SEARCH

SEARCH BY CITATION

References

  • African Rights (1995). Rwanda: Death, despair and defiance. London : African Rights.
  • Anderson, R. J. (1996). The eternity service. Retrieved November 21, 2002 from http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html.
  • Arquilla, J., & Ronfeldt, D. (1997a). The advent of netwar. In J.Arquilla & D.Ronfeldt (Eds.), In Athena's camp (pp. 275293). Santa Monica , CA : RAND.
  • Arquilla, J., & Ronfeldt, D. (1997b). Looking ahead: Preparing for information-age conflict. In J.Arquilla & D.Ronfeldt (Eds.), In Athena's camp (pp. 439493). Santa Monica , CA : RAND.
  • Bauer, M. (2001). Battening down the hatches with Bastille. Linux Journal, 84, 30+.
  • Beam, L. (1992). Leaderless resistance, The Seditionist 12. Retrieved November 21, 2002 from http://www.louisbeam.com/leaderless.htm.
  • Beam, L. (n.d.). The Holocaust as a mechanism for suppressing the truth. Retrieved November 21, 2002, from http://www.louisbeam.com/holocaust.htm.
  • Brown, A. (2001). Red Rover. In A.Oram (Ed.), Peer-to-peer: Harnessing the power of disruptive technologies (pp. 133144). Sebastopol , CA : O'Reilly Associates.
  • Brunn, S., & Cottle, C. (1997). Small states and cyberboosterism. The Geographical Review 87(2), 240258.
  • Carmichael, P. (2002a). Information interventions, media development and the Internet. In M.Price & M.Thompson (Eds.), Forging peace: Information, human rights, and the management of media space (pp. 365392). Edinburgh : Edinburgh University Press.
  • Carmichael, P. (2002b). Extensible Markup Language and qualitative data analysis. Forum Qualitative Sozialforschung: Special Edition on Using Technology in the Qualitative Research Process 3(2). Retrieved November 21, 2002 from http://www.qualitative-research.net/fqs-texte/2-02/2-02carmichael-e.pdf.
  • CERT (1999). Distributed denial of service tools (CERT incident note IN-99-07). CERT Coordination Center Software Engineering Institute. Retrieved November 21, 2002 from http://www.cert.org/incident_notes/IN-99-07.html.
  • Clark, I (1999). A distributed decentralised information storage and retrieval system. Retrieved November 21, 2002 from http://freenet.sourceforge.net/Freenet.ps.
  • Cohen, D. (2000, June 6). Cold water poured on Sealand security. The Guardian. Retrieved November 21, 2002 from http://www.guardian.co.uk/business/story/0,3604,328707,00.html.
  • Collin, M. (2001). This is Serbia calling: Rock ‘n’ roll radio and Belgrade's underground resistance. London : Serpent's Tail.
  • Curtin, M. (2000). On guard: Fortifying your site against attack. Web Techniques, 5(4), 4650.
  • Dingledine, R., Freedman M., & Molnar, D. (2001). Free haven. In A.Oram (Ed.), Peer-to-peer: Harnessing the power of disruptive technologies (pp. 159187). Sebastopol , CA : O'Reilly Associates.
  • European Commission against Racism and Intolerance (ECRI) (2001). Annual report on ECRI's activities covering the period from 1 January to 31 December 2000. Strasbourg : Council of Europe.
  • Garfinkel, S. (2000). Welcome to Sealand. Now bugger off. Wired, 8(7). Retrieved November 21, 2002 from http://www.wired.com/wired/archive/8.07/haven.html.
  • Goldberg, A., & Yianilos, P. (1998). Towards an archival intermemory. In Proceedings of I.E.E.E. International Forum on Research and Technology Advances in Digital Libraries (pp. 147156).
  • Goldfarb, C. F., & Prescod, P. (2000). The XML Handbook. Upper Saddle River , NJ : Prentice Hall.
  • Gourevitch, P. (1998). We wish to inform you that tomorrow we will be killed with our families. London : Macmillan/Picador.
  • Harknett, R. J. (1996). Information warfare and deterrence. Parameters: US Army War College Quarterly, Autumn, 93107.
