Go to the previous, next section.
What follows is a compendium of sources that have information that will be of use to anyone reading this guide. Most of them were used in the writing of the booklet, while others are simply noted because they are a must for any good net.citizen's bookshelf.
Comer, Douglas E. Internetworking With TCP/IP, 2nd ed., 2v Prentice Hall Englewood Cliffs, NJ 1991 Davidson, John An Introduction to TCP/IP Springer-Verlag Berlin 1988 Frey, Donnalyn, and Adams, Rick !`@%:: A Directory of Electronic Mail Addressing and Networks O'Reilly and Associates Newton, MA 1989 Gibson, William Neuromancer Ace New York, NY 1984 LaQuey, Tracy Users' Directory of Computer Networks Digital Press Bedford, MA 1990 Levy, Stephen Hackers: Heroes of the Computer Revolution Anchor Press/Doubleday Garden City, NY 1984 Partridge, Craig Innovations in Internetworking ARTECH House Norwood, MA 1988 Quarterman, John S. The Matrix: Computer Networks and Conferencing Systems Worldwide Digital Press Bedford, MA 1989 Raymond, Eric (ed) The New Hacker's Dictionary MIT Press Cambridge, MA 1991 Stoll, Clifford The Cuckoo's Egg Doubleday New York 1989 Tanenbaum, Andrew S. Computer Networks, 2d ed Prentice-Hall Englewood Cliffs, NJ 1988 Todinao, Grace Using UUCP and USENET: A Nutshell Handbook O'Reilly and Associates Newton, MA 1986 The Waite Group Unix Communications, 2nd ed. Howard W. Sams & Company Indianapolis 1991
Barlow, J Coming Into The Country Communications of the ACM 2 March 1991 Addresses ``Cyberspace''---John Barlow was a co-founder of the EFF. Collyer, G., and Spencer, H News Need Not Be Slow Proceedings of the 1987 Winter USENIX Conference 181--90 USENIX Association, Berkeley, CA January 1987 Denning, P The Internet Worm American Scientist 126--128 March--April 1989 The Science of Computing: Computer Networks American Scientist 127--129 March--April 1985 Frey, D., and Adams, R USENET: Death by Success? UNIX REVIEW 55--60 August 1987 Gifford, W.S ISDN User-Network Interfaces IEEE Journal on Selected Areas in Communications 343--348 May 1986 Ginsberg, K Getting from Here to There UNIX REVIEW 45 January 1986 Hiltz, S.R The Human Element in Computerized Conferencing Systems Computer Networks 421--428 December 1978 Horton, M What is a Domain? Proceedings of the Summer 1984 USENIX Conference 368--372 USENIX Association, Berkeley, CA June 1984 Jacobsen, Ole J Information on TCP/IP ConneXions---The Interoperability Report 14--15 July 1988 Jennings, D., et al Computer Networking for Scientists Science 943--950 28 February 1986 Markoff, J ``Author of computer `virus' is son of U.S. electronic security expert.'' New York Times Nov. 5, 1988 A1 ``Computer snarl: A `back door' ajar.'' New York Times Nov. 7, 1988 B10 McQuillan, J.M., and Walden, D.C. The ARPA Network Design Decisions Computer Networks 243--289 1977 Ornstein, S.M A letter concerning the Internet worm Communications of the ACM June 1989 Partridge, C Mail Routing Using Domain Names: An Informal Tour Proceedings of the 1986 Summer USENIX Conference 366--76 USENIX Association, Berkeley, CA June 1986 Quarterman, J Etiquette and Ethics ConneXions---The Interoperability Report 12--16 March 1989 Notable Computer Networks Communications of the ACM October 1986 This was the predecessor to The Matrix. Raeder, A.W., and Andrews, K.L Searching Library Catalogs on the Internet: A Survey Database Searcher 6 16--31 September 1990 Seeley, D A tour of the worm Proceedings of the 1989 Winter USENIX Conference 287--304 USENIX Association, Berkeley, CA February 1989 Shulman, G Legal Research on USENET Liability Issues ;login: The USENIX Association Newsletter 11--17 December 1984 Smith, K E-Mail to Anywhere PC World 220--223 March 1988 Stoll, C Stalking the Wily Hacker Communications of the ACM 14 May 1988 This article grew into the book The Cuckoo's Egg. Taylor, D The Postman Always Rings Twice: Electronic Mail in a Highly Distributed Environment Proceedings of the 1988 Winter USENIX Conference 145--153 USENIX Association, Berkeley, CA December 1988 U.S.Gen'l Accounting Ofc Computer Security: Virus Highlights Need for Improved Internet Management GAO/IMTEC-89-57, 1989 Addresses the Internet worm."And all else is literature." Paul Verlaine The Sun, New York
Go to the previous, next section.