диссертация (1169572), страница 43
Текст из файла (страница 43)
– 178 p.290. Metz S., Kievit J. Strategy and the Revolution in Military Affairs: From Theoryto Policy [Электронный ресурс] / Strategic Studies Institute. June 27, 1995. –55 p. – URL:http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?PubID=236201291. Military Perspectives on Cyberpower / Edited by L. Wentz, C. Barry, S. Starr. –CreateSpace Independent Publishing Platform, 2012. – 128 p.292. Moore M. Saving Globalization: Why Globalization and Democracy Offer theBest Hope for Progress, Peace and Development / Mike Moore. – Hoboken, NJ:John Wiley & Sons (Asia), 2009.
– 293 p.293. Mueller M. Networks and States: The Global Politics of Internet Governance /Milton L. Mueller. – Cambridge, Mass: MIT Press, 2010. – 313 p.294. Murray A. Information Technology Law: The Law and Society / AndrewMurray. – Oxford, United Kingdom: Oxford University Press, 2013. – 602 p.295. Nakashima E.
Pentagon Proposes More Robust Role for its Cyber-specialists[Электронный ресурс] // The Washington Post. August 10, 2012. – URL:http://www.washingtonpost.com/world/national-security/pentagon-proposesmore-robust-role-for-its-cyber-specialists/2012/08/09/1e3478ca-db15-11e19745-d9ae6098d493_story_1.html296.
Nye J. Cyber Power [Электронный ресурс] / Harvard Kennedy School. BelferCenter for Science and International Affairs. – May 2010. – 24 p. – URL:http://belfercenter.ksg.harvard.edu/files/cyber-power.pdf297. Nye J. Nuclear Lessons for Cyber Security? / Joseph S. Nye, Jr. // StrategicStudies Quarterly. – Winter 2011. – P.
18-38.298. Nye J. Soft Power. The Means to Success in World Politics / Joseph S. Nye, Jr.– Public Affairs. New York, 2004. – 192 p.299. Nye J. The Future of American Power: Dominance and Decline in Perspective /Joseph S. Nye, Jr. // Foreign Affairs. Nov. / Dec. 2010. V. 89.
#6. P. 2-12.300. Porat M. The Information Economy: Development and Measurement / M. Porat,M. Rubin. – Washington, 1978. – 320 p.301. Roscini M. World Wide Warfare – Jus ad Bellum and the Use of Cyber Force /Ed. By A. von Bogdandy and R. Wofrum // Max Planck Yearbook of UnitedNations Law, Volume 14. – 2010. – P.
85-130.202302. Rosenau J. New Dimension of Security: The Interaction of Globalizing andLocalizing Dynamics / James Rosenau // Security Dialogue. – September 1994.– P. 255-282.303. Rosenau J. Turbulence in World Politics. A Theory of Change and Continuity /James Rosenau. – Princeton University Press, New Jersey, 1990. – 463 p.304. Rosenzweig P.
Cyber Warfare: How Conflicts in Cyberspace are ChallengingAmerica and Changing the World / Paul Rosenzweig. – Santa Barbara, Calif.:Praeger, 2013. – 290 p.305. Sanger D. Confront and Conceal. Obama’s Secret Wars and Surprising Use ofAmerican Power / David E. Sanger. – New York: Broadway Paperbacks, 2012.– 485 p.306. Sanger D.
Obama Order Sped Up Wave of Cyberattacks Against Iran[Электронный ресурс] // The New York Times. June 1, 2012. – URL:http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-ofcyberattacks-against-iran.html?pagewanted=all&_r=0307. Sanger D. The Inheritance. A New President Confronts the World / David E.Sanger. – Black Swan, 2009. – 513 p.308.
Schjolberg S., Ghernaouti-Helie S. A Global Treaty on Cybersecurity andCybercrime [Электронный ресурс] – Second edition. 2011. – 89 p. – URL:http://www.cybercrimelaw.net/documents/A_Global_Treaty_on_Cybersecurity_and_Cybercrime,_Second_edition_2011.pdf309. Schmitt E. Counterstrike: The Untold Story of America’s Secret CampaignAgainst al Qaeda / Eric Schmitt and Thom Shanker. – New York: Times Books,2011. – 324 p.310. Schmitt M. Computer Network Attack and the Use of Force in InternationalLaw: Thoughts on a Normative Framework / Michael N.
Schmitt // ColumbiaJournal of Transnational Law. – 1999. – Vol. 37. – No.3, P. 885-938.311. Schmitt M. The Principle of Discrimination in 21st Century Warfare / MichaelN. Schmitt // Yale Human Rights and Development Law Journal. – 1999. – Vol.2. – P. 143-182203312. Schmitt M. Wired Warfare: Computer Network Attack and Jus in Bello[Электронный ресурс] / International Committee of the Red Cross. RICR JuinIRRC. – June 2002.
– Vol. 84. No 846. – P. 365-399. – URL:http://www.icrc.org/eng/assets/files/other/365_400_schmitt.pdf313. Schneier B. The Eternal Value of Privacy [Электронный ресурс] / Wired.May 18, 2006. – URL:http://www.wired.com/politics/security/commentary/securitymatters/2006/05/70886314. Schwartau W. Cyber Shock: Surviving Hackers, Phreakers, Identity Thieves,Internet Terrorists, and Weapons of Mass Disruption / Winn Schwartau. – NewYork: Thunder’s Mouth Press, 2000. – 470 p.315.
