%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.07",
%%%     date            = "26 November 2014",
%%%     time            = "17:05:06 MDT",
%%%     filename        = "internet2010.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "12319 1042 4579 46592",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; Internet; network",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This bibliography records books and other
%%%                        publications about the Internet for the
%%%                        decade 2010--2019.  Earlier material is
%%%                        covered in the companion bibliographies,
%%%                        internet.bib and internet2000.bib.
%%%
%%%                        At version 1.07, the year coverage looked
%%%                        like this:
%%%
%%%                             2010 (   9)    2012 (   4)    2014 (   6)
%%%                             2011 (   5)    2013 (   5)
%%%
%%%                             Book:            29
%%%
%%%                             Total entries:   29
%%%
%%%                        Numerous errors in the sources noted above
%%%                        have been corrected.  Spelling has been
%%%                        verified with the UNIX spell and GNU ispell
%%%                        programs using the exception dictionary
%%%                        stored in the companion file with extension
%%%                        .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen as
%%%                        name:year:abbrev, where name is the family
%%%                        name of the first author or editor, year is a
%%%                        4-digit number, and abbrev is a 3-letter
%%%                        condensation of important title words.
%%%                        Citation tags were automatically generated by
%%%                        software developed for the BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted
%%%                        first by ascending year, and within each
%%%                        year, alphabetically by author or editor,
%%%                        and then, if necessary, by the 3-letter
%%%                        abbreviation at the end of the BibTeX
%%%                        citation tag, using the bibsort -byyear
%%%                        utility.  Year order has been chosen to
%%%                        make it easier to identify the most recent
%%%                        work.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================

@Preamble{"\input bibnames.sty " #
  "\input path.sty " #
  "\hyphenation{
   } "
}

%%% ====================================================================
%%% Acknowledgement abbreviations:

@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:

%%% ====================================================================
%%% Publishers and their addresses:

@String{pub-AW                  = "Ad{\-d}i{\-s}on-Wes{\-l}ey"}
@String{pub-AW:adr              = "Reading, MA, USA"}

@String{pub-ARTECH              = "Artech House Inc."}
@String{pub-ARTECH:adr          = "Norwood, MA, USA"}

@String{pub-CAMBRIDGE           = "Cambridge University Press"}
@String{pub-CAMBRIDGE:adr       = "Cambridge, UK"}

@String{pub-CHAPMAN-HALL-CRC    = "Chapman and Hall/CRC"}
@String{pub-CHAPMAN-HALL-CRC:adr = "Boca Raton, FL, USA"}

@String{pub-CRC                 = "CRC Press"}
@String{pub-CRC:adr             = "2000 N.W. Corporate Blvd., Boca Raton, FL
                                  33431-9868, USA"}

@String{pub-ELSEVIER            = "Elsevier"}
@String{pub-ELSEVIER:adr        = "Amsterdam, The Netherlands"}

@String{pub-MCGRAW-HILL         = "Mc{\-}Graw-Hill"}
@String{pub-MCGRAW-HILL:adr     = "New York, NY, USA"}

@String{pub-NO-STARCH           = "No Starch Press"}
@String{pub-NO-STARCH:adr       = "San Francisco, CA, USA"}

@String{pub-PH                  = "Pren{\-}tice-Hall"}
@String{pub-PH:adr              = "Upper Saddle River, NJ 07458, USA"}

@String{pub-SYNGRESS            = "Syngress Publishing, Inc."}
@String{pub-SYNGRESS:adr        = "Rockland, MA, USA"}

%%% ====================================================================
%%% Series abbreviations:

%%% ====================================================================
%%% Bibliography entries, sorted by year, and then by citation label,
%%% with `bibsort -byyear':

@Book{Boyle:2010:AIS,
  author =       "Randall Boyle",
  title =        "Applied information security: a hands-on guide to
                 information security software",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  pages =        "viii + 226",
  year =         "2010",
  ISBN =         "0-13-612203-5",
  ISBN-13 =      "978-0-13-612203-6",
  LCCN =         "QA76.9.A25",
  bibdate =      "Thu Sep 24 19:01:49 2009",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib",
  acknowledgement = ack-nhfb,
}

@Book{Clarke:2010:CWN,
  author =       "Richard A. (Richard Alan) Clarke and Robert K. Knake",
  title =        "Cyber war: the next threat to national security and
                 what to do about it",
  publisher =    "Ecco",
  address =      "New York, NY, USA",
  pages =        "xiv + 290",
  year =         "2010",
  ISBN =         "0-06-196223-6 (hardcover)",
  ISBN-13 =      "978-0-06-196223-3 (hardcover)",
  LCCN =         "HV6773.2 .C53 2010",
  bibdate =      "Wed Apr 28 13:41:23 MDT 2010",
  bibsource =    "aubrey.tamu.edu:7090/voyager;
                 http://www.math.utah.edu/pub/tex/bib/internet2010.bib",
  acknowledgement = ack-nhfb,
  subject =      "Cyberterrorism; United States; Information warfare;
                 Prevention",
}

@Book{DeFino:2010:OCE,
  author =       "Steven DeFino",
  title =        "Official certified ethical hacker review guide",
  publisher =    "Course Technology, Cengage Learning",
  address =      "Boston, MA, USA",
  pages =        "xxii + 361",
  year =         "2010",
  ISBN =         "1-4354-8853-9 (paperback)",
  ISBN-13 =      "978-1-4354-8853-3 (paperback)",
  LCCN =         "QA76.3 .D445 2010",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  remark =       "Exam 312-50.",
  subject =      "Electronic data processing personnel; Certification;
                 Computer security; Examinations; Study guides;
                 Penetration testing (Computer security); Computer
                 hackers; Computer networks",
  tableofcontents = "Ethical hacking \\
                 Hacking laws \\
                 Footprinting \\
                 Google hacking \\
                 Scanning \\
                 Enumeration \\
                 System hacking \\
                 Trojans and backdoors \\
                 Viruses and worms \\
                 Sniffers, spoofing, and session hijacking \\
                 Social engineering \\
                 Denial of service \\
                 Buffer overflows \\
                 Hacking Web servers and Web applications \\
                 Wireless networking \\
                 Cryptography \\
                 Hacking with Linux \\
                 IDSs, firewalls, and honeypots \\
                 Summary of optional modules \\
                 Penetration testing",
}

@Book{Franceschetti:2010:HSF,
  editor =       "Giorgio Franceschetti and Marina Grossi",
  title =        "Homeland Security Facets Threats: Countermeasures, and
                 the Privacy Issue",
  publisher =    pub-ARTECH,
  address =      pub-ARTECH:adr,
  pages =        "280 (est.)",
  year =         "2010",
  ISBN =         "1-60807-106-5",
  ISBN-13 =      "978-1-60807-106-7",
  LCCN =         "????",
  bibdate =      "Thu May 12 10:18:56 MDT 2011",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 http://www.math.utah.edu/pub/tex/bib/internet2010.bib",
  URL =          "http://www.artechhouse.com/Detail.aspx?strIsbn=978-1-60807-106-7",
  acknowledgement = ack-nhfb,
  tableofcontents = "General Overview Homeland Security and National
                 Defense in the 21st Century \\
                 The Appropriate Interdisciplinary Approach to Handle
                 the Asymmetric Homeland Security Challenge \\
                 Security Challenges in Information Systems \\
                 Threats and Possible Countermeasures Physical
                 Infrastructures and Wireless Sensor Networks \\
                 Analysis of the Domino Effect in Critical
                 Infrastructures \\
                 Model-Based Design of Trustworthy Health Information
                 Systems \\
                 Detection, Identification, and Tracking of Dangerous
                 Materials \\
                 Urban Defense Using Mobile Sensor Platforms:
                 Surveillance and Protection \\
                 The Privacy Issue Toward a New Legal Framework by
                 Cybersecurity \\
                 Privacy vs Security: A Fight that May Turn into an
                 Alliance \\
                 Examples of Critical Security Implementation \\
                 The Large Event Security Issue: The G8 Case \\
                 Real Experiences on Homeland Security Systems",
}

@Book{Jackson:2010:NSA,
  author =       "Chris Jackson",
  title =        "Network security auditing",
  publisher =    "Cisco Press",
  address =      "Indianapolis, IN, USA",
  pages =        "xxiv + 488",
  year =         "2010",
  ISBN =         "1-58705-352-7 (paperback)",
  ISBN-13 =      "978-1-58705-352-8 (paperback)",
  LCCN =         "TK5105.59 .J325 2010",
  bibdate =      "Mon Apr 25 18:09:49 MDT 2011",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Cisco Press networking technology series",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures; Evaluation",
}

@Book{Kurose:2010:CNT,
  author =       "James F. Kurose and Keith W. Ross",
  title =        "Computer networking: a top-down approach",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  edition =      "Fifth",
  pages =        "xxiv + 862",
  year =         "2010",
  ISBN =         "0-13-607967-9",
  ISBN-13 =      "978-0-13-607967-5",
  LCCN =         "TK5105.875.I57 K88 2010",
  bibdate =      "Wed Dec 23 12:55:06 MST 2009",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Internet; Computer networks",
}

