Bibliografie Cyberterorism

2
Book (None)  ADDRESSING THE SPE CTRE OF CYBER TERRORISM: A COMPARATIVE PERSPE CTIVE, North-West University, 2012. Arădăvoaice G., Naghi G. et Niță D., Sfârșitul terorismului?, Antet, 2002. Baggili I., Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers, Springer , 2011. Bishop M., Computer Security: Art and Science, Addison-Wesley , 2003. Brady Anne W., A wake up call. Cyber te rrorism, cyber warfare & intern et terror , 2011. Coggle A. et Warren Matthew,  An assessment of cybe r terrorism, Geelong, Vic, Deakin University, School of Computing and Mathematics (coll. « Technical reports, computing series »), 2002. Cohen Aviv, The applicability of counter-terror conventio ns to cyber- terrorism, 2009. Denning D. E., Cryptography and Data Security, Addison-Wesle y, 1982. Denning D. E., Information Warfare and Security, Addison-Wesley , 1998. Elliott Joyce E., Cyber terrorism. A threat to national security, Carlisle Barracks, PA, U.S. Army War College (coll. « USAWC strategy research project »), 2002. Fischer-Hübner S., IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms, Springer, 2001. Graham J., Olson R. et Howard R., Cyber Security Essentials, Taylor & Francis, 2011. Information technology in 21st century battlespace. Hearing before the Terrorism, Unconventi onal Threats and Capabilities Subcommittee of the Committee on Armed Services, House of Representative s, One Hundred Eighth Congress , first session, hearings held July 24 and October 21, 2003, Washington, U.S. G.P.O; For sale by the Supt. of Docs. U.S. G.P.O, 2004. Janczewski L. et Colarik A. M., Managerial Guide for Handling Cyber-terrorism and Information Warfare, Idea Group Publishing, 2005. Karake-Shal houb Z. et Qasimi L. A., Cyber Law and Cyber Security in Developing and Emerging Economies, Edward Elgar, 2010. Kent Arthur et Klein Janis, Cyberterrorism, New York, N.Y, A & E Television Networks; Distributed in the U.S. by New Video, 2003. Kostopoulos G., Cyberspace and Cybersecurity, Taylor & Francis, 2012. Kostopoulos G., Cyberspace and Cybersecurity, Taylor & Francis, 2012. Shoemaker D. et Conklin W., Cybersecurity: The Essential Body Of Knowledge, Cengage Learning, 2011. Terrorism and cyber attacks as hybrid threats: defining a comprehensive approach for countering 21st century threats to global risk and security, Springer, 2014. Troncotă C., Neliniștile insecurității, Tritonic, 2005. Warren Matthew, Cyber terrorism. A new threat to the information society?, Geelong, Vic, Deakin University, School of Computing and Mathematics (coll. « Technical reports. Computing series (Deakin University. School of Computing and Mathematics) »), 1998. Wilson Clay, Computer attack and cyber terrorism. Vulnerabilities and policy issues for Congress, [Washington, D.C.], Congressional Research Service, Library of Congress, 2003. Woods Lauren et Sherman Mark, Cyber crime & cyber terrorism, Washington, DC, Federal Judicial Television Network (coll. « Special needs offende rs close -up »), 2002.

