On Cyber Threats and Information Warfare
Printed sources Ackerman, R. (2009) “Threats Imperil the Entire U.S. Infrastructure. From the military to the economy, the country is open to vast damage”. SIG- NAL, AFCEA, International Journal, July 2009. Alberts, D.S, Hayes, R.E. (2003) “Power to the Edge. Command, Control in the Information Age”. DoD Command and Control Research Pro- gram, CCRP Publication Series. Alberts, D., Gartska, J., Stein, F. (1999) “Network Centric Warfare: Devel- oping and leveraging information superiority”. CCRP Publication Se- ries. (2:nd edition). “Antennen gedreht”. Wirtschaftwoche no 46, 9 November 2000. Published in the European Parliament Report 2001. “Annerkennungen zur sicherheitslage der Deutschen Wirtschaft”. ASW; Bonn, April 2001, published in the European Parliament Report 2001. Atwan, A.B. (2006) “The secret History of al Qaeda”. University of Cali- fornia Press, Berkley, USA Augustsson, T. (2010) ”Litet hopp stoppa nätvirus”. Svenska Dagbladet, 16 June 2010. Barret, B.M. (2008) “Information Warfare: China’s response to U.S. tech- nological Advantages”. International Journal of Intelligence, vol. 18, no 4. Bishop, M. (2003) “Computer Security Art and Science”. Pearson Educa- tion Inc., New Jersey, 2003. Bogdanov, S.A. (2004) “Warfare of the Future”. Military Thought, vol. 13, no 1. Bowcott, Owen. (2009) “Abdul Qadeer Khan. Pakistani nuclear scientist accused of industrial espionage”. The Guardian, 6 February 2009. Brenner, B. (2007) “Black Hat 2007: Estonian attacks were a cyberriot, not warfare”. Information Security Magazine, 3 August 2007. Carr, J (2010) “Inside Cyber Warfare. Mapping the Cyber Underworld”. O’Reilly Media Inc., Sebastopol CA, USA. 158 Carman, D. (2002) “Translation and Analysis of the...
You are not authenticated to view the full text of this chapter or article.
This site requires a subscription or purchase to access the full text of books or journals.
Do you have any questions? Contact us.Or login to access all content.