRC:adr,
  pages =        "xxv + 322",
  year =         "2012",
  ISBN =         "1-4200-8590-5 (hardback)",
  ISBN-13 =      "978-1-4200-8590-7 (hardback)",
  LCCN =         "QA76.9.A25 M845 2012",
  bibdate =      "Fri Nov 16 06:32:35 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Discrete mathematics and its applications",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Computer networks; Security
                 measures; Computers; Access control; Multidisciplinary
                 design optimization; COMPUTERS / Computer Engineering.
                 ; COMPUTERS / Networking / General.; TECHNOLOGY and
                 ENGINEERING / Electrical.",
}

@Book{Tiller:2012:CGP,
  author =       "James S. Tiller",
  title =        "{CISO}'s guide to penetration testing: a framework to
                 plan, manage, and maximize benefits",
  publisher =    pub-CRC,
  address =      pub-CRC:adr,
  pages =        "xiv + 374",
  year =         "2012",
  ISBN =         "1-4398-8027-1 (hardcover)",
  ISBN-13 =      "978-1-4398-8027-2 (hardcover)",
  LCCN =         "QA76.9.A25 T56 2012",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Penetration testing (Computer security); Computer
                 networks; Security measures; Testing; Business
                 enterprises; Data processing",
}

@Book{Basta:2013:CSP,
  author =       "Alfred Basta",
  title =        "Computer security and penetration testing",
  publisher =    "Course Technology, Cengage Learning",
  address =      "Boston, MA",
  edition =      "Second",
  pages =        "????",
  year =         "2013",
  ISBN =         "0-8400-2093-7",
  ISBN-13 =      "978-0-8400-2093-2",
  LCCN =         "????",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
}

@Book{Bergman:2013:HEM,
  author =       "Neil Bergman and Mike Stanfield and Jason Rouse and
                 Joel Scambray",
  title =        "Hacking exposed: mobile security secrets and
                 solutions",
  publisher =    pub-MCGRAW-HILL,
  address =      pub-MCGRAW-HILL:adr,
  pages =        "xxvii + 289",
  year =         "2013",
  ISBN =         "0-07-181701-8 (paperback)",
  ISBN-13 =      "978-0-07-181701-1 (paperback)",
  LCCN =         "TK5105.59 .B464 2013",
  bibdate =      "Thu Apr 2 07:18:49 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  abstract =     "Proven methodologies, technical rigor, and
                 from-the-trenches experience to countering mobile
                 security exploits--from the bestselling coauthor of the
                 original Hacking Exposed. Hacking Exposed Mobile
                 focuses on the security of applications running on
                 mobile devices, specifically mobile phones. This book
                 focuses on Android OS, as well as operating systems
                 from Microsoft and Apple. As businesses rush their
                 mobile products to market and conduct business
                 transactions via mobile devices, vast new security
                 risks, vulnerabilities, and exploits are of great
                 concern. This book addresses all of these issues and
                 provides proven solutions for securing mobile
                 applications. No other book on hacking rivals the
                 original, bulletproof pedagogy of this book's clear-cut
                 Hack/Countermeasure approach. Proven strategies for
                 preventing, detecting, and remediating common
                 technology and architecture weaknesses and maintaining
                 tight security controls permanently. Accessible style
                 and format: attacks/countermeasures; risk ratings; case
                 studies; self-assessment tips; check lists; and
                 organizational strategies.\par

                 Identify and evade key threats across the expanding
                 mobile risk landscape. Hacking Exposed Mobile :
                 Security Secrets and Solutions covers the wide range of
                 attacks to your mobile deployment alongside
                 ready-to-use countermeasures. Find out how attackers
                 compromise networks and devices, attack mobile
                 services, and subvert mobile apps. Learn how to encrypt
                 mobile data, fortify mobile platforms, and eradicate
                 malware. This cutting-edge guide reveals secure mobile
                 development guidelines, how to leverage mobile OS
                 features and MDM to isolate apps and data, and the
                 techniques the pros use to secure mobile payment
                 systems.",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures; Mobile
                 computing; Mobile communication systems; Computer
                 hackers; Computer crimes; Prevention; COMPUTERS /
                 Networking / Security.",
  tableofcontents = "The Mobile Risk Ecosystem \\
                 Hacking the Cellular Network \\
                 iOS \\
                 Android \\
                 Mobile Malware \\
                 Mobile Services and Mobile Web \\
                 Mobile Device Management \\
                 Mobile Development Security \\
                 Mobile Payments \\
                 Consumer Security Checklist \\
                 Security Checklist \\
                 Mobile Application Penetration Testing Toolkit \\
                 iOS Pen Test Toolkit \\
                 Android Pen Test Toolkit",
}

@Book{Engebretson:2013:BHP,
  editor =       "Pat (Patrick Henry) Engebretson",
  title =        "The basics of hacking and penetration testing: ethical
                 hacking and penetration testing made easy",
  publisher =    "Syngress, an imprint of Elsevier",
  address =      "Amsterdam, The Netherlands",
  edition =      "Second",
  pages =        "xviii + 204",
  year =         "2013",
  ISBN =         "0-12-411644-2 (paperback)",
  ISBN-13 =      "978-0-12-411644-3 (paperback)",
  LCCN =         "QA76.9.A25 E5443 2013",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  author-dates = "1974--",
  subject =      "Penetration testing (Computer security); Computer
                 hackers; Computer software; Testing; Computer crimes;
                 Prevention",
  tableofcontents = "What is Penetration Testing? \\
                 Reconnaissance \\
                 Scanning \\
                 Exploitation \\
                 Web Based Exploitation \\
                 Maintaining Access with Backdoors and Rootkits
                 \\
                 Wrapping Up the Penetration Test",
}

@Book{Neely:2013:WRP,
  author =       "Matthew Neely and Alex Hamerstone and Chris Sanyk",
  title =        "Wireless reconnaissance in penetration testing",
  publisher =    "Elsevier/Syngress",
  address =      "Amsterdam, The Netherlands",
  pages =        "xvi + 166",
  year =         "2013",
  ISBN =         "1-59749-731-2",
  ISBN-13 =      "978-1-59749-731-2",
  LCCN =         "TK7882.E2 N44 2013",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Electronic surveillance; Penetration testing (Computer
                 security); Wireless communication systems; Security
                 measures",
  tableofcontents = "Why radio profiling? \\
                 Basic radio theory and introduction to radio systems
                 \\
                 Targets (wireless headsets, guard radios, wireless
                 cameras, etc.) \\
                 Offsite profiling \\
                 Offsite profiling case study \\
                 Onsite profiling \\
                 Onsite profiling case study \\
                 How to use the information you gather \\
                 Basic overview of equipment and how it works \\
                 Case study to pull it all together \\
                 New technology and the future of radios in penetration
                 testing",
}

@Book{Wilhelm:2013:PPT,
  editor =       "Thomas Wilhelm",
  title =        "Professional penetration testing",
  publisher =    pub-SYNGRESS,
  address =      pub-SYNGRESS:adr,
  edition =      "Second",
  pages =        "????",
  year =         "2013",
  ISBN =         "1-59749-993-5",
  ISBN-13 =      "978-1-59749-993-4",
  LCCN =         "TK5105.59 .W544 2013",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures; Penetration
                 testing (Computer security); Testing; Computer
                 hackers",
  tableofcontents = "Volume 1. Creating and Learning in a Hacking Lab",
}

@Book{Baloch:2014:EHP,
  author =       "Rafay Baloch",
  title =        "Ethical hacking and penetration testing guide",
  publisher =    pub-CRC,
  address =      pub-CRC:adr,
  pages =        "????",
  year =         "2014",
  ISBN =         "1-4822-3161-1 (paperback)",
  ISBN-13 =      "978-1-4822-3161-8 (paperback)",
  LCCN =         "QA76.9.A25 B356 2014",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  abstract =     "This book introduces the steps required to complete
                 a penetration test, or ethical hack. Requiring no prior
                 hacking experience, the book explains how to utilize
                 and interpret the results of modern day hacking tools,
                 which are required to complete a penetration test.
                 Coverage includes Backtrack Linux, Google
                 reconnaissance, MetaGooFil, dig, Nmap, Nessus,
                 Metasploit, Fast Track Autopwn, Netcat, and Hacker
                 Defender rootkit. Simple explanations of how to use
                 these tools and a four-step methodology for conducting
                 a penetration test provide readers with a better
                 understanding of offensive security.",
  acknowledgement = ack-nhfb,
  subject =      "Penetration testing (Computer security); COMPUTERS /
                 Security / General.; COMPUTERS / Networking / General.;
                 LAW / Forensic Science.",
}

@Book{Broad:2014:HKP,
  author =       "James Broad and Andrew Bindner",
  title =        "Hacking with {Kali}: practical penetration testing
                 techniques",
  publisher =    "Syngress, an imprint of Elsevier",
  address =      "Amsterdam, The Netherlands",
  edition =      "First",
  pages =        "ix + 227",
  year =         "2014",
  ISBN =         "0-12-407749-8 (alkaline paper)",
  ISBN-13 =      "978-0-12-407749-2 (alkaline paper)",
  LCCN =         "QA76.9.A25 B772 2014",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Penetration testing (Computer security); Kali Linux;
                 Computer hackers",
  tableofcontents = "Introduction \\
                 Download and install Kali Linux \\
                 Software, patches, and upgrades \\
                 Configuring Kali Linux \\
                 Building a penetration testing lab \\
                 Introduction to the penetration test lifecycle
                 \\
                 Reconnaissance \\
                 Scanning \\
                 Exploitation \\
                 Maintaining access \\
                 Reports and templates \\
                 Appendix A: Tribal Chicken \\
                 Appendix B: Kali penetration testing tools",
}