@Book{Prowell:2010:SDN,
  author =       "Stacy J. Prowell and Rob Kraus and Mike Borkin",
  title =        "Seven deadliest network attacks",
  publisher =    pub-SYNGRESS,
  address =      pub-SYNGRESS:adr,
  pages =        "xiv + 142",
  year =         "2010",
  ISBN =         "1-59749-549-2 (paperback)",
  ISBN-13 =      "978-1-59749-549-3 (paperback)",
  LCCN =         "TK5105.59 .P76 2010",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Syngress seven deadliest attacks series",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures; Access control",
  tableofcontents = "Denial of service \\
                 War dialing \\
                 Penetration ``testing'' \\
                 Protocol tunneling \\
                 Spanning tree attacks \\
                 Man-in-the-middle \\
                 Password replay",
}

@Book{Wilhelm:2010:PPT,
  editor =       "Thomas Wilhelm",
  title =        "Professional penetration testing: creating and
                 operating a formal hacking lab",
  publisher =    pub-SYNGRESS,
  address =      pub-SYNGRESS:adr,
  pages =        "xix + 504",
  year =         "2010",
  ISBN =         "1-59749-425-9 (paperback), 1-59749-466-6 (DVD)",
  ISBN-13 =      "978-1-59749-425-0 (paperback), 978-1-59749-466-3
                 (DVD)",
  LCCN =         "TK5105.59 .W544 2010",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures; Penetration
                 testing (Computer security); Testing; Computer
                 hackers",
}

@Book{Anonymous:2011:PT,
  author =       "Anonymous",
  title =        "Penetration testing",
  publisher =    "Course Technology, Cengage Learning",
  address =      "Clifton Park, NY, USA",
  pages =        "????",
  year =         "2011",
  ISBN =         "1-4354-8366-9 (vol. 1 : paperback), 1-4354-8367-7
                 (vol. 2 : paperback), 1-4354-8368-5 (vol. 3 :
                 paperback), 1-4354-8369-3 (vol. 4 : paperback),
                 1-4354-8370-7 (vol. 5 : paperback)",
  ISBN-13 =      "978-1-4354-8366-8 (vol. 1 : paperback),
                 978-1-4354-8367-5 (vol. 2 : paperback),
                 978-1-4354-8368-2 (vol. 3 : paperback),
                 978-1-4354-8369-9 (vol. 4 : paperback),
                 978-1-4354-8370-5 (vol. 5 : paperback)",
  LCCN =         "QA76.9.A25 P4355 2011",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  remark =       "Volume \ldots{} of 5 mapping to EC-Council Certified
                 Security Analyst certification.",
  subject =      "Penetration testing (Computer security); Examinations;
                 Study guides; Computers; Access control; Computer
                 networks; Security measures; Electronic data processing
                 personnel; Certification; Telecommunications
                 engineers",
  tableofcontents = "v. 1. Security analysis \\
                 v. 2. Procedures and methodologies \\
                 v. 3. Network and perimeter testing \\
                 v. 4. Communication media testing \\
                 v. 5. Network threat testing",
}

@Book{Engebretson:2011:BHP,
  editor =       "Pat (Patrick Henry) Engebretson and James {Broad,
                 CISSP.}",
  title =        "The basics of hacking and penetration testing: ethical
                 hacking and penetration testing made easy",
  publisher =    pub-SYNGRESS,
  address =      pub-SYNGRESS:adr,
  pages =        "xvii + 159",
  year =         "2011",
  ISBN =         "1-59749-655-3",
  ISBN-13 =      "978-1-59749-655-1",
  LCCN =         "QA76.9.A25 E5443 2011",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Syngress the basics",
  acknowledgement = ack-nhfb,
  author-dates = "1974--",
  subject =      "Penetration testing (Computer security); Computer
                 security; Computer hackers; Computer software; Testing;
                 Computer crimes; Prevention",
  tableofcontents = "What is penetration testing? \\
                 Reconnaissance \\
                 Scanning \\
                 Exploitation \\
                 Web based exploitation \\
                 Maintaining access with backdoors and rootkits",
}

@Book{Luccio:2011:MAF,
  author =       "Fabrizio Luccio and Linda Pagli and Graham Steel",
  title =        "Mathematical and algorithmic foundations of the
                 {Internet}",
  publisher =    pub-CHAPMAN-HALL-CRC,
  address =      pub-CHAPMAN-HALL-CRC:adr,
  pages =        "xv + 205",
  year =         "2011",
  ISBN =         "1-4398-3138-6 (hardback)",
  ISBN-13 =      "978-1-4398-3138-0 (hardback)",
  LCCN =         "TK5105.875.I57 L835 2011",
  bibdate =      "Fri Nov 16 06:30:56 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Chapman and Hall/CRC Press applied algorithms and data
                 structures series",
  acknowledgement = ack-nhfb,
  subject =      "Internet; Mathematical models; World Wide Web;
                 COMPUTERS / Programming / Algorithms; MATHEMATICS /
                 General; MATHEMATICS / Combinatorics",
}