description

Bibliografie Cyberterorism Terorism Licenta 2014 Citavi

Transcript of Bibliografie Cyberterorism

Book(None)ADDRESSING THE SPECTRE OF CYBER TERRORISM: A COMPARATIVE PERSPECTIVE, North-West University, 2012.Ardvoaice G., Naghi G. et Ni D., Sfritul terorismului?, Antet, 2002.Baggili I., Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers, Springer, 2011.Bishop M., Computer Security: Art and Science, Addison-Wesley, 2003.Brady Anne W., A wake up call. Cyber terrorism, cyber warfare & internet terror, 2011.Coggle A. et Warren Matthew, An assessment of cyber terrorism, Geelong, Vic, Deakin University, School of Computing and Mathematics (coll. Technical reports, computing series ), 2002.Cohen Aviv, The applicability of counter-terror conventions to cyber-terrorism, 2009.Denning D. E., Cryptography and Data Security, Addison-Wesley, 1982.Denning D. E., Information Warfare and Security, Addison-Wesley, 1998.Elliott Joyce E., Cyber terrorism. A threat to national security, Carlisle Barracks, PA, U.S. Army War College (coll. USAWC strategy research project ), 2002.Fischer-Hbner S., IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms, Springer, 2001.Graham J., Olson R. et Howard R., Cyber Security Essentials, Taylor & Francis, 2011.Information technology in 21st century battlespace. Hearing before the Terrorism, Unconventional Threats and Capabilities Subcommittee of the Committee on Armed Services, House of Representatives, One Hundred Eighth Congress, first session, hearings held July 24 and October 21, 2003, Washington, U.S. G.P.O; For sale by the Supt. of Docs. U.S. G.P.O, 2004.Janczewski L. et Colarik A. M., Managerial Guide for Handling Cyber-terrorism and Information Warfare, Idea Group Publishing, 2005.Karake-Shalhoub Z. et Qasimi L. A., Cyber Law and Cyber Security in Developing and Emerging Economies, Edward Elgar, 2010.Kent Arthur et Klein Janis, Cyberterrorism, New York, N.Y, A & E Television Networks; Distributed in the U.S. by New Video, 2003.Kostopoulos G., Cyberspace and Cybersecurity, Taylor & Francis, 2012.Kostopoulos G., Cyberspace and Cybersecurity, Taylor & Francis, 2012.Shoemaker D. et Conklin W., Cybersecurity: The Essential Body Of Knowledge, Cengage Learning, 2011.Terrorism and cyber attacks as hybrid threats: defining a comprehensive approach for countering 21st century threats to global risk and security, Springer, 2014.Troncot C., Nelinitile insecuritii, Tritonic, 2005.Warren Matthew, Cyber terrorism. A new threat to the information society?, Geelong, Vic, Deakin University, School of Computing and Mathematics (coll. Technical reports. Computing series (Deakin University. School of Computing and Mathematics) ), 1998.Wilson Clay, Computer attack and cyber terrorism. Vulnerabilities and policy issues for Congress, [Washington, D.C.], Congressional Research Service, Library of Congress, 2003.Woods Lauren et Sherman Mark, Cyber crime & cyber terrorism, Washington, DC, Federal Judicial Television Network (coll. Special needs offenders close -up ), 2002.Internet Document(None)Denning D. E., ,,Activism, Hacktivism, and Cyberterrorism. Networks and Netwars: The Future of Terror, Crime, and Militancy'', http://www.rand.org/content/dam/rand/pubs/monograph_reports/MR1382/MR1382.ch8.pdf (21 martie 2014).Denning D. E., ,,Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives'', http://faculty.nps.edu/dedennin/publications/Testimony-Cyberterrorism2000.htm.J. Green, ,,The Myth of Cyberterrorism. Washington Monthly'', www.washingtonmonthly.com/features/2001/0211/green/html (22 martie 2014).Jahangiri Ali, ,,Cyberspace, Cyberterrorism and Information Warfare: A Perfect Recipe for Confusion'', http://alijahangiri.org/2009/01/cyberspace-cyberterrorism-and-information-warfare-a-perfect-recipe-for-confusion/ (1 mai 2014).Kevin Coleman, ,,Cyber Terrorism'', http://www.directionsmag.com/articles/cyber-terrorism/123840 (15 aprilie 2014).Noah Shachtman, ,,Terrorists on the Net? Who Cares?'', http://archive.wired.com/techbiz/it/news/2002/12/56935 (25 aprilie 2014).Journal Article(None)Collin B., ,,The Future of Cyberterrorism. Crime and Justice International'', 1997, p. 1518.Denning D. E., ,,Stuxnet: What Has Changed? Future internet'', 4, 2012, p. 672687.Denning Dorothy E., ,,Framework and principles for active cyber defense. Computers & Security'', tome 40, n 40, 2014, p. 108113.,,Developing new strategies to combat cyber-terrorism'', Idea Group Publishing, 2004.Kevin Curran, ,,Civil Liberties & Computer Monitoring. Journal of Information Technology Impact'', tome 5, n 5, 2005, p. 2938.