Дополнительные библиографические источники и материалы
1. Корсаков Г.Б. Тенденции развития военной политики Вашингтона // США ϖ Канада. 2011. № 2. С. 22-40.
2. Роговский Е.А., Шариков П.А. Пентагон усиливает кибероборону // США ϖ Канада. 2011. № 1. С. 51-60.
3. Alexander Keith. Lt Gen. Testimony (Confirmed as the First Commander U.S. Cyber Command) to the Senate Committee on Armed Services. 15.04.2010.
4. Arquilla J., Ronfeldt D. In Athena's Camp: Preparing for Conflict in the Information Age. Santa Monica: RAND, 1997.
5. Arquilla J., Ronfeldt D. The Emergence of Neopolitik: Toward an American Information Strategy. Report MR-1033-OSD. Santa Monica: RAND, 1999.
6. The Battle for Hearts and Minds: Using Soft Power to Undermine Terrorist Networks / Ed. by A. Lennon. Cambridge: Cambridge University Press, 2004.
7. Borchgrave De A., Cilluffo F., Cardash S., Ledgerwood M. Cyber Threats and Information Security: Meeting the 21st Century Challenges. Washington: CSIS, 2001.
8. Bremmer I. Democracy in Cyberspace: What Information Technology Can and Cannot Do // Foreign Affairs. November/December, 2010. P. 86-92.
9. Brimley S. Promoting Security in Common Domains // The Washington Quarterly. July 2010. P. 119-132.
10. Butler R. Deputy Assistant Secretary of Defense for Cyber and Space Policy. Testimony before the House of Representatives Committee on Armed Services Subcommittee on Strategy Forces. 21.04.2010.
11. Castells M. Communication Power. Oxford: Oxford University Press, 2009.
12. Clark W., Levin P. Securing the Information Highway: How to Enhance the United States Electronic Defenses // Foreign Affairs. November/December. 2009. P. 5-17.
13. Clinton Hillary. Remarks on Internet Freedom. Speech. Washington. 21.01.2010.
14. Command and Control Warfare. Joint Publication 3-13.1. Washington. Joint Chiefs of Staff. February 1996.
15. Cyber Space Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure. Washington. The White House. May 2009.
16. Department of Defense Strategy for Operating in Cyberspace. Washