B

Bibliography

This bibliography lists the reports from the National Research Council’s Computer Science and Telecommunications Board from which this report takes much of its material. All were published by and are available from the National Academies Press, Washington, D.C.

Chapter 1

  • Computers at Risk: Safe Computing in the Information Age (1991)
  • Toward a Safer and More Secure Cyberspace (2007)

Chapter 2

  • Computing the Future: A Broader Agenda for Computer Science and Engineering (1992)
  • Trust in Cyberspace (1999)
  • Being Fluent with Information Technology (1999)
  • The Internet’s Coming of Age (2001)
  • Signposts in Cyberspace: The Domain Name System and Internet Navigation (2005)


The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement



Below are the first 10 and last 10 pages of uncorrected machine-read text (when available) of this chapter, followed by the top 30 algorithmically extracted key phrases from the chapter as a whole.
Intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text on the opening pages of each chapter. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

Do not use for reproduction, copying, pasting, or reading; exclusively for search engines.

OCR for page 132
B Bibliography This bibliography lists the reports from the National Research Coun- cil’s Computer Science and Telecommunications Board from which this report takes much of its material. All were published by and are available from the National Academies Press, Washington, D.C. Chapter 1 • Computers at Risk: Safe Computing in the Information Age (1991) • Toward a Safer and More Secure Cyberspace (2007) Chapter 2 •  omputing the Future: A Broader Agenda for Computer Science and C Engineering (1992) • Trust in Cyberspace (1999) • Being Fluent with Information Technology (1999) • The Internet’s Coming of Age (2001) •  ignposts in Cyberspace: The Domain Name System and Internet Navi- S gation (2005) 132

OCR for page 132
APPENDIX B 133 Chapter 3 • Toward a Safer and More Secure Cyberspace (2007) •  echnology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use T of Cyberattack Capabilities (2009) Chapter 4 • Cryptography’s Role in Securing the Information Society (1996) • Who Goes There? Authentication Through the Lens of Privacy (2003) • Toward a Safer and More Secure Cyberspace (2007) • T  echnology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities (2009) •  oward Better Usability, Security, and Privacy of Information Technol- T ogy: Report of a Workshop (2010) •  etter Report from the Committee on Deterring Cyberattacks: Informing L Strategies and Developing Options for U.S. Policy (2010) Chapter 5 • Toward a Safer and More Secure Cyberspace (2007) • Engaging Privacy and Information Technology in a Digital Age (2007) •  ssessing the Impacts of Changes in the Information Technology R&D A Ecosystem: Retaining Leadership in an Increasingly Global Environment (2009) •  echnology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use T of Cyberattack Capabilities (2009) Chapter 6 • Toward a Safer and More Secure Cyberspace (2007) •  echnology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use T of Cyberattack Capabilities (2009)

OCR for page 132