@Book{Krebs:2014:SNI,
  author =       "Brian Krebs",
  title =        "Spam nation: the inside story of organized cybercrime
                 --- from global epidemic to your front door",
  publisher =    "Sourcebooks, Inc.",
  address =      "Naperville, IL, USA",
  pages =        "????",
  year =         "2014",
  ISBN =         "1-4022-9561-8 (hardcover)",
  ISBN-13 =      "978-1-4022-9561-4 (hardcover)",
  LCCN =         "HV6773.2 .K74 2014",
  bibdate =      "Mon Nov 24 12:24:28 MST 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  abstract =     "Explores ``the criminal masterminds driving some of
                 the biggest spam and hacker operations targeting
                 Americans and their bank accounts. Tracing the rise,
                 fall, and alarming resurrection of the digital mafia
                 behind the two largest spam pharmacies --- and
                 countless viruses, phishing, and spyware attacks --- he
                 delivers the first definitive narrative of the global
                 spam problem and its threat to consumers
                 everywhere''.",
  acknowledgement = ack-nhfb,
  subject =      "Computer crimes; United States; Internet fraud; Spam
                 (Electronic mail); Phishing; Organized crime",
}

@Book{Lane:2014:PBD,
  editor =       "Julia I. Lane and Victoria Stodden and Stefan Bender
                 and Helen Nissenbaum",
  booktitle =    "Privacy, big data, and the public good: frameworks for
                 engagement",
  title =        "Privacy, big data, and the public good: frameworks for
                 engagement",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "xix + 322",
  year =         "2014",
  ISBN =         "1-107-06735-9 (hardcover), 1-107-63768-6 (paperback)",
  ISBN-13 =      "978-1-107-06735-6 (hardcover), 978-1-107-63768-9
                 (paperback)",
  LCCN =         "JC596 .P747 2015",
  bibdate =      "Sat Jun 28 10:20:29 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  abstract =     "Massive amounts of data on human beings can now be
                 analyzed. Pragmatic purposes abound, including selling
                 goods and services, winning political campaigns, and
                 identifying possible terrorists. Yet 'big data' can
                 also be harnessed to serve the public good: scientists
                 can use big data to do research that improves the lives
                 of human beings, improves government services, and
                 reduces taxpayer costs. In order to achieve this goal,
                 researchers must have access to this data - raising
                 important privacy questions. What are the ethical and
                 legal requirements? What are the rules of engagement?
                 What are the best ways to provide access while also
                 protecting confidentiality? Are there reasonable
                 mechanisms to compensate citizens for privacy loss? The
                 goal of this book is to answer some of these questions.
                 The book's authors paint an intellectual landscape that
                 includes legal, economic, and statistical frameworks.
                 The authors also identify new practical approaches that
                 simultaneously maximize the utility of data access
                 while minimizing information risk.",
  acknowledgement = ack-nhfb,
  subject =      "privacy, right of; research; moral and ethical
                 aspects; big data; social aspects; common good",
  tableofcontents = "Part I. Conceptual Framework: Editors' introduction
                 / Julia Lane, Victoria Stodden, Stefan Bender and Helen
                 Nissenbaum \\
                 1. Monitoring, datafication, and consent: legal
                 approaches to privacy in the big data context /
                 Katherine J. Strandburg \\
                 2. Big data's end run around anonymity and consent /
                 Solon Barocas and Helen Nissenbaum \\
                 3. The economics and behavioral economics of privacy /
                 Alessandro Acquisti \\
                 4. The legal and regulatory framework: what do the
                 rules say about data analysis? / Paul Ohm \\
                 5. Enabling reproducibility in big data research:
                 balancing confidentiality and scientific transparency /
                 Victoria Stodden \\
                 Part II. Practical Framework: Editors' introduction /
                 Julia Lane, Victoria Stodden, Stefan Bender and Helen
                 Nissenbaum \\
                 6. The value of big data for urban science / Steven E.
                 Koonin and Michael J. Holland \\
                 7. The new role of cities in creating value / Robert
                 Goerge \\
                 8. A European perspective / Peter Elias \\
                 9. Institutional controls: the new deal on data /
                 Daniel Greenwood, Arkadiusz Stopczynski, Brian Sweatt,
                 Thomas Hardjono and Alex Pentland \\
                 10. The operational framework: engineered controls /
                 Carl Landwehr \\
                 11. Portable approaches to informed consent and open
                 data / John Wilbanks \\
                 Part III. Statistical Framework: Editors' introduction
                 / Julia Lane, Victoria Stodden, Stefan Bender and Helen
                 Nissenbaum \\
                 12. Extracting information from big data / Frauke
                 Kreuter and Roger Peng \\
                 13. Using statistics to protect privacy / Alan F. Karr
                 and Jerome P. Reiter \\
                 14. Differential privacy: a cryptographic approach to
                 private data analysis / Cynthia Dwork",
}

@Book{Watson:2014:SEP,
  author =       "Gavin Watson",
  title =        "Social engineering penetration testing: executing
                 social engineering pen tests, assessments and defense",
  publisher =    pub-SYNGRESS,
  address =      pub-SYNGRESS:adr,
  pages =        "????",
  year =         "2014",
  ISBN =         "0-12-420124-5",
  ISBN-13 =      "978-0-12-420124-8",
  LCCN =         "HM668 .W38 2014",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  author-dates = "1982--",
  subject =      "Social engineering",
}

@Book{Weidman:2014:PTH,
  author =       "Georgia Weidman",
  title =        "Penetration testing: a hands-on introduction to
                 hacking",
  publisher =    pub-NO-STARCH,
  address =      pub-NO-STARCH:adr,
  pages =        "????",
  year =         "2014",
  ISBN =         "1-59327-564-1 (paperback)",
  ISBN-13 =      "978-1-59327-564-8 (paperback)",
  LCCN =         "QA76.9.A25 W4258 2014",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  abstract =     "In \booktitle{Penetration Testing}, security
                 researcher and trainer Georgia Weidman provides you
                 with a survey of important skills that any aspiring
                 pentester needs. This beginner-friendly book opens with
                 some basics of programming and helps you navigate Kali
                 Linux, an operating system that comes preloaded with
                 useful computer security tools like Wireshark and
                 Metasploit. You'll learn about gathering information on
                 a target, social engineering, capturing network
                 traffic, analyzing vulnerabilities, developing
                 exploits, and more. Hands-on examples discuss even
                 advanced topics like mobile device security and
                 bypassing anti-virus software.",
  acknowledgement = ack-nhfb,
  subject =      "Penetration testing (Computer security); Kali Linux;
                 computer hackers; computers / internet / security.;
                 computers / networking / security.; computers /
                 security / general.",
  tableofcontents = "Foreward by Peter Van Eeckhoutte \\
                 \\
                 Acknowledgements \\
                 \\
                 Introduction \\
                 \\
                 Penetration Testing Primer \\
                 \\
                 Part 1: The Basics \\
                 \\
                 Chapter 1: Setting Up Your Virtual Lab \\
                 Chapter 2: Using Kali Linux \\
                 Chapter 3: Programming \\
                 Chapter 4: Using the Metasploit Framework \\
                 \\
                 Part 2: Assessments \\
                 \\
                 Chapter 5: Information Gathering \\
                 Chapter 6: Finding Vulnerabilities \\
                 Chapter 7: Capturing Traffic \\
                 \\
                 Part 3: Attacks \\
                 \\
                 Chapter 8: Exploitation \\
                 Chapter 9: Password Attacks \\
                 Chapter 10: Client-Side Exploitation \\
                 Chapter 11: Social Engineering \\
                 Chapter 12: Bypassing Antivirus Applications \\
                 Chapter 13: Post Exploitation \\
                 Chapter 14: Web Application Testing \\
                 Chapter 15: Wireless Attacks \\
                 \\
                 Part 4: Exploit Development \\
                 \\
                 Chapter 16: A Stack-Based Buffer Overflow in Linux \\
                 Chapter 17: A Stack-Based Buffer Overflow in Windows
                 \\
                 Chapter 18: Structured Exception Handler Overwrites \\
                 Chapter 19: Fuzzing, Porting Exploits, and Metasploit
                 Modules \\
                 \\
                 Part 5: Mobile Hacking \\
                 \\
                 Chapter 20: Using the Smartphone Pentest Framework \\
                 \\
                 Resources \\
                 \\
                 Index",
}

@Book{Lemstra:2015:DBM,
  editor =       "W. (Wolter) Lemstra and William H. Melody",
  title =        "The Dynamics of broadband markets in {Europe}:
                 realizing the 2020 digital agenda",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "xx + 409",
  year =         "2015",
  ISBN =         "1-107-07358-8 (hardcover)",
  ISBN-13 =      "978-1-107-07358-6 (hardcover)",
  LCCN =         "HE8084 .D96 2015",
  bibdate =      "Wed Mar 25 10:52:37 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://assets.cambridge.org/97811070/73586/cover/9781107073586.jpg",
  abstract =     "The European Commission's Digital Agenda for Europe
                 sets the targets for broadband development by 2020, yet
                 current broadband market outcomes vary widely amongst
                 the EU Member States and the objectives seem
                 challenging for many. In this book, a group of
                 in-country experts follows a framework of qualitative
                 and quantitative analysis to capture patterns,
                 commonalities and differences between 12 different
                 European countries, in terms of infrastructure
                 endowments, institutional arrangements, time of joining
                 the EU, behavior of market actors, personal
                 interventions of regulators, the role of
                 municipalities, and the role perception of governments.
                 By exploring how the past explains present broadband
                 market outcomes, these longitudinal country case
                 studies look to how improvements can be made for the
                 future. As the first in-depth study of broadband
                 developments in Europe, this book will be invaluable to
                 policy-makers, regulators, academic researchers,
                 advisors, and consultants working in the fields of
                 telecommunications, broadband development, technology
                 and innovation.",
  acknowledgement = ack-nhfb,
  subject =      "Telecommunication; Europe; Digital communications;
                 Broadband communication systems; Telecommunication
                 policy; Information technology; Government policy;
                 BUSINESS and ECONOMICS / Entrepreneurship.",
}

@Book{Polstra:2015:HPT,
  editor =       "Philip Polstra and Vivek Ramachandran",
  title =        "Hacking and penetration testing with low power
                 devices",
  publisher =    pub-ELSEVIER,
  address =      pub-ELSEVIER:adr,
  pages =        "xv + 243",
  year =         "2015",
  ISBN =         "0-12-800751-6, 0-12-800824-5 (e-book), 1-322-09763-1
                 (e-book)",
  ISBN-13 =      "978-0-12-800751-8, 978-0-12-800824-9 (e-book),
                 978-1-322-09763-3 (e-book)",
  LCCN =         "QA76.9.A25 P5965 2015",
  bibdate =      "Thu Feb 26 13:54:03 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.sciencedirect.com/science/book/9780128007518",
  acknowledgement = ack-nhfb,
  subject =      "Penetration testing (Computer security); Equipment and
                 supplies; BeagleBone (Computer)",
  tableofcontents = "Meet the deck \\
                 Meet the Beagles \\
                 Installing a base operating system \\
                 Filling the toolbox \\
                 Powering the deck \\
                 Input and output devices \\
                 Building an army of devices \\
                 Keeping your army secret \\
                 Adding air support \\
                 Future directions",
}

@Book{Schneier:2015:DGH,
  author =       "Bruce Schneier",
  title =        "Data and {Goliath}: the hidden battles to collect your
                 data and control your world",
  publisher =    pub-NORTON,
  address =      pub-NORTON:adr,
  pages =        "383",
  year =         "2015",
  ISBN =         "0-393-24481-4 (hardcover)",
  ISBN-13 =      "978-0-393-24481-6 (hardcover)",
  LCCN =         "HM846 .S362 2015",
  bibdate =      "Mon Jul 17 15:16:22 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  author-dates = "1963--",
  subject =      "Electronic surveillance; Social aspects; Information
                 technology; Computer security; Privacy, Right of;
                 Social control",
  tableofcontents = "Data as a by-product of computing \\
                 Data as surveillance \\
                 Analyzing our data \\
                 The business of surveillance \\
                 Government surveillance and control \\
                 Consolidation of institutional control \\
                 Political liberty and justice \\
                 Commercial fairness and equality \\
                 Business competitiveness \\
                 Privacy \\
                 Security \\
                 Principles \\
                 Solutions for government \\
                 Solutions for corporations \\
                 Solutions for the rest of us \\
                 Social norms and the big data trade-off",
}

@Article{Lombardi:2016:ATV,
  author =       "Michael A. Lombardi and Andrew N. Novick and George
                 Neville-Neil and Ben Cooke",
  title =        "Accurate, Traceable, and Verifiable Time
                 Synchronization for World Financial Markets",
  journal =      j-J-RES-NATL-INST-STAND-TECHNOL,
  volume =       "121",
  number =       "??",
  pages =        "436--463",
  day =          "7",
  month =        oct,
  year =         "2016",
  CODEN =        "JRITEF",
  DOI =          "https://doi.org/10.6028/jres.121.023",
  ISSN =         "1044-677X (print), 2165-7254 (electronic)",
  ISSN-L =       "1044-677X",
  bibdate =      "Wed Oct 19 09:46:04 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib",
  URL =          "http://nvlpubs.nist.gov/nistpubs/jres/121/jres.121.023.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of research of the National Institute of
                 Standards and Technology",
  journal-URL =  "http://www.nist.gov/nvl/jres.cfm",
  remark =       "This paper provides an excellent survey of the current
                 status of accurate time keeping, showing that
                 geographically-separated NIST clocks can often be
                 synchronized to within less than one nanosecond, and
                 that commercial clocks that supply computer time via
                 NTP (Network Time Protocol) and PTP (Precision Time
                 Protocol) in North America can maintain an average
                 deviation of 2.2 microseconds, although the time
                 fluctuates within a range of 114 microseconds.",
}

@Book{Tufekci:2017:TTG,
  author =       "Zeynep Tufekci",
  title =        "{Twitter} and Tear Gas: the Power and Fragility of
                 Networked Protest",
  publisher =    pub-YALE,
  address =      pub-YALE:adr,
  pages =        "xxxi + 326",
  year =         "2017",
  ISBN =         "0-300-21512-6 (hardcover)",
  ISBN-13 =      "978-0-300-21512-0 (hardcover)",
  LCCN =         "HM742 .T84 2017",
  bibdate =      "Mon Jul 17 15:10:40 MDT 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Social media; Political aspects; Online social
                 networks; Social movements; Protest movements;
                 COMPUTERS / Web / Social Media; POLITICAL SCIENCE /
                 Political Freedom; SOCIAL SCIENCE / Media Studies;
                 Protestbewegung; Social Media; Governance; Soziale
                 Bewegung; Internet; Tr{\"a}nenreizstoff",
  tableofcontents = "Part one: Making a movement \\
                 A networked public \\
                 Censorship and attention \\
                 Leading the leaderless \\
                 Movement cultures \\
                 Part two: A protester's tools \\
                 Technology and people \\
                 Platforms and algorithms \\
                 Names and connections \\
                 Part three: After the protests \\
                 Signaling power and signaling to power \\
                 Governments strike back \\
                 Epilogue: The uncertain climb",
}

@Book{Evans:2018:BBU,
  author =       "Claire Lisa Evans",
  title =        "Broad band: the untold story of the women who made the
                 {Internet}",
  publisher =    "Portfolio",
  address =      "New York, NY, USA",
  pages =        "278",
  year =         "2018",
  ISBN =         "0-7352-1175-2 (hardcover), 0-7352-1176-0 (e-pub)",
  ISBN-13 =      "978-0-7352-1175-9 (hardcover), 978-0-7352-1176-6
                 (e-pub)",
  LCCN =         "QA76.2.A2 E93 2018",
  bibdate =      "Sun Mar 18 09:07:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/adabooks.bib;
                 http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  abstract =     "The history of technology you probably know is one of
                 men and machines, garages and riches, alpha nerds and
                 programmers. But the little-known fact is that female
                 visionaries have always been at the vanguard of
                 technology and innovation --- they've just been erased
                 from the story. Until now. Women are not ancillary to
                 the history of technology; they turn up at the very
                 beginning of every important wave. But they've often
                 been hidden in plain sight, their inventions and
                 contributions touching our lives in ways we don't even
                 realize. VICE reporter and YACHT lead singer Claire L.
                 Evans finally gives these unsung female heroes their
                 due with her insightful social history of the Broad
                 Band, the women who made the internet what it is today.
                 Learn from Ada Lovelace, the tortured, imaginative
                 daughter of Lord Byron, who wove numbers into the first
                 program for a mechanical computer in 1842. Seek
                 inspiration from Grace Hopper, the tenacious
                 mathematician who democratized computing by leading the
                 charge for machine-independent programming languages
                 after World War II. Meet Elizabeth ``Jake'' Feinler,
                 the one-woman Google who kept the earliest version of
                 the Internet online, and Stacy Horn, who ran one of the
                 first-ever social networks on a shoestring out of her
                 New York City apartment in the 1980s. Evans shows us
                 how these women built and colored the technologies we
                 can't imagine life without. Join the ranks of the
                 pioneers who defied social convention and the longest
                 odds to become database poets, information-wranglers,
                 hypertext dreamers, and glass ceiling-shattering dot
                 com-era entrepreneurs. This inspiring call to action is
                 a revelation: women have embraced technology from the
                 start. It shines a light on the bright minds whom
                 history forgot, and shows us how they will continue to
                 shape our world in ways we can no longer ignore.
                 Welcome to the Broad Band. You're next.",
  acknowledgement = ack-nhfb,
  subject =      "women computer scientists; biography; Internet;
                 history; biography and autobiography / women; biography
                 and autobiography / science and technology",
  tableofcontents = "The Dell / 1 \\
                 A Computer Wanted / 9 \\
                 Amazing Grace / 27 \\
                 The Salad Days / 53 \\
                 Tower of Babel / 64 \\
                 The Computer Girls / 75 \\
                 The Longest Cave / 83 \\
                 Resource on E95 / 109 \\
                 Communities / 129 \\
                 Miss Outer Boro / 177 \\
                 Women Com 204 / 222 \\
                 The Cyber Feminists / 237 \\
                 Acknowledgments / 243 \\
                 Index / 269",
}

@Book{Gregory:2018:TBUb,
  author =       "Nathan Gregory",
  title =        "The {Tym} before: the untold origins of cloud
                 computing",
  publisher =    "lulu.com",
  address =      "Lexington, KY, USA",
  pages =        "476",
  year =         "2018",
  ISBN =         "1-973430-18-5",
  ISBN-13 =      "978-1-973430-18-6",
  LCCN =         "QA76.585 .G74 2018",
  bibdate =      "Tue Mar 2 14:22:46 MST 2021",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 http://www.math.utah.edu/pub/tex/bib/internet2010.bib",
  abstract =     "The Cloud! It sounds so fluffy and soft. Amorphous,
                 remote, floating above the world. Run it in the Cloud,
                 we cay. A modern metaphor, but once we had another
                 name, a more descriptive name for using someone else's
                 computer. We called it time-sharing. Today we mix the
                 idea of using distant computers and the idea of
                 communicating via a network and call the combination
                 The Cloud, imagining we have invented something new.
                 But it isn't so new after all. Beginning in the 1960s,
                 a company created a successful business making remote
                 computer services available inexpensively to anyone via
                 a network built for that purpose. Companies offered
                 online resources from banking to research, email to
                 instant messaging, and the ability to run applications
                 on powerful, remote computers and access them from
                 anywhere. In doing so, they created the first cloud.
                 They called it Tymnet, and the company was Tymshare. I
                 worked for Tymnet for more that 12 years, from the
                 beginning of 1980 until 1992. The people I worked with
                 were some of the finest anywhere, and the memories of
                 my years with Tymnet are among my fondest. It gives me
                 great pleasure to present the story of the first cloud,
                 as told by those who created it.",
  acknowledgement = ack-nhfb,
  subject =      "Cloud computing; History",
}

@Book{Marshall:2018:HBH,
  author =       "Joseph Marshall",
  title =        "Hands-on bug hunting for penetration testers: a
                 practical guide to help ethical hackers discover web
                 application security flaws",
  publisher =    pub-PACKT,
  address =      pub-PACKT:adr,
  pages =        "viii + 234",
  year =         "2018",
  ISBN =         "1-78934-420-4 (paperback), 1-78934-989-3 (e-book)",
  ISBN-13 =      "978-1-78934-420-2 (paperback), 978-1-78934-989-4
                 (e-book)",
  LCCN =         "TK5105.5485",
  bibdate =      "Mon May 27 11:34:39 MDT 2019",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 http://www.math.utah.edu/pub/tex/bib/internet2010.bib",
  URL =          "https://international.scholarvox.com/book/88863226",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Monitoring; Security measures;
                 Penetration testing (Computer security); Web
                 applications; Monitoring.; Security measures.;
                 Penetration testing (Computer security); Web
                 applications.",
}