Schwartau W. Information Warfare: Chaos on the Electronic Superhighway /Winn Schwartau. – New York: Thunder’s Month Press, 1994. – 432 p.316. Singer P.Cybersecurity and Cyberwar: what everyone needs to know / Peter W.Singer, Allan Friedman. – OXFORD University Press, 2014. – 306 p.317. Spinello R. Cyber Ethics: Morality and Law in Cyberspace / Richard A.Spinello. – Boston: Jones and Bartlett Publishers, 2003. – 238 p.318.
Stohl M. Cyber Terrorism: A Clear and Present Danger, The Sum of All Fears,Breaking Point or Patriot Games?/ Michael Stohl // Crime, Law and SocialChange. – 2006.– Vol. 46. – #4. – P. 223-238.319. Sun Tzu and Information Warfare: A Collection Winning Papers from the SunTzu Art of War in Information Warfare Competition / Ed. by Robert E. Neilson.– Washington, D.C.: National Defense University Press. – 1997. – 167 p.320. Technology, Policy, Law and Ethics Regarding U.S.
Acquisition and Use ofCyberattack Capabilities / Ed by William Owens, Kenneth Dam, and HerbertLin. – Washington: National Academies Press, 2009. – 367 p.321. Thomas T. Cyber Silhouettes. Shadows Over Information Operations / TimothyL. Thomas. – Foreign Military Studies Office (FMSO). Fort Leavenworth, KS,2005. – 334 p.204322. Thomas T. Is the IW Paradigm Outdated? A Discussion of U.S. IW Theory /Timothy L. Thomas // Journal of Information Warfare. – 2/3. – 2003.
– P.109116.323. Toffler A. War and Anti-War: Survival at the Down of the Twenty-FirstCentury/ Alvin and Heidi Toffler. – 1st ed. – 1993. – 302 p.324. Weimann G. Terror on the Internet: the New Arena, the New Challenges /Gabriel Weimann. – Washington, D.C.: United States Institute of Peace Press. –2006. – 309 p.325. Weimann G. Special Report 116: www.terror.net how Modern Terrorism Usesthe Internet / United Institute of Peace, March 2004.
[Электронный ресурс]. –URL:http://dspace.cigilibrary.org/jspui/bitstream/123456789/4610/1/www%20terror%20net%20How%20Modern%20Terrorism%20Uses%20the%20Internet.pdf?1326. Wingfield T. Legal Aspects of Offensive Information Operations in Space /Thomas L. Wingfried // Journal of Legal Studies. – 1998/1999. – Vol. 9. – P.121-146.327. Winterfeld S. The Basics of Cyber Warfare: Understanding the Fundamentals ofCyber Warfare in Theory and Practice / Steve Winterfeld, Jason Andress. –Syngress, 2012. – 164 p.328. Zakaria F. The Post-American World / Fareed Zakaria. – New York: W.W.Norton, 2009.
– 292 p.Интернет-ресурсы:1.КоммерсантЪ. Онлайн версия. URL: www.kommersant.ru2.Минкомсвязь России. URL: www.minsvyaz.ru3.Президент России. URL: www.kremlin.ru4.Электронная база «Консультант Плюс». URL: www.konsultant.ru5.Arms Control Association. URL: www.armscontrol.org6.CBS News – URL: www.cbsnews.com7.Center for Strategic and International Studies. URL: www.csis.org2058.CNN. URL: www.cnn.com9.Congressional Research Service.
URL: www.crs.gov10.Counsil of Europe. URL: www.hub.coe.int11.Counsil on Foreign Relations. URL: http://www.cfr.org12.DefenseInstituteofSecurityAssistanceManagement.URL:www.disam.dsca.mil13.Electronic Frontier Foundation. URL: www.eff.org14.Federal Bureau of Investigation. URL: www.fbi.gov15.Federation of American Scientists. URL: www.fas.org16.Foreign Policy. Online Version. URL: http://www.foreignpolicy.com17.Gallup. URL: www.gallop.com18.Harvard Law Review. URL: www.harvardlawreview.org19.Homeland Security. URL: www.dhs.gov20.ICANN.
URL: www.icann.org21.Industrial Control Systems Cyber Emergency Response Team. URL: www.icscert.us22.Internet Crime Complaint Center. URL: www.ic3.gov23.International Telecommunication Union. URL: www.itu.int24.InternetWorldStats.UsageandPopulationStatistics.http://www.internetworldstats.com/top20.htm25.Javelin Strategy & Research. URL: www.javelinstrategy.com26.Symantec. URL: www.symantec.com27.The Financial Times – URL: www.ft.com28.The Foreign Affairs. Online version. URL: www.foreignaffairs.com29.The Independent. URL: www.independent.com30.The White House.
URL: www.whitehouse.gov31.McAfee. URL: www.mcafee.com32.National Academy of Science. URL: www.nap.edu33.National Capital Planning Commission. URL: www.ncpc.gpv34.National Research Counsil. URL: www.nationalacademies.orgURL:20635.National Security Strategy Archive. URL: http://nssarchive.us36.NationalTelecommunicationsandInformationAdministration.URL:www.ntia.doc.gov37.NATO.
URL: www.nato.it38.Office of the National Counterintelligence Executive. URL: www.ncix.gov39.Open Congress. URL: www.opencongress.org40.Organization of American States. URL: www.oas.org41.Organization for Security and Cooperation in Europe. URL: www.osce.org42.RAND Corporation. URL: www.rand.org43.Russia Today. URL: www.rt.com44.Strategic Studies Institute. URL: www.strategicstudiesinstitute.army.mil45.The Christian Science Monitor.