You are on page 1of 2

Book

(None)
ADDRESSING THE SPECTRE OF CYBER TERRORISM: A COMPARATIVE PERSPECTIVE, North-West University, 2012.
Ardvoaice G., Naghi G. et Ni D., Sfritul terorismului?, Antet, 2002.
Baggili I., Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab
Emirates, October 4-6, 2010, Revised Selected Papers, Springer, 2011.
Bishop M., Computer Security: Art and Science, Addison-Wesley, 2003.
Brady Anne W., A wake up call. Cyber terrorism, cyber warfare & internet terror, 2011.
Coggle A. et Warren Matthew, An assessment of cyber terrorism, Geelong, Vic, Deakin University, School of Computing and
Mathematics (coll. Technical reports, computing series ), 2002.
Cohen Aviv, The applicability of counter-terror conventions to cyber-terrorism, 2009.
Denning D. E., Cryptography and Data Security, Addison-Wesley, 1982.
Denning D. E., Information Warfare and Security, Addison-Wesley, 1998.
Elliott Joyce E., Cyber terrorism. A threat to national security, Carlisle Barracks, PA, U.S. Army War College (coll. USAWC strategy
research project ), 2002.
Fischer-Hbner S., IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms, Springer, 2001.
Graham J., Olson R. et Howard R., Cyber Security Essentials, Taylor & Francis, 2011.
Information technology in 21st century battlespace. Hearing before the Terrorism, Unconventional Threats and Capabilities
Subcommittee of the Committee on Armed Services, House of Representatives, One Hundred Eighth Congress, first session, hearings
held July 24 and October 21, 2003, Washington, U.S. G.P.O; For sale by the Supt. of Docs. U.S. G.P.O, 2004.
Janczewski L. et Colarik A. M., Managerial Guide for Handling Cyber-terrorism and Information Warfare, Idea Group Publishing,
2005.
Karake-Shalhoub Z. et Qasimi L. A., Cyber Law and Cyber Security in Developing and Emerging Economies, Edward Elgar, 2010.
Kent Arthur et Klein Janis, Cyberterrorism, New York, N.Y, A & E Television Networks; Distributed in the U.S. by New Video, 2003.
Kostopoulos G., Cyberspace and Cybersecurity, Taylor & Francis, 2012.
Kostopoulos G., Cyberspace and Cybersecurity, Taylor & Francis, 2012.
Shoemaker D. et Conklin W., Cybersecurity: The Essential Body Of Knowledge, Cengage Learning, 2011.
Terrorism and cyber attacks as hybrid threats: defining a comprehensive approach for countering 21st century threats to global risk
and security, Springer, 2014.
Troncot C., Nelinitile insecuritii, Tritonic, 2005.
Warren Matthew, Cyber terrorism. A new threat to the information society?, Geelong, Vic, Deakin University, School of Computing
and Mathematics (coll. Technical reports. Computing series (Deakin University. School of Computing and Mathematics) ),
1998.
Wilson Clay, Computer attack and cyber terrorism. Vulnerabilities and policy issues for Congress, [Washington, D.C.],
Congressional Research Service, Library of Congress, 2003.
Woods Lauren et Sherman Mark, Cyber crime & cyber terrorism, Washington, DC, Federal Judicial Television Network (coll.
Special needs offenders close -up ), 2002.
Internet Document
(None)
Denning D. E., ,,Activism, Hacktivism, and Cyberterrorism. Networks and Netwars: The Future of Terror, Crime, and Militancy'',
http://www.rand.org/content/dam/rand/pubs/monograph_reports/MR1382/MR1382.ch8.pdf (21 martie 2014).
Denning D. E., ,,Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S.
House of Representatives'', http://faculty.nps.edu/dedennin/publications/Testimony-Cyberterrorism2000.htm.
J. GREEN, ,,The Myth of Cyberterrorism. Washington Monthly'', www.washingtonmonthly.com/features/2001/0211/green/html (22
martie 2014).
JAHANGIRI ALI, ,,Cyberspace, Cyberterrorism and Information Warfare: A Perfect Recipe for Confusion'',
http://alijahangiri.org/2009/01/cyberspace-cyberterrorism-and-information-warfare-a-perfect-recipe-for-confusion/ (1 mai
2014).
KEVIN COLEMAN, ,,Cyber Terrorism'', http://www.directionsmag.com/articles/cyber-terrorism/123840 (15 aprilie 2014).
NOAH SHACHTMAN, ,,Terrorists on the Net? Who Cares?'', http://archive.wired.com/techbiz/it/news/2002/12/56935 (25 aprilie
2014).
Journal Article
(None)
Collin B., ,,The Future of Cyberterrorism. Crime and Justice International'', 1997, p. 1518.
Denning D. E., ,,Stuxnet: What Has Changed? Future internet'', 4, 2012, p. 672687.
DENNING DOROTHY E., ,,Framework and principles for active cyber defense. Computers & Security'', tome 40, n 40, 2014, p. 108
113.
,,Developing new strategies to combat cyber-terrorism'', Idea Group Publishing, 2004.
KEVIN CURRAN, ,,Civil Liberties & Computer Monitoring. Journal of Information Technology Impact'', tome 5, n 5, 2005, p. 2938.

You might also like