@Book{Greenberg:2019:SNE,
  author =       "Andy Greenberg",
  title =        "{Sandworm}: a New Era of Cyberwar and the Hunt for the
                 {Kremlin}'s Most Dangerous Hackers",
  publisher =    "Doubleday",
  address =      "New York, NY, USA",
  pages =        "xiii + 348",
  year =         "2019",
  ISBN =         "0-385-54440-5 (hardcover), 0-525-56463-2 (paperback),
                 0-385-54441-3 (e-book)",
  ISBN-13 =      "978-0-385-54440-5 (hardcover), 978-0-525-56463-8
                 (paperback), 978-0-385-54441-2 (e-book)",
  LCCN =         "HV6773.R8 G74 2019",
  bibdate =      "Fri Nov 22 16:30:44 MST 2019",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 http://www.math.utah.edu/pub/tex/bib/internet2010.bib",
  abstract =     "In 2014, the world witnessed the start of a mysterious
                 series of cyberattacks. Targeting American utility
                 companies, NATO, and electric grids in Eastern Europe,
                 the strikes grew ever more brazen, including the
                 first-ever blackouts triggered by hackers. They
                 culminated in the summer of 2017, when the malware
                 known as NotPetya was unleashed, penetrating,
                 disrupting, and paralyzing some of the world's largest
                 companies --- from drug manufacturing to software to
                 shipping. At the attack's epicenter in Ukraine, ATMs
                 froze. The railway and postal systems shut down.
                 Hospitals went dark. NotPetya spread around the world,
                 inflicting an unprecedented ten billion dollars in
                 damage --- the largest, most devastating cyberattack
                 the world had ever seen. The hackers behind these
                 attacks are quickly gaining a reputation as the most
                 dangerous team of cyberwarriors in history: Sandworm.
                 Working in the service of Russia's military
                 intelligence agency, they represent a persistent,
                 highly skilled, state-sponsored force, one whose
                 talents are matched by their willingness to launch
                 broad, unrestrained attacks on the most critical
                 infrastructure of their adversaries. They target
                 government and private sector, military and civilians
                 alike. A chilling, globe-spanning detective story,
                 Sandworm considers the danger this force poses to our
                 national stability and security. As the Kremlin's role
                 in meddling in the 2016 election, manipulating foreign
                 governments, and sparking chaos comes into greater
                 focus, Sandworm exposes the realities not just of
                 Russia's global digital offensive, but of an era where
                 warfare ceases to be waged on the battlefield. It
                 reveals how the line between digital and physical
                 conflict, between wartime and peacetime, have begun to
                 blur --- with world-shaking implications.",
  acknowledgement = ack-nhfb,
  subject =      "Computer crimes; Russia (Federation); Hackers;
                 Computers / Security / Viruses and Malware",
}

@Book{Ilyas:2019:DCf,
  author =       "Ihab F. Ilyas and Xu Chu",
  title =        "Data Cleaning",
  volume =       "28",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "xix + 260",
  year =         "2019",
  DOI =          "https://doi.org/10.1145/3310205",
  ISBN =         "1-4503-7152-3 (hardcover), 1-4503-7153-1 (paperback),
                 1-4503-7154-X (e-pub), 1-4503-7155-8 (e-book)",
  ISBN-13 =      "978-1-4503-7152-0 (hardcover), 978-1-4503-7153-7
                 (paperback), 978-1-4503-7154-4 (e-pub),
                 978-1-4503-7155-1 (e-book)",
  LCCN =         "QA76.9.D3 I483 2019",
  bibdate =      "Wed Apr 28 15:35:33 MDT 2021",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 http://www.math.utah.edu/pub/tex/bib/internet2010.bib",
  series =       "ACM Books",
  abstract =     "Data quality is one of the most important problems in
                 data management, since dirty data often leads to
                 inaccurate data analytics results and incorrect
                 business decisions. Poor data across businesses and the
                 U.S. government are reported to cost trillions of
                 dollars a year. Multiple surveys show that dirty data
                 is the most common barrier faced by data scientists.
                 Not surprisingly, developing effective and efficient
                 data cleaning solutions is challenging and is rife with
                 deep theoretical and engineering problems. This book is
                 about data cleaning, which is used to refer to all
                 kinds of tasks and activities to detect and repair
                 errors in the data. Rather than focus on a particular
                 data cleaning task, we give an overview of the
                 end=to-end data cleaning process, describing various
                 error detection and repair methods, and attempt to
                 anchor these proposals with multiple taxonomies and
                 views. Specifically, we cover four of the most common
                 and important data cleaning tasks, namely, outlier
                 detection, data transformation, error repair (including
                 imputing missing values), and data deduplication.
                 Furthermore, due to the increasing popularity and
                 applicability of machine learning techniques, we
                 include a chapter that specifically explores how
                 machine learning techniques are used for data cleaning,
                 and how data cleaning is used to improve machine
                 learning models. This book is intended to serve as a
                 useful reference for researchers and practitioners who
                 are interested in the area of data quality and data
                 cleaning. It can also be used as a textbook for a
                 graduate course. Although we aim at covering
                 state-of-the-art algorithms and techniques, we
                 recognize that data cleaning is still an active field
                 of research and therefore provide future directions of
                 research whenever appropriate.",
  acknowledgement = ack-nhfb,
  subject =      "Data editing; Database management; Electronic data
                 processing",
  tableofcontents = "Introduction: Data Cleaning Workflow \\
                 Book Scope \\
                 Outlier Detection: A Taxonomy of Outlier Detection
                 Methods \\
                 Statistics-Based Outlier Detection \\
                 Distance-Based Outlier Detection --- Model-Based
                 Outlier Detection \\
                 Outlier Detection in High-Dimensional Data \\
                 Conclusion \\
                 Data Deduplication: Similarity Metrics \\
                 Predicting Duplicate Pairs \\
                 Clustering \\
                 Blocking for Deduplication \\
                 Distributed Data Deduplication \\
                 Record Fusion and Entity Consolidation \\
                 Human-Involved Data Deduplication \\
                 Data Deduplication Tools \\
                 Conclusion \\
                 Data Transformation: Syntactic Data Transformations \\
                 Semantic Data Transformations \\
                 ETL Tools \\
                 Conclusion \\
                 Data Quality Rule Definition and Discovery: Functional
                 Dependencies \\
                 Conditional Functional Dependencies \\
                 Denial Constraints \\
                 Other Types of Constraints \\
                 Conclusion --- Rule-Based Data Cleaning: Violation
                 Detection \\
                 Error Repair \\
                 Conclusion --- Machine Learning and Probabilistic Data
                 Cleaning: Machine Learning for Data Deduplication \\
                 Machine Learning for Data Repair \\
                 Data Cleaning for Analytics and Machine Learning
                 --Conclusion and Future Thoughts",
}

