Security: Difference between revisions

170 bytes added ,  11 years ago
no edit summary
No edit summary
No edit summary
Line 183:
 
===Select References===
 
Adams, Cecil. 2013. [http://www.straightdope.com/columns/read/3092/how-can-i-access-the-deep-dark-web How can I access the deep, dark Web?]. February 8. straightdope.com.
 
Almiraat, Hisham. 2013. [http://advocacy.globalvoicesonline.org/2013/01/10/deletecontrol-campaign-against-digital-repression/ #DELETECONTROL/: Campaign Against Digital Repression]. January 10. Cambridge, MA: Global Voices Online.
Line 202 ⟶ 204:
Felten, Ed. 2003. [https://freedom-to-tinker.com/blog/felten/drm-and-first-rule-security-analysis DRM, and the First Rule of Security Analysis]. March 19th. freedom-to-tinker.com.
 
Gjelten, Tom and Audie Cornish. 2013. [http://www.npr.org/2013/01/28/170494486/pentagon-to-dramatically-expand-cyber-warrior-force Pentagon To Dramatically Expand 'Cyber Warrior' Force]. January 28. Washington, DC: npr.org.
 
Guha, Auditi. 2011. [http://www.wickedlocal.com/cambridge/news/x1054483849/Harvard-fellow-could-face-35-years-in-prison-for-hacking-into-MIT-network Harvard fellow could face 35 years in prison for hacking into MIT network]. July 19. Boston, MA: wickedlocal.com.
Line 216 ⟶ 218:
Nachawati, Leila. 2011. [http://advocacy.globalvoicesonline.org/2011/10/10/bluecoat-us-technology-surveilling-syrian-citizens-online/ BlueCoat: US technology surveilling Syrian citizens online]. October 10. advocacy.globalvoicesonline.org.
 
Nakashima, Ellen. 2013. [http://m.washingtonpost.com/world/national-security/pentagon-to-boost-cybersecurity-force/2013/01/19/d87d9dc2-5fec-11e2-b05a-605528f6b712_story.html Pentagon to boost cybersecurity force]. Washington, DC: m.washingtonpost.com.
 
O’Brien, Danny. 2013. [http://cpj.org/internet/2013/01/yahoo-encrypted-mail-not-moment-too-soon--nor-too.php Yahoo HTTPS mail not a moment too soon, nor too late]. New York, NY: Committee to Protect Journalists.
Anonymous user