  • Harwood, R. [Richard Verrall] (1975) Did six million really die? Richmond , VA : Historical Review Press.
  • Hatewatch (2000). Hacking and hate: Virtual attacks with real consequences. Retrieved April 12, 2001 from http://hatewatch.org/reports/hackingandhate.html.
  • Human Rights Watch (1996). Shattered lives: sexual violence during the Rwandan genocide and its aftermath . Retrieved November 20, 2002 from http://www.hrw.org/hrw/reports/1996/Rwanda.htm.
  • Kan, G. (2001). Gnutella. In A.Oram (Ed.), Peer-to-peer: Harnessing the power of disruptive technologies (pp. 94122). Sebastopol , CA : O'Reilly Associates.
  • Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S., Eaton, P., Geels, D., Gummadi, R., Rhea, S., Weatherspoon, H., Weimer, W., Wells, C., & Zhao, B. (2000). OceanStore: An architecture for global-scale persistent storage. In Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), Cambridge , MA . Retrieved November 21, 2002 from http://delivery.acm.org/10.1145/380000/379239/p190-kubiatowicz.pdf?key1=379239&key2=1049652401&coll=portal&dl=ACM&CFID=6858380&CFTOKEN=51718380.
  • Markovic, I. (1998, February). Tactical media as a tool for survival in the war zone. In J.Beasley-Murray, P.Husbands, & V.Brown (Chairs), Globalization from below: Contingency, conflict, contestation in historical perspective, Duke University, Durham , North Carolina .
  • Miller, A. (2000, February 17). NNTP IP Address spoofing, tracing abuse. Message posted to the BIND Users electronic mailing list, archived at http://www.isc.org/ml-archives/bind-users/2000/02/msg00597.html.
  • Muhr, T. (2000) Increasing the reusability of qualitative data with XML. Forum Qualitative Sozialforschung, 1(3). Retrieved November 20, 2002 from http://qualitative-research.net/fqs-texte/3-00/3-00muhr-e.htm.
  • Northcutt, S., & Novak, J. (2001). Network intrusion detection: An analyst's handbook (2nd ed.). Indianapolis , IN : New Riders.
  • Prunier, G. (1995). The Rwanda crisis 1959-1994: History of a genocide. London : Charles Hurst and Co.
  • SANS Institute (2000). Consensus roadmap for defeating distributed denial of service attacks: A project of the partnership for critical infrastructure security (version 1.10). Retrieved November 21, 2002 from http://www.sans.org/dosstep/roadmap.php.
  • Stephenson, N. (1999). Cryptonomicon. London : Heinemann.
  • Wack, J., & Carnahan, L. (1995). Keeping your site comfortably secure: An introduction to Internet firewalls. National Institute of Standards and Technology, U.S. Department of Commerce. Retrieved November 21, 2002, from http://csrc.nist.gov/publications/nistpubs/800-10/node31.html.
  • Waldman, M., Rubin, A., & and Cranor, L. (2000, August). Publius: A robust, tamper-evident, censorship-resistant Web publishing system. In S.Bellovin & G.Rose (Chairs), 9th Usenix Security Symposium, Denver, Colorado .
  • Waldman, M., Cranor, L., & Rubin, A. (2001). Trust. In A.Oram (Ed.), Peer-to-Peer: Harnessing disruptive technologies (pp. 242270). Sebastopol , CA : O'Reilly Associates.
  • Whine, M. (1999). Cyberspace: A new medium for communication and command and control by extremists. Studies in Conflict and Terrorism 22(3), 231245.
  • Wiley, B. (2001). Interoperability through gateways. In A.Oram (Ed.), Peer-to-peer: Harnessing disruptive technologies (pp. 381392). Sebastopol , CA : O'Reilly Associates.
  • Yee, D. (2001). Cyberhate conference report. Retrieved November 21, 2002 from http://danny.oz.au/freedom/hate/cyberhate.htm.
  • Young, J. (2000). At memory's edge: After-images of the Holocaust in contemporary art and architecture. London : Yale University Press.
  • Zwicky, E., Cooper, S., & Chapman, D. (2000). Building Internet firewalls (2nd Ed.). Sebastopol , CA : O'Reilly Associates.