Anonymous user
Security: Difference between revisions
no edit summary
No edit summary |
No edit summary |
||
Line 218:
Cluley, Graham. 2013. [http://nakedsecurity.sophos.com/2013/01/08/yahoo-mail-https-ssl/ Using Yahoo Mail? You should turn on this privacy option as soon as possible]. January 8. Naked Security.
Defending an Unowned Internet. 2014. [http://cyber.law.harvard.edu/events/2014/02/defending_an_unowned_internet Opportunities for Technology, Policy, and Corporations]. February 3. Cambridge, MA: cyber.law.harvard.edu/events/2014/02/defending_an_unowned_internet.
Dingledine, Roger. 2012. [http://www.freehaven.net/~arma/cv.htmlRoger Dingledine's Curriculum]. (If website is blocked, view through Tor/Vidalia enabled browser). Cambridge, MA: www.freehaven.net/~arma/cv.html
Line 231 ⟶ 233:
Hill, Kashmir. 2012. [http://www.forbes.com/sites/kashmirhill/2012/12/07/dear-journalists-at-vice-and-elsewhere-here-are-some-simple-ways-not-to-get-your-source-arrested/ Dear Journalists at Vice and Elsewhere, Here Are Some Simple Ways Not To Get Your Source Arrested]. December 7. Forbes.
Intelligence Gathering and the Unowned Internet. 2014.
Jaynes, Nick. 2012. [http://www.digitaltrends.com/cars/insurance-companies-ride-shotgun-as-us-gov-green-lights-black-box-recorders-in-new-cars/ Insurance companies ride shotgun as US gov green lights black box recorders in new cars]. December 7. digitaltrends.com.
|