@Book{Mills:2011:CNT,
  author =       "David L. Mills",
  title =        "Computer network time synchronization: the {Network
                 Time Protocol}",
  publisher =    "Taylor and Francis",
  address =      "Boca Raton, FL, USA",
  edition =      "Second",
  pages =        "????",
  year =         "2011",
  ISBN =         "1-4398-1463-5",
  ISBN-13 =      "978-1-4398-1463-5",
  LCCN =         "TK5105.575 .M55 2011",
  bibdate =      "Sat May 8 14:45:59 MDT 2010",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Network Time Protocol (computer network protocol);
                 synchronous data transmission systems; computer
                 networks; management; synchronization",
}

@Book{Wilhelm:2011:NHU,
  author =       "Thomas Wilhelm and Jason Andress",
  title =        "Ninja hacking: unconventional penetration testing
                 tactics and techniques",
  publisher =    pub-SYNGRESS,
  address =      pub-SYNGRESS:adr,
  pages =        "xii + 310",
  year =         "2011",
  ISBN =         "1-59749-588-3",
  ISBN-13 =      "978-1-59749-588-2",
  LCCN =         "QA76.9.A25 W548 2011",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Penetration testing (Computer security); Computer
                 security; Computer crimes; Prevention; Computer
                 hackers",
}

@Book{Blum:2012:TJC,
  author =       "Andrew Blum",
  title =        "Tubes: a journey to the center of the {Internet}",
  publisher =    "Ecco",
  address =      "New York, NY, USA",
  pages =        "294",
  year =         "2012",
  ISBN =         "0-06-199493-6",
  ISBN-13 =      "978-0-06-199493-7",
  LCCN =         "TK5105.875.I57 B58 2012",
  bibdate =      "Wed Jun 6 05:51:36 MDT 2012",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 http://www.math.utah.edu/pub/tex/bib/internet2010.bib",
  acknowledgement = ack-nhfb,
  subject =      "Internet; History; Social aspects; Telecommunication
                 systems; Information technology; Information
                 superhighway",
  tableofcontents = "The map \\
                 A network of networks \\
                 Only connect \\
                 The whole Internet \\
                 Cities of light \\
                 The longest tubes \\
                 Where data sleeps \\
                 Home",
}

@Book{Jacobson:2012:CSL,
  author =       "Douglas Jacobson and Joseph Idziorek",
  title =        "Computer security literacy: staying safe in a digital
                 world",
  publisher =    pub-CRC,
  address =      pub-CRC:adr,
  pages =        "????",
  year =         "2012",
  ISBN =         "1-4398-5618-4 (paperback)",
  ISBN-13 =      "978-1-4398-5618-5 (paperback)",
  LCCN =         "QA76.9.A25 J224 2013",
  bibdate =      "Fri Nov 16 06:28:42 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; COMPUTERS / Security / General.;
                 COMPUTERS / Security / Cryptography.",
}

@Book{Mjolsnes:2012:MII,
  editor =       "Stig F. Mj{\"o}lsnes",
  title =        "A multidisciplinary introduction to information
                 security",
  publisher =    pub-CRC,
  address =      pub-CRC:adr,
  pages =        "xxv + 322",
  year =         "2012",
  ISBN =         "1-4200-8590-5 (hardback)",
  ISBN-13 =      "978-1-4200-8590-7 (hardback)",
  LCCN =         "QA76.9.A25 M845 2012",
  bibdate =      "Fri Nov 16 06:32:35 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Discrete mathematics and its applications",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Computer networks; Security
                 measures; Computers; Access control; Multidisciplinary
                 design optimization; COMPUTERS / Computer Engineering.
                 ; COMPUTERS / Networking / General.; TECHNOLOGY and
                 ENGINEERING / Electrical.",
}

@Book{Tiller:2012:CGP,
  author =       "James S. Tiller",
  title =        "{CISO}'s guide to penetration testing: a framework to
                 plan, manage, and maximize benefits",
  publisher =    pub-CRC,
  address =      pub-CRC:adr,
  pages =        "xiv + 374",
  year =         "2012",
  ISBN =         "1-4398-8027-1 (hardcover)",
  ISBN-13 =      "978-1-4398-8027-2 (hardcover)",
  LCCN =         "QA76.9.A25 T56 2012",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Penetration testing (Computer security); Computer
                 networks; Security measures; Testing; Business
                 enterprises; Data processing",
}

