диссертация (1169572), страница 42
Текст из файла (страница 42)
and Moses J. // The MIT Press, 1980. – 491 p.236. Bell D. The Coming of Post-Industrial Society: A Venture in Social Forecasting/Daniel Bell. – New York: Basic Books, 1999. – 616 p.237. Brenner J. America the Vulnerable / Joel Brenner. – New York: Penguin Press,2011. – 308 p.238. Brennen S.
Cyberthreats and The Decline of The Nation-state / Susan W.Brenner. – Abingdon, Oxon: Routledge, 2014. – 175 p.239. Carr J. Inside Cyber Warfare / Jeffrey Carr. – O’REILLY, 2010. – 213 p.240. Carter A. Preventive Defense. A New Security Strategy for America / Ashton B.Carter, William J. Perry. – Washington, D.C.: Brookings Institution Press, 1999.– 256 p.241. Cavelty M. Cyber-security and threat politics: US efforts to secure theinformation age / Myriam Dunn Cavelty. – New York : Routledge, 2007. – 182p.242. Castells М. The Rise of the Network Society / Manual Castells. – The 2ndEdition, Oxford: Wiley-Blackwell, 2000.
– 594 p.243. Cerf V. Looking Toward the Future [Электронный ресурс] / The InternetProtocolJournal.–Vol.10,No.4.–URL:http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_104/104_future.html244. Cerf V. On the Evolutions of Internet Technologies / Vint Cerf // Proceedings ofthe IEEE. – Vol.92.
– Issue 9, 2004 – P. 1360-70.245. Clark W, Levin P. Securing the information highway: How to enhance theUnited States electronic defenses [Электронный ресурс] // Foreign Affairs. –November/December2009.–URL:http://www.foreignaffairs.com/articles/65499/wesley-k-clark-and-peter-llevin/securing-the-information-highway246. Clarke R.
Cyber War the Next Threat to National Security and what to do aboutit / Richard A. Clarke and Robert K. Knake. – HarperCollins, 2010. – 290 p.197247. Clarke R. Securing Cyberspace Through International Norms [Электронныйресурс]/GoodHarborSecurityRiskManagement–URL:http://www.goodharbor.net/media/pdfs/SecuringCyberspace_web.pdf248. Clayton M. Presidential Cyberwar Directive Gives Pentagon Long-awaitedMarching Orders / The Christian Science Monitor.
June 10, 2013 – URL:http://www.csmonitor.com/USA/Military/2013/0610/Presidential-cyberwardirective-gives-Pentagon-long-awaited-marching-orders-video249. Collin B. The Future of Cyberterrorism [Электронный ресурс] // Crime andJustice International. March 1997.
– Vol. 13 – Issue 2. – URL:http://www.cjimagazine.com/archives/cji4c18.html?id=415250. Cyberpower and National Security / Edited by F. Kramer, S. Starr, L. Wentz. –Potomac Books Inc., 2009. – 664 p.251. Denning D. Cyberterrorism [Электронный ресурс] / George Town University.May 23, 2000. URL:http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html252.
Denning D. Information Operations and Terrorism [Электронный ресурс] /DefenseTechnicalInformationCenter.August18,2005.–URL:http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA484999253. Denning D. Information Warfare and Security / Dorothy E. Denning. – NewYork: ACM Press, 1999. – 522 p.254. Denning D. Is cyberterror next? [Электронный ресурс] / Social ScienceResearchCounsil.November1,2001.–URL:http://essays.ssrc.org/sept11/essays/denning.htm255. Denning D. Reflections on Cyberweapons Controls / Dorothy E.
Denning //Computer Security Journal. – Fall 2000. – Vol. XVI. – No. 4. – P. 43-53.256. Devost M. Information Terrorism: Can You Trust Your Toaster? [Электронныйресурс] / Matthew G. Devost, Brian K. Houghton, Neal A. Pollard // TheTerrorismResearchCenter.http://www.devost.net/papers/suntzu.pdfSeptember1998.–URL:198257. Dunlap C. Jr.
Perspectives for Cyber Strategists on Law for Cyberwar / CharlesJ. Dunlap Jr. // Strategic Studies Quarterly. – Spring 2011. – P. 81-99.258. Elliott D. Weighing the Case for a Convention to Limit Cyberwarfare[Электронный ресурс] / Arms Control Association. November 2009. – URL:http://www.armscontrol.org/act/2009_11/Elliott259. Friedman T. The Lexus and the Olive Tree: Understanding Globalization /Thomas L. Friedman. – New York: Farrar, Straus and Giroux, 1999. – 394 p.260. Friedman T. The World is Flat: Brief History of the Twenty First Century /Thomas L.
Friedman. – New York: Farrar, Straus and Giroux, 2007. – 660 p.261. Fukuyama Fr. America at the Crossroads: Democracy, Power, and theNeoconservative Legacy / Francis Fukuyama. – Yale University Press, 2006. –226 p.262. Garson G. Computer Technology and Social Issues / G. David Garson. –Harrisburg, Pa.: Idea Group, 1995. – 444 p.263. Global Politics in The Information Age / edited by Mark J.
