CyberspaceSee also what's at Wikipedia, your library, or elsewhere.
Broader term:Related terms:Narrower terms: |
Filed under: Cyberspace -- Government policy
Filed under: Cyberspace -- Government policy -- AsiaFiled under: Cyberspace -- Security measuresFiled under: Computer networks -- Law and legislation
Filed under: Computer networks -- Law and legislation -- South AfricaFiled under: Computer networks -- Law and legislation -- United StatesFiled under: Computers -- Law and legislation
Filed under: Computer security -- Law and legislation -- Great Britain
Filed under: Data encryption (Computer science) -- Law and legislation -- Great Britain
Filed under: Digital signatures -- Law and legislation -- Great Britain
Filed under: Data encryption (Computer science) -- Law and legislation -- United StatesFiled under: Computer security -- Law and legislation
Filed under: Computer security -- Law and legislation -- AustraliaFiled under: Data encryption (Computer science) -- Law and legislation
Filed under: Digital signatures -- Law and legislationFiled under: Internet -- Law and legislation The Fight for the Future: How People Defeated Hollywood and Saved the Internet-- For Now (c2013), by Edward Lee (PDF with commentary at thefightforthefuture.com) The End of Ownership: Personal Property in the Digital Economy (Cambridge, MA: MIT Press, 2018), by Aaron Perzanowski and Jason M. Schultz (PDF files with commentary at MIT Press) The Future of Reputation: Gossip, Rumor, and Privacy on the Internet (New Haven: Yale University Press, 2007), by Daniel J. Solove (PDF files with commentary at GWU) Defeating Disinformation: Digital Platform Responsibility, Regulation, and Content Moderation on the Global Technological Commons (Cambridge, UK et al.: Cambridge University Press, 2025), ed. by Bhaskar Chakravorti and Joel P. Trachtman (HTML and PDF files at Cambridge) The Future of Ideas: The Fate of the Commons in a Connected World (New York: Random House, c2001), by Lawrence Lessig (PDF with commentary at the-future-of-ideas.com) The Digital Rights Movement: The Role of Technology in Subverting Digital Copyright (Cambridge, MA and London: MIT Press, c2012), by Hector Postigo (PDF with commentary at MIT Press)
Filed under: Internet -- Law and legislation -- Africa, NorthFiled under: Internet -- Law and legislation -- Middle EastFiled under: Internet -- Law and legislation -- South AfricaFiled under: Internet -- Law and legislation -- United States
Items below (if any) are from related and broader terms.
Filed under: Computers How Computers Work: Processor and Main Memory (c2009), by Roger Young (HTML, PDF, and Word at fastchip.net) Tools For Thought: The People and Ideas of the Next Computer Revolution (1985), by Howard Rheingold (HTML at rheingold.com) Are We Spiritual Machines? Ray Kurzweil vs. the Critics of Strong A.I. (c2002), ed. by Jay W. Richards, contrib. by Ray Kurzweil, John R. Searle, Michael J. Denton, William A. Dembski, Thomas S. Ray, and George F. Gilder (at kurzweilai.net) Principles of Control Systems Engineering (New York et al.: McGraw-Hill Book Co., 1960), by Vincent Del Toro and Sydney R. Parker (page images at HathiTrust) The Best of Creative Computing, ed. by David H. Ahl and Burchanel Green
Filed under: Computers -- Access control Access Denied: The Practice and Policy of Global Internet Filtering (Cambridge, MA and London: MIT Press, c2008), ed. by Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (PDF with commentary at MIT Press) Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design (1998), by Electronic Frontier Foundation (HTML at cryptome.org and other sites) Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1988), by National Computer Security Center (U.S.) (HTML at fas.org) A Guide to Understanding Discretionary Access Control in Trusted Systems (version 1, 1987), by Carole Jordan (HTML at fas.org) Cryptography and Data Security (Reading, MA et al.: Addison-Wesley, c1982), by Dorothy Elizabeth Robling Denning (PDF at npos.edu) A Guide to Writing the Security Features User's Guide for Trusted Systems (version 1; 1991), by David M. Chizmadia (text at fas.org) Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace (Cambridge, MA and London: MIT Press, c2010), ed. by Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (PDF with commentary at MIT Press) A Guide to Understanding Trusted Facility Management, by Virgil D. Gligor (HTML at fas.org) Rating Maintenance Phase Program Document, by Tommy Hammer (HTML at usmc.mil) Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (c2003), by Rafeeq Ur Rehman (PDF at pearsoncmg.com) Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System, by National Computer Security Center (U.S.) (HTML at usmc.mil)
Filed under: Computers -- Amateurs' manuals
Filed under: Computers -- Dictionaries
Filed under: Computers -- History
Filed under: Computers -- Humor
Filed under: Computers -- PeriodicalsMore items available under broader and related terms at left. |