Go to the previous, next section.
What follows is a compendium of sources that have information that will be of use to anyone reading this guide. Most of them were used in the writing of the booklet, while others are simply noted because they are a must for any good net.citizen's bookshelf.
Comer, Douglas E.
Internetworking With TCP/IP, 2nd ed., 2v
Prentice Hall
Englewood Cliffs, NJ
1991
Davidson, John
An Introduction to TCP/IP
Springer-Verlag
Berlin
1988
Frey, Donnalyn, and Adams, Rick
!`@%:: A Directory of Electronic Mail Addressing and Networks
O'Reilly and Associates
Newton, MA
1989
Gibson, William
Neuromancer
Ace
New York, NY
1984
LaQuey, Tracy
Users' Directory of Computer Networks
Digital Press
Bedford, MA
1990
Levy, Stephen
Hackers: Heroes of the Computer Revolution
Anchor Press/Doubleday
Garden City, NY
1984
Partridge, Craig
Innovations in Internetworking
ARTECH House
Norwood, MA
1988
Quarterman, John S.
The Matrix: Computer Networks and Conferencing Systems Worldwide
Digital Press
Bedford, MA
1989
Raymond, Eric (ed)
The New Hacker's Dictionary
MIT Press
Cambridge, MA
1991
Stoll, Clifford
The Cuckoo's Egg
Doubleday
New York
1989
Tanenbaum, Andrew S.
Computer Networks, 2d ed
Prentice-Hall
Englewood Cliffs, NJ
1988
Todinao, Grace
Using UUCP and USENET: A Nutshell Handbook
O'Reilly and Associates
Newton, MA
1986
The Waite Group
Unix Communications, 2nd ed.
Howard W. Sams & Company
Indianapolis
1991
Barlow, J
Coming Into The Country
Communications of the ACM
2
March 1991
Addresses ``Cyberspace''---John Barlow was a co-founder of the EFF.
Collyer, G., and Spencer, H
News Need Not Be Slow
Proceedings of the 1987 Winter USENIX Conference
181--90
USENIX Association, Berkeley, CA
January 1987
Denning, P
The Internet Worm
American Scientist
126--128
March--April 1989
The Science of Computing: Computer Networks
American Scientist
127--129
March--April 1985
Frey, D., and Adams, R
USENET: Death by Success?
UNIX REVIEW
55--60
August 1987
Gifford, W.S
ISDN User-Network Interfaces
IEEE Journal on Selected Areas in Communications
343--348
May 1986
Ginsberg, K
Getting from Here to There
UNIX REVIEW
45
January 1986
Hiltz, S.R
The Human Element in Computerized Conferencing Systems
Computer Networks
421--428
December 1978
Horton, M
What is a Domain?
Proceedings of the Summer 1984 USENIX Conference
368--372
USENIX Association, Berkeley, CA
June 1984
Jacobsen, Ole J
Information on TCP/IP
ConneXions---The Interoperability Report
14--15
July 1988
Jennings, D., et al
Computer Networking for Scientists
Science
943--950
28 February 1986
Markoff, J
``Author of computer `virus' is son of U.S. electronic security expert.''
New York Times
Nov. 5, 1988
A1
``Computer snarl: A `back door' ajar.''
New York Times
Nov. 7, 1988
B10
McQuillan, J.M., and Walden, D.C.
The ARPA Network Design Decisions
Computer Networks
243--289
1977
Ornstein, S.M
A letter concerning the Internet worm
Communications of the ACM
June 1989
Partridge, C
Mail Routing Using Domain Names: An Informal Tour
Proceedings of the 1986 Summer USENIX Conference
366--76
USENIX Association, Berkeley, CA
June 1986
Quarterman, J
Etiquette and Ethics
ConneXions---The Interoperability Report
12--16
March 1989
Notable Computer Networks
Communications of the ACM
October 1986
This was the predecessor to The Matrix.
Raeder, A.W., and Andrews, K.L
Searching Library Catalogs on the Internet: A Survey
Database Searcher 6
16--31
September 1990
Seeley, D
A tour of the worm
Proceedings of the 1989 Winter USENIX Conference
287--304
USENIX Association, Berkeley, CA
February 1989
Shulman, G
Legal Research on USENET Liability Issues
;login: The USENIX Association Newsletter
11--17
December 1984
Smith, K
E-Mail to Anywhere
PC World
220--223
March 1988
Stoll, C
Stalking the Wily Hacker
Communications of the ACM
14
May 1988
This article grew into the book The Cuckoo's Egg.
Taylor, D
The Postman Always Rings Twice: Electronic Mail in a Highly Distributed Environment
Proceedings of the 1988 Winter USENIX Conference
145--153
USENIX Association, Berkeley, CA
December 1988
U.S.Gen'l Accounting Ofc
Computer Security: Virus Highlights Need for Improved Internet Management
GAO/IMTEC-89-57,
1989
Addresses the Internet worm.
"And all else is literature."
Paul Verlaine
The Sun, New York
Go to the previous, next section.