автореферат (1169571), страница 3
Текст из файла (страница 3)
– 290 p.49Sanger D. The Inheritance. A New President Confronts the World / David E. Sanger. – Black Swan, 2009. –513 p.; Sanger D. Confront and Conceal. Obama’s Secret Wars and Surprising Use of American Power / David E.Sanger. – New York: Broadway Paperbacks, 2012. – 485 p.50Singer P.W. Cybersecurity and Cyberwar: What Everyone Needs to Know / Peter W. Singer, Allan Friedman. –OXFORD University Press, 2014. – 306 p.51Cyberpower and National Security / Ed.
by F. Kramer, S. Starr, L. Wentz. – Potomac Books Inc., 2009. – 664 p.;Military Perspectives on Cyberpower / Ed. by L. Wentz, C.Barry, S. Starr. – CreateSpace Independent PublishingPlatform, 2012. – 128 p.52Hathaway, Melissa. Strategic Advantage: Why America Should Care About Cybersecurity [Электронныйресурс] / Belfer Center for Science and International Affairs.
October 2009. – URL:http://belfercenter.ksg.harvard.edu/files/Hathaway.Strategic%20Advantage.Why%20America%20Should%20Care%20About%20Cybersecurity.pdf (дата обращения: 05.04.14).53Schmitt E. Counterstrike: the untold story of America’s secret campaign against al Qaeda / Eric Schmitt andThom Shanker. – New York: Times Books, 2011. – 324 p.54In Athena’s Camp: Preparing for Conflict in the Information Age [Электронный ресурс] / Ed.
by John Arquilla,David Ronfeldt. – Santa Monica: RAND, 1997. – URL:http://www.rand.org/pubs/monograph_reports/MR880.html; Arquilla, John and Ronfeld, David. The Emergence ofNeopolitik: Towards an American Information Strategy [Электронный ресурс] // RAND, 1999.http://www.rand.org/pubs/monograph_reports/MR1033.html (дата обращения: 05.04.14)55Denning D. Information Warfare and Security / Dorothy E.
Denning. – New York: ACM Press, 1999. – 522 p.56Libicki М. What is Information Warfare? / Martin C. Libicki // The Center for Advanced Command Conceptsand Technology. – 2005. – P.104; Libicki, Мartin. Cyberdeterrence and Cyberwar [Электронный ресурс] //RAND, 2009. – 214 p. – URL:http://www.rand.org/content/dam/rand/pubs/monographs/2009/RAND_MG877.pdf; Libicki М. Cyberwar as aConfidence Game / Martin Libicki // Strategic Studies Quaterly.
– Vol. 5. No.1. – Spring 2011. – P. 132-146.57Rona, Thomas. Weapons Systems and Information War [Электронный ресурс] / Boeing Aerospace Company.Seattle, Washington. July 1976. – URL:http://www.dod.mil/pubs/foi/homeland_defense/missile_defense_agency/09-F0070WeaponSystems_and_Information_War.pdf (дата обращения: 05.04.14)8Значимый вклад в исследование угроз информационной безопасности,их содержания и основных характеристик внесли российские исследователиВ.А. Голубев 63 , Е. Касперский 64 , В.Н.
Лопатин 65 , Г.Л. Смолян 66 ,А.А. Стрельцов 67 , А.В. Федоров 68 , а также зарубежные – Р. Алдрих 69 ,Дж. Бреннер 70 , Г. Вайман 71 , Д. Деннинг 72 , М. Кавелти 73 , Э. Каплан 74 ,Дж. Карр75, Д. Кларк76, Б. Коллин77, П. Левин78, Дж. Льюис79, К. Уилсон80,М. Штоль81, У. Швартау82.58Thomas T.
Cyber Silhouettes. Shadows Over Information Operations / Timothy L. Thomas. – Foreign MilitaryStudies Office (FMSO). Fort Leavenworth, KS, 2005. – 334 p.; Thomas T. Is the IW Paradigm Outdated? ADiscussion of U.S. IW Theory / Timothy L. Thomas // Journal of Information Warfare. – 2/3.