@Article{Mcilroy:2019:SHS,
  author =       "Ross Mcilroy and Jaroslav Sevcik and Tobias Tebbi and
                 Ben L. Titzer and Toon Verwaest",
  title =        "{Spectre} is here to stay: An analysis of
                 side-channels and speculative execution",
  journal =      "arxiv.org",
  volume =       "??",
  number =       "??",
  pages =        "1--26",
  day =          "14",
  month =        feb,
  year =         "2019",
  bibdate =      "Thu Aug 22 09:08:00 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib",
  URL =          "https://arxiv.org/abs/1902.05178",
  abstract =     "The recent discovery of the Spectre and Meltdown
                 attacks represents a watershed moment not just for the
                 field of Computer Security, but also of Programming
                 Languages. This paper explores speculative side-channel
                 attacks and their implications for programming
                 languages. These attacks leak information through
                 micro-architectural side-channels which we show are not
                 mere bugs, but in fact lie at the foundation of
                 optimization. We identify three open problems, (1)
                 finding side-channels, (2) understanding speculative
                 vulnerabilities, and (3) mitigating them. For (1) we
                 introduce a mathematical meta-model that clarifies the
                 source of side-channels in simulations and CPUs. For
                 (2) we introduce an architectural model with
                 speculative semantics to study recently-discovered
                 vulnerabilities. For (3) we explore and evaluate
                 software mitigations and prove one correct for this
                 model. Our analysis is informed by extensive offensive
                 research and defensive implementation work for V8, the
                 production JavaScript virtual machine in Chrome.
                 Straightforward extensions to model real hardware
                 suggest these vulnerabilities present formidable
                 challenges for effective, efficient mitigation. As a
                 result of our work, we now believe that speculative
                 vulnerabilities on today's hardware defeat all
                 language-enforced confidentiality with no known
                 comprehensive software mitigations, as we have
                 discovered that untrusted code can construct a
                 universal read gadget to read all memory in the same
                 address space through side-channels. In the face of
                 this reality, we have shifted the security model of the
                 Chrome web browser and V8 to process isolation.",
  acknowledgement = ack-nhfb,
}

%%% ====================================================================
%%% Cross-referenced entries must come last:
@Book{Vacca:2010:MIS,
  editor =       "John R. Vacca",
  booktitle =    "Managing information security",
  title =        "Managing information security",
  publisher =    pub-ELSEVIER,
  address =      pub-ELSEVIER:adr,
  pages =        "xxiv + 296",
  year =         "2010",
  ISBN =         "1-59749-533-6 (papercover)",
  ISBN-13 =      "978-1-59749-533-2 (papercover)",
  LCCN =         "QA76.9.A25 M31845 2010",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Management; Computer networks;
                 Security measures; Penetration testing (Computer
                 security)",
  tableofcontents = "Information security essentials for IT managers:
                 protecting mission-critical systems / Albert Caballero
                 \\
                 Security management systems / Joe Wright and James
                 Harmening \\
                 Information technology security management / Rahul
                 Bhasker, Bhushan Kapoor \\
                 Identity management / Jean-Marc Seigneur, Tewfiq El
                 Maliki \\
                 Intrusion prevention and detection systems /
                 Christopher Day \\
                 Computer forensics / Scott R. Ellis \\
                 Network forensics / Yong Guan, Linfeng Zhang
                 \\
                 Firewalls / Errin W. Fulp \\
                 Penetration testing / Jay Bavisi \\
                 What is vulnerability assessment? / Almantas Kakareka",
}