Bibliography

What follows is a compendium of sources that have information that will be of use to anyone reading this guide. Most of them were used in the writing of the booklet, while others are simply noted because they are a must for any good net.citizen's bookshelf.

Books

Comer, Douglas E. (1991). Internetworking With TCP/IP, 2nd ed., 2v. Prentice Hall: Englewood Cliffs, NJ.

Davidson, John (1988). An Introduction to TCP/IP. Springer-Verlag: Berlin.

Frey, Donnalyn, and Adams, Rick (1989). !@%:: A Directory of Electronic Mail Addressing and Networks. O'Reilly and Associates: Newton, MA.

Gibson, William (1984). Neuromancer. Ace: New York, NY.

LaQuey, Tracy (1990). Users' Directory of Computer Networks. Digital Press: Bedford, MA.

Levy, Stephen (1984). Hackers: Heroes of the Computer Revolution. Anchor Press/Doubleday: Garden City, NY.

Partridge, Craig (1988). Innovations in Internetworking. ARTECH House: Norwood, MA.

Quarterman, John S. (1989). The Matrix: Computer Networks and Conferencing Systems Worldwide. Digital Press: Bedford, MA.

Raymond, Eric (ed) (1991). The New Hacker's Dictionary. MIT Press: Cambridge, MA.

Stoll, Clifford (1989). The Cuckoo's Egg. Doubleday: New York.

Tanenbaum, Andrew S. (1988). Computer Networks, 2d ed. Prentice Hall: Englewood Cliffs, NJ.

Todinao, Grace (1986). Using UUCP and USENET: A Nutshell Handbook. O'Reilly and Associates: Newton, MA.

The Waite Group (1991). Unix Communications, 2nd ed.. Howard W. Sams & Company: Indianapolis.

Periodicals & Papers

Barlow, J. Coming Into The Country. Communications of the ACM 34:3 (March 1991): 2. Addresses "Cyberspace"_John Barlow was a co-founder of the EFF.

Collyer, G., and Spencer, H. News Need Not Be Slow. Proceedings of the 1987 Winter USENIX Conference: 181-90. USENIX Association, Berkeley, CA (January 1987).

Denning, P. The Internet Worm. American Scientist (March-April 1989): 126-128.

________.The Science of Computing: Computer Networks. American Scientist (March-April 1985): 127-129.

Frey, D., and Adams, R. USENET: Death by Success? UNIX REVIEW (August 1987): 55-60.

Gifford, W. S. ISDN User-Network Interfaces. IEEE Journal on Selected Areas in Communications (May 1986): 343-348.

Ginsberg, K. Getting from Here to There. UNIX REVIEW (January 1986): 45.

Hiltz, S. R. The Human Element in Computerized Conferencing Systems. Computer Networks (December 1978): 421-428.

Horton, M. What is a Domain? Proceedings of the Summer 1984 USENIX Conference: 368-372. USENIX Association, Berkeley, CA (June 1984).

Jacobsen, Ole J. Information on TCP/IP. ConneXions_The Interoperability Report (July 1988): 14-15.

Jennings, D., et al. Computer Networking for Scientists. Science (28 February 1986): 943-950.

Markoff, J. "Author of computer `virus' is son of U.S. electronic security expert." New York Times (Nov. 5, 1988): A1.

________."Computer snarl: A `back door' ajar." New York Times (Nov. 7, 1988): B10.

McQuillan, J. M., and Walden, D. C. The ARPA Network Design Decisions. Computer Networks (1977): 243-289.

Ornstein, S. M. A letter concerning the Internet worm. Communications of the ACM 32:6 (June 1989).

Partridge, C. Mail Routing Using Domain Names: An Informal Tour. Proceedings of the 1986 Summer USENIX Conference: 366-76. USENIX Association, Berkeley, CA (June 1986).

Bibliography 93

Quarterman, J. Etiquette and Ethics. ConneXions_The Interoperability Report (March 1989): 12-16.

________.Notable Computer Networks. Communications of the ACM 29:10 (October 1986). This was the predecessor to The Matrix.

Raeder, A. W., and Andrews, K. L. Searching Library Catalogs on the Internet: A Survey. Database Searcher 6 (September 1990): 16-31.

Seeley, D. A tour of the worm. Proceedings of the 1989 Winter USENIX Conference: 287-304. USENIX Association, Berkeley, CA (February 1989).

Shulman, G. Legal Research on USENET Liability Issues. ;login: The USENIX Association Newsletter (December 1984): 11-17.

Smith, K. E-Mail to Anywhere. PC World (March 1988): 220-223.

Stoll, C. Stalking the Wily Hacker. Communications of the ACM 31:5 (May 1988): 14. This article grew into the book The Cuckoo's Egg.

Taylor, D. The Postman Always Rings Twice: Electronic Mail in a Highly Distributed Environment. Proceedings of the 1988 Winter USENIX Conference: 145-153. USENIX Association, Berkeley, CA (December 1988).

U.S. Gen'l Accounting Ofc. Computer Security: Virus Highlights Need for Improved Internet Management. GAO / IMTEC - 89 - 57, (1989). Addresses the Internet worm.

"And all else is literature." Paul Verlaine The Sun, New York