Lacy and PeterWilkin. – New York: Palgrave, 2005. – 208 p.264. Goldsmith J. Power and Constraint: The Accountable Presidency After 9/11 /Jack Goldsmith. – New York: W. W. Norton & Co., 2012. – 311 p.265. Goldsmith J. Who controls the Internet?: Illusions of a Borderless World / JackGoldsmith and Tim Wu.
– New York: Oxford University Press, 2006. – 226 p.266. Graham D. Cyber Threats and the Law of War / David E. Graham // Journal ofNational Security Law. – August 13, 2010. - Vol. 4 (1). – P. 87-102.267. Hiller J. Internet Law & Policy / Janine S. Hiller, Ronnie Cohen. – N.J.: PrenticeHall, 2002. – 377 p.268. Huntington S.
The Lonely Superpower / Samuel P. Huntington // ForeignAffairs. – March/April 1999. – Vol. 78. – № 2. – P. 35-49.269. In Athena’s Camp: Preparing for Conflict in the Information Age / edited byJohn Arquilla and David Ronfeldt. – RAND Corporation, 1997. – 525 p.270. Intellectual Property and Development: Theory and Practice / edited by RamiM. Olwan. – New York: Springer, 2013. – 392 p.199271. Kaplan E. Terrorists and the Internet / Counsil on Foreign Relations.
– January8,2009.–URL:http://www.cfr.org/terrorism-and-technology/terrorists-internet/p10005272. Kissinger H. Does America Need a Foreign Policy? Toward a Diplomacy for the21st Century / Henry A. Kissinger. – New York: Simon & Schuster, 2001. – 238p.273. Knake R.
Cyberterrorism Hype v. Facts [Электронный ресурс] / Council onForeign Relations. February 16, 2010. – URL: http://www.cfr.org/terrorism-andtechnology/cyberterrorism-hype-v-fact/p21434274. Kurbalija J. Internet Governance: Issues, Actors and Divides / Jovan Kurbalijaand Eduardo Gelbstein. – Diplo Foundation and the Global KnowledgePartnership, 2005. – 144 p.275. Lebedeva M. The effect of modern media technologies and the WikiLeaksphenomenon on world politics [Электронный ресурс] / Russian InternationalAffairsCouncil.July13,2012.–URL:http://russiancouncil.ru/en/inner/?id_4=605#top276. Lessig L. Code and Other Laws of Cyberspace / Lawrence Lessig.
– New York:Basic Books, 1999. – 297 p.277. Levin P. Securing the Information Highway: How to Enhance the United StatesElectronic Defenses / Peter L. Levin and Wesley K. Clark // Foreign Affairs. –November/December 2009. – Vol. 88. No. 6. – P. 5-17.278. Lewis T. Critical Infrastructure Protection in Homeland Security: Defending aNetworked Nation / Ted G.
Lewis. – Hoboken, N.J.: Wiley-Interscience, 2006. –474 p.279. Libicki М. Cyberdeterrence and Cyberwar [Электронный ресурс] / RANDCorporation, 2009. – 214 p. – URL:http://www.rand.org/content/dam/rand/pubs/monographs/2009/RAND_MG877.pdf280. Libicki М. Cyberwar as a Confidence Game / Martin C.
Libicki // StrategicStudies Quaterly. – Vol. 5. No.1. – Spring 2011. – P. 132-146.200281. Libicki М. What is Information Warfare? / Martin C. Libicki. – The Center forAdvanced Command Concepts and Technology Institute for National StrategicStudies, 1995. – 104 p.282. Long D. Protect your privacy: How to Protect Your Identity As Well As YourFinancial, Personal, and Computer Records in An Age of Constant Surveillance/Duncan Long. – Guilford, Conn.: Lyons Press, 2007.
– 277 p.283. Lynn III W. Defending a New Domain: The Pentagon's Cyberstrategy[Электронный ресурс] // Foreign Affairs. – September/October 2010. – URL:http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-anew-domain284.
Lynn III W. The Pentagon’s Cyberstrategy, One Year Later [Электронныйресурс]//ForeignAffairs.–September28,2011.–URL:http://www.foreignaffairs.com/articles/68305/william-j-lynn-iii/the-pentagonscyberstrategy-one-year-later285. Malcolm J. Multi-stakeholder Governance and the Internet Governance Forum /Jeremy Malcolm. – Perth: Terminus Press, 2008. – 611 p.286. Mansell R. Imagining the Internet: Communication, Innovation, andGovernance / Robin Mansell. – Oxford: Oxford University Press, 2012. – 289 p.287. Masters J. Confronting the Cyber Threat [Электронный ресурс] / Council onForeign Relations.
May 23, 2011. – URL: http://www.cfr.org/technology-andforeign-policy/confronting-cyber-threat/p15577288. Masuda Y. The information Society as Post-Industial Society. / Yoneji Masuda.– Washington, 1981. – 179 p.289. Mathiason J. Internet Governance: the New Frontier of Global Institutions /John Mathiason. – New York: Routledge, 2009.