– 2003. – P.109-116.59Toffler A. War and Anti-War: Survival at the Down of the Twenty-First Century / Alvin and Heidi Toffler. – 1sted. – 1993. – 302 p.60Wilson, Clay. Information Operations, Electronic Warfare and Cyberwar: Capabilities and Related Policy Issues[Электронный ресурс] // Congress Research Service Report.
March 20, 2007. – URL:http://www.fas.org/sgp/crs/natsec/RL31787.pdf (дата обращения: 05.04.14).61Winterfeld S. The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory andPractice / Steve Winterfeld, Jason Andress. – Syngress, 2012. – 164 p.62Schwartau W. Information Warfare: Chaos on the Electronic Superhighway / Winn Schwartau. – N.Y.: ThundersMonth Press, 1994. – 432 p.63Голубев В.А.
«Кибертерроризм» – миф или реальность [Электронный ресурс] // Центр исследованиякомпьютерной преступности. – URL: http://www.crime-research.ru/library/terror3.htm (дата обращения:05.04.14).64Касперский Е. Компьютерное зловредство / Е. Касперский. – Спб: Питер, 2008. – 208 с.65Лопатин В.Н.
Информационная безопасность России: Человек, общество, государство / В.Н. Лопатин. –М.: 2000. – 428 с.66Смолян Г.Л. Сетевые информационные технологии и проблемы безопасности личности / Г.Л. Смолян //Информационное общество. – 1999. – № 1. – С. 21-25.67Стрельцов А.А. Обеспечение информационной безопасности России / А.А. Стрельцов. – М.:МЦНМО,2002. – 296 с.68Федоров А.В. Супер терроризм: новый вызов нового века / под ред. А.В. Федорова. – М.: Права человека,2002. – 392 с.69Aldrich, Richard W. Cyberterrorism and Computer Crimes: Issues Surrounding the Establishment of anInternational Legal Regime [Электронный ресурс] // INSS Occasional Paper 32. Information Operations Series.April 2000. – URL: http://www.au.af.mil/au/aul/bibs/infowar/if.htm (дата обращения: 05.04.14).70Brenner J. America the Vulnerable / Joel Brenner.
– New York: Penguin Press, 2011. – 308 p.71Weiman G. Terror on the Internet: the New Arena, the New Challenges / Gabriel Weimann. – Washington, D.C.:United States Institute of Peace Press. – 2006. – 309 p.72Denning D. Reflections on Cyberweapons Controls / Dorothy E. Denning // Computer Security Journal. – Fall2000. – Vol. XVI.
– No. 4. – P. 43-53; Denning, Dorothy. Cyberterrorism [Электронный ресурс] / George TownUniversity. May 23, 2000. – URL: http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html; Denning,Dorothy. Is cyberterror next? [Электронный ресурс] / Social Science Research Counsil. November 1, 2001. –URL: http://essays.ssrc.org/sept11/essays/denning.htm (дата обращения: 05.04.14).73Cavelty M. Cyber-security and threat politics: US efforts to secure the information age / Myriam Dunn Cavelty.– New York : Routledge, 2007. – 182 p.74Kaplan, Eben.
Terrorists and the Internet [Электронный ресурс] / Counsil on Foreign Relations. January 8,2009. – URL: http://www.cfr.org/terrorism-and-technology/terrorists-internet/p10005 (дата обращения: 05.04.14).75Carr J. Inside Cyber Warfare / Jeffrey Carr. – O’REILLY, 2010.