@Book{Basta:2013:CSP,
  author =       "Alfred Basta",
  title =        "Computer security and penetration testing",
  publisher =    "Course Technology, Cengage Learning",
  address =      "Boston, MA",
  edition =      "Second",
  pages =        "????",
  year =         "2013",
  ISBN =         "0-8400-2093-7",
  ISBN-13 =      "978-0-8400-2093-2",
  LCCN =         "????",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
}

@Book{Bergman:2013:HEM,
  author =       "Neil Bergman and Mike Stanfield and Jason Rouse and
                 Joel Scambray",
  title =        "Hacking exposed: mobile security secrets and
                 solutions",
  publisher =    pub-MCGRAW-HILL,
  address =      pub-MCGRAW-HILL:adr,
  pages =        "xxvii + 289",
  year =         "2013",
  ISBN =         "0-07-181701-8 (paperback)",
  ISBN-13 =      "978-0-07-181701-1 (paperback)",
  LCCN =         "TK5105.59 .B464 2013",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  abstract =     "Proven methodologies, technical rigor, and
                 from-the-trenches experience to countering mobile
                 security exploits--from the bestselling coauthor of the
                 original Hacking Exposed. Hacking Exposed Mobile
                 focuses on the security of applications running on
                 mobile devices, specifically mobile phones. This book
                 focuses on Android OS, as well as operating systems
                 from Microsoft and Apple. As businesses rush their
                 mobile products to market and conduct business
                 transactions via mobile devices, vast new security
                 risks, vulnerabilities, and exploits are of great
                 concern. This book addresses all of these issues and
                 provides proven solutions for securing mobile
                 applications. No other book on hacking rivals the
                 original, bulletproof pedagogy of this book's clear-cut
                 Hack/Countermeasure approach. Proven strategies for
                 preventing, detecting, and remediating common
                 technology and architecture weaknesses and maintaining
                 tight security controls permanently. Accessible style
                 and format: attacks/countermeasures; risk ratings; case
                 studies; self-assessment tips; check lists; and
                 organizational strategies.\par

                 Identify and evade key
                 threats across the expanding mobile risk landscape.
                 Hacking Exposed Mobile : Security Secrets and Solutions
                 covers the wide range of attacks to your mobile
                 deployment alongside ready-to-use countermeasures. Find
                 out how attackers compromise networks and devices,
                 attack mobile services, and subvert mobile apps. Learn
                 how to encrypt mobile data, fortify mobile platforms,
                 and eradicate malware. This cutting-edge guide reveals
                 secure mobile development guidelines, how to leverage
                 mobile OS features and MDM to isolate apps and data,
                 and the techniques the pros use to secure mobile
                 payment systems.",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures; Mobile
                 computing; Mobile communication systems; Computer
                 hackers; Computer crimes; Prevention; COMPUTERS /
                 Networking / Security.",
  tableofcontents = "The Mobile Risk Ecosystem \\
                 Hacking the Cellular Network \\
                 iOS \\
                 Android \\
                 Mobile Malware \\
                 Mobile Services and Mobile Web \\
                 Mobile Device Management \\
                 Mobile Development Security \\
                 Mobile Payments \\
                 Consumer Security Checklist \\
                 Security Checklist \\
                 Mobile Application Penetration Testing Toolkit \\
                 iOS Pen Test Toolkit \\
                 Android Pen Test Toolkit",
}

@Book{Engebretson:2013:BHP,
  editor =       "Pat (Patrick Henry) Engebretson",
  title =        "The basics of hacking and penetration testing: ethical
                 hacking and penetration testing made easy",
  publisher =    "Syngress, an imprint of Elsevier",
  address =      "Amsterdam, The Netherlands",
  edition =      "Second",
  pages =        "xviii + 204",
  year =         "2013",
  ISBN =         "0-12-411644-2 (paperback)",
  ISBN-13 =      "978-0-12-411644-3 (paperback)",
  LCCN =         "QA76.9.A25 E5443 2013",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  author-dates = "1974--",
  subject =      "Penetration testing (Computer security); Computer
                 hackers; Computer software; Testing; Computer crimes;
                 Prevention",
  tableofcontents = "What is Penetration Testing? \\
                 Reconnaissance \\
                 Scanning \\
                 Exploitation \\
                 Web Based Exploitation \\
                 Maintaining Access with Backdoors and Rootkits
                 \\
                 Wrapping Up the Penetration Test",
}

@Book{Neely:2013:WRP,
  author =       "Matthew Neely and Alex Hamerstone and Chris Sanyk",
  title =        "Wireless reconnaissance in penetration testing",
  publisher =    "Elsevier/Syngress",
  address =      "Amsterdam, The Netherlands",
  pages =        "xvi + 166",
  year =         "2013",
  ISBN =         "1-59749-731-2",
  ISBN-13 =      "978-1-59749-731-2",
  LCCN =         "TK7882.E2 N44 2013",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Electronic surveillance; Penetration testing (Computer
                 security); Wireless communication systems; Security
                 measures",
  tableofcontents = "Why radio profiling? \\
                 Basic radio theory and introduction to radio systems
                 \\
                 Targets (wireless headsets, guard radios, wireless
                 cameras, etc.) \\
                 Offsite profiling \\
                 Offsite profiling case study \\
                 Onsite profiling \\
                 Onsite profiling case study \\
                 How to use the information you gather \\
                 Basic overview of equipment and how it works \\
                 Case study to pull it all together \\
                 New technology and the future of radios in penetration
                 testing",
}

@Book{Wilhelm:2013:PPT,
  editor =       "Thomas Wilhelm",
  title =        "Professional penetration testing",
  publisher =    pub-SYNGRESS,
  address =      pub-SYNGRESS:adr,
  edition =      "Second",
  pages =        "????",
  year =         "2013",
  ISBN =         "1-59749-993-5",
  ISBN-13 =      "978-1-59749-993-4",
  LCCN =         "TK5105.59 .W544 2013",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures; Penetration
                 testing (Computer security); Testing; Computer
                 hackers",
  tableofcontents = "Volume 1. Creating and Learning in a Hacking Lab",
}

@Book{Baloch:2014:EHP,
  author =       "Rafay Baloch",
  title =        "Ethical hacking and penetration testing guide",
  publisher =    pub-CRC,
  address =      pub-CRC:adr,
  pages =        "????",
  year =         "2014",
  ISBN =         "1-4822-3161-1 (paperback)",
  ISBN-13 =      "978-1-4822-3161-8 (paperback)",
  LCCN =         "QA76.9.A25 B356 2014",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  abstract =     "This book introduces the steps required to complete
                 a penetration test, or ethical hack. Requiring no prior
                 hacking experience, the book explains how to utilize
                 and interpret the results of modern day hacking tools,
                 which are required to complete a penetration test.
                 Coverage includes Backtrack Linux, Google
                 reconnaissance, MetaGooFil, dig, Nmap, Nessus,
                 Metasploit, Fast Track Autopwn, Netcat, and Hacker
                 Defender rootkit. Simple explanations of how to use
                 these tools and a four-step methodology for conducting
                 a penetration test provide readers with a better
                 understanding of offensive security.",
  acknowledgement = ack-nhfb,
  subject =      "Penetration testing (Computer security); COMPUTERS /
                 Security / General.; COMPUTERS / Networking / General.;
                 LAW / Forensic Science.",
}

@Book{Broad:2014:HKP,
  author =       "James Broad and Andrew Bindner",
  title =        "Hacking with {Kali}: practical penetration testing
                 techniques",
  publisher =    "Syngress, an imprint of Elsevier",
  address =      "Amsterdam, The Netherlands",
  edition =      "First",
  pages =        "ix + 227",
  year =         "2014",
  ISBN =         "0-12-407749-8 (alkaline paper)",
  ISBN-13 =      "978-0-12-407749-2 (alkaline paper)",
  LCCN =         "QA76.9.A25 B772 2014",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Penetration testing (Computer security); Kali Linux;
                 Computer hackers",
  tableofcontents = "Introduction \\
                 Download and install Kali Linux \\
                 Software, patches, and upgrades \\
                 Configuring Kali Linux \\
                 Building a penetration testing lab \\
                 Introduction to the penetration test lifecycle
                 \\
                 Reconnaissance \\
                 Scanning \\
                 Exploitation \\
                 Maintaining access \\
                 Reports and templates \\
                 Appendix A: Tribal Chicken \\
                 Appendix B: Kali penetration testing tools",
}

@Book{Krebs:2014:SNI,
  author =       "Brian Krebs",
  title =        "Spam nation: the inside story of organized cybercrime
                 --- from global epidemic to your front door",
  publisher =    "Sourcebooks, Inc.",
  address =      "Naperville, IL, USA",
  pages =        "????",
  year =         "2014",
  ISBN =         "1-4022-9561-8 (hardcover)",
  ISBN-13 =      "978-1-4022-9561-4 (hardcover)",
  LCCN =         "HV6773.2 .K74 2014",
  bibdate =      "Mon Nov 24 12:24:28 MST 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  abstract =     "Explores ``the criminal masterminds driving some of
                 the biggest spam and hacker operations targeting
                 Americans and their bank accounts. Tracing the rise,
                 fall, and alarming resurrection of the digital mafia
                 behind the two largest spam pharmacies --- and
                 countless viruses, phishing, and spyware attacks --- he
                 delivers the first definitive narrative of the global
                 spam problem and its threat to consumers
                 everywhere''.",
  acknowledgement = ack-nhfb,
  subject =      "Computer crimes; United States; Internet fraud; Spam
                 (Electronic mail); Phishing; Organized crime",
}

@Book{Lane:2014:PBD,
  editor =       "Julia I. Lane and Victoria Stodden and Stefan Bender
                 and Helen Nissenbaum",
  booktitle =    "Privacy, big data, and the public good: frameworks for
                 engagement",
  title =        "Privacy, big data, and the public good: frameworks for
                 engagement",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "xix + 322",
  year =         "2014",
  ISBN =         "1-107-06735-9 (hardcover), 1-107-63768-6 (paperback)",
  ISBN-13 =      "978-1-107-06735-6 (hardcover), 978-1-107-63768-9
                 (paperback)",
  LCCN =         "JC596 .P747 2015",
  bibdate =      "Sat Jun 28 10:20:29 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  abstract =     "Massive amounts of data on human beings can now be
                 analyzed. Pragmatic purposes abound, including selling
                 goods and services, winning political campaigns, and
                 identifying possible terrorists. Yet 'big data' can
                 also be harnessed to serve the public good: scientists
                 can use big data to do research that improves the lives
                 of human beings, improves government services, and
                 reduces taxpayer costs. In order to achieve this goal,
                 researchers must have access to this data - raising
                 important privacy questions. What are the ethical and
                 legal requirements? What are the rules of engagement?
                 What are the best ways to provide access while also
                 protecting confidentiality? Are there reasonable
                 mechanisms to compensate citizens for privacy loss? The
                 goal of this book is to answer some of these questions.
                 The book's authors paint an intellectual landscape that
                 includes legal, economic, and statistical frameworks.
                 The authors also identify new practical approaches that
                 simultaneously maximize the utility of data access
                 while minimizing information risk.",
  acknowledgement = ack-nhfb,
  subject =      "privacy, right of; research; moral and ethical
                 aspects; big data; social aspects; common good",
  tableofcontents = "Part I. Conceptual Framework: Editors' introduction
                 / Julia Lane, Victoria Stodden, Stefan Bender and Helen
                 Nissenbaum \\
                 1. Monitoring, datafication, and consent: legal
                 approaches to privacy in the big data context /
                 Katherine J. Strandburg \\
                 2. Big data's end run around anonymity and consent /
                 Solon Barocas and Helen Nissenbaum \\
                 3. The economics and behavioral economics of privacy /
                 Alessandro Acquisti \\
                 4. The legal and regulatory framework: what do the
                 rules say about data analysis? / Paul Ohm \\
                 5. Enabling reproducibility in big data research:
                 balancing confidentiality and scientific transparency /
                 Victoria Stodden \\
                 Part II. Practical Framework: Editors' introduction /
                 Julia Lane, Victoria Stodden, Stefan Bender and Helen
                 Nissenbaum \\
                 6. The value of big data for urban science / Steven E.
                 Koonin and Michael J. Holland \\
                 7. The new role of cities in creating value / Robert
                 Goerge \\
                 8. A European perspective / Peter Elias \\
                 9. Institutional controls: the new deal on data /
                 Daniel Greenwood, Arkadiusz Stopczynski, Brian Sweatt,
                 Thomas Hardjono and Alex Pentland \\
                 10. The operational framework: engineered controls /
                 Carl Landwehr \\
                 11. Portable approaches to informed consent and open
                 data / John Wilbanks \\
                 Part III. Statistical Framework: Editors' introduction
                 / Julia Lane, Victoria Stodden, Stefan Bender and Helen
                 Nissenbaum \\
                 12. Extracting information from big data / Frauke
                 Kreuter and Roger Peng \\
                 13. Using statistics to protect privacy / Alan F. Karr
                 and Jerome P. Reiter \\
                 14. Differential privacy: a cryptographic approach to
                 private data analysis / Cynthia Dwork",
}

@Book{Watson:2014:SEP,
  author =       "Gavin Watson",
  title =        "Social engineering penetration testing: executing
                 social engineering pen tests, assessments and defense",
  publisher =    pub-SYNGRESS,
  address =      pub-SYNGRESS:adr,
  pages =        "????",
  year =         "2014",
  ISBN =         "0-12-420124-5",
  ISBN-13 =      "978-0-12-420124-8",
  LCCN =         "HM668 .W38 2014",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  author-dates = "1982--",
  subject =      "Social engineering",
}

@Book{Weidman:2014:PTH,
  author =       "Georgia Weidman",
  title =        "Penetration testing: a hands-on introduction to
                 hacking",
  publisher =    pub-NO-STARCH,
  address =      pub-NO-STARCH:adr,
  pages =        "????",
  year =         "2014",
  ISBN =         "1-59327-564-1 (paperback)",
  ISBN-13 =      "978-1-59327-564-8 (paperback)",
  LCCN =         "QA76.9.A25 W4258 2014",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  abstract =     "In \booktitle{Penetration Testing}, security
                 researcher and trainer Georgia Weidman provides you
                 with a survey of important skills that any aspiring
                 pentester needs. This beginner-friendly book opens with
                 some basics of programming and helps you navigate Kali
                 Linux, an operating system that comes preloaded with
                 useful computer security tools like Wireshark and
                 Metasploit. You'll learn about gathering information on
                 a target, social engineering, capturing network
                 traffic, analyzing vulnerabilities, developing
                 exploits, and more. Hands-on examples discuss even
                 advanced topics like mobile device security and
                 bypassing anti-virus software.",
  acknowledgement = ack-nhfb,
  subject =      "Penetration testing (Computer security); Kali Linux;
                 computer hackers; computers / internet / security.;
                 computers / networking / security.; computers /
                 security / general.",
  tableofcontents = "Foreward by Peter Van Eeckhoutte \\
                 \\
                 Acknowledgements \\
                 \\
                 Introduction \\
                 \\
                 Penetration Testing Primer \\
                 \\
                 Part 1: The Basics \\
                 \\
                 Chapter 1: Setting Up Your Virtual Lab \\
                 Chapter 2: Using Kali Linux \\
                 Chapter 3: Programming \\
                 Chapter 4: Using the Metasploit Framework \\
                 \\
                 Part 2: Assessments \\
                 \\
                 Chapter 5: Information Gathering \\
                 Chapter 6: Finding Vulnerabilities \\
                 Chapter 7: Capturing Traffic \\
                 \\
                 Part 3: Attacks \\
                 \\
                 Chapter 8: Exploitation \\
                 Chapter 9: Password Attacks \\
                 Chapter 10: Client-Side Exploitation \\
                 Chapter 11: Social Engineering \\
                 Chapter 12: Bypassing Antivirus Applications \\
                 Chapter 13: Post Exploitation \\
                 Chapter 14: Web Application Testing \\
                 Chapter 15: Wireless Attacks \\
                 \\
                 Part 4: Exploit Development \\
                 \\
                 Chapter 16: A Stack-Based Buffer Overflow in Linux \\
                 Chapter 17: A Stack-Based Buffer Overflow in Windows
                 \\
                 Chapter 18: Structured Exception Handler Overwrites \\
                 Chapter 19: Fuzzing, Porting Exploits, and Metasploit
                 Modules \\
                 \\
                 Part 5: Mobile Hacking \\
                 \\
                 Chapter 20: Using the Smartphone Pentest Framework \\
                 \\
                 Resources \\
                 \\
                 Index",
}

%%% ====================================================================
%%% Cross-referenced entries must come last:

@Book{Vacca:2010:MIS,
  editor =       "John R. Vacca",
  booktitle =    "Managing information security",
  title =        "Managing information security",
  publisher =    pub-ELSEVIER,
  address =      pub-ELSEVIER:adr,
  pages =        "xxiv + 296",
  year =         "2010",
  ISBN =         "1-59749-533-6 (papercover)",
  ISBN-13 =      "978-1-59749-533-2 (papercover)",
  LCCN =         "QA76.9.A25 M31845 2010",
  bibdate =      "Tue Jun 24 08:10:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Management; Computer networks;
                 Security measures; Penetration testing (Computer
                 security)",
  tableofcontents = "Information security essentials for IT managers:
                 protecting mission-critical systems / Albert Caballero
                 \\
                 Security management systems / Joe Wright and James
                 Harmening \\
                 Information technology security management / Rahul
                 Bhasker, Bhushan Kapoor \\
                 Identity management / Jean-Marc Seigneur, Tewfiq El
                 Maliki \\
                 Intrusion prevention and detection systems /
                 Christopher Day \\
                 Computer forensics / Scott R. Ellis \\
                 Network forensics / Yong Guan, Linfeng Zhang
                 \\
                 Firewalls / Errin W. Fulp \\
                 Penetration testing / Jay Bavisi \\
                 What is vulnerability assessment? / Almantas Kakareka",
}