– 213 p.76Clarke, David and Landau, Susan. Untangling Attribution [Электронный ресурс] / National Academy Press.July 15, 2010. – URL: http://www.nap.edu/openbook.php?record_id=12997&page=25 (дата обращения:05.04.14).77Collin, Barry. The Future of Cyberterrorism [Электронный русурс] // Crime and Justice International. March1997. – Vol. 13 – Issue 2. – URL: http://www.cjimagazine.com/archives/cji4c18.html?id=415 (дата обращения:05.04.14).9Вопросы обеспечения информационной безопасности охватываютправовые аспекты, связанные, в частности, с использованием государствамикиберпространства в военно-политических целях.
Здесь заслуживаютвнимания работы таких зарубежных исследователей, как Р. Алдрих 83 ,Д. Грэхам 84 , Дж. Данлап 85 , К. Дам, Р. Кларк 86 , Х. Лин 87 , В. Оувенз,М. Роскини 88 , Т. Уингфилд 89 , С. Уотс 90 , С. Шелберг 91 , М. Шмитт 92 ,78Levin P. Securing the Information Highway: How to Enhance the United States Electronic Defenses / Peter L.Levin and Wesley K. Clark // Foreign Affairs. – November/December 2009. – Vol. 88. No. 6.
– P. 5-17.79Lewis, James. Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats [Электронныйресурс] / Center for Strategic and International Studies. December 2002. – URL:http://csis.org/files/media/csis/pubs/021101_risks_of_cyberterror.pdf; Lewis, James. Thresholds for Cyberwar[Электронный ресурс] / Center for Strategic and International Studies.
September 2010. – URL:http://csis.org/files/publication/101001_ieee_insert.pdf (дата обращения: 05.04.14).80Wilson, Clay. Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress[Электронный ресурс] / Congress Research Center Report. October 17, 2003.
– URL:http://fpc.state.gov/documents/organization/26009.pdf; Wilson, Clay. Botnets, Cybercrime, and Cyberterrorism:Vulnerabilities and Policy Issues for Congress [Электронный ресурс] / Congress Research Service Report.January 28, 2008. – URL: http://fpc.state.gov/documents/organization/102643.pdf (дата обращения: 05.04.14).81Stohl M. Cyber Terrorism: A Clear and Present Danger, The Sum of All Fears, Breaking Point or PatriotGames?/ Michael Stohl // Crime, Law and Social Change, Vol.
46, #4. – 2006. – P. 223-238.82Schwartau W. Cyber Shock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists, and Weapons ofMass Disruption / Winn Schwartau. – New York: Thunder’s Mouth Press, 2000. – 470 p.83Aldrich, Richard W. The International Legal Implications of Information Warfare [Электронный ресурс] //Airpower Journal. – Fall 1996, – Vol. 10. No.
3. – P. 99-110. – URL:http://www.airpower.maxwell.af.mil/airchronicles/apj/apj96/fall96/aldrich.pdf (дата обращения: 05.04.14).84Graham D. Cyber Threats and the Law of War / David E. Graham // Journal of National Security Law. – August13, 2010. – Vol. 4 (1). – P. 87-102.85Dunlap C. Jr. Perspectives for Cyber Strategists on Law for Cyberwar / Charles J. Dunlap Jr. // Strategic StudiesQuarterly. – Spring 2011.
– P. 81-99.86Clarke, Richard A. Securing Cyberspace Through International Norms [Электронный ресурс] / Good HarborSecurity Risk Management. – URL: http://www.goodharbor.net/media/pdfs/SecuringCyberspace_web.pdf (датаобращения: 05.04.14).87Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities / Eds.William Owens, Kenneth Dam, and Herbert Lin. – Washington: National Academies Press, 2009.
– 367 p.88Roscini M. World Wide Warfare – Jus ad Bellum and the Use of Cyber Force / A. von Bogdandy and R.Wofrum (eds.) // Max Planck Yearbook of United Nations Law. – 2010. – Vol. 14. – P. 85-130.89Wingfield T.C. Legal Aspects of Offensive Information Operations in Space / Thomas L. Wingfried // Journal ofLegal Studies. – 1998/1999. – Vol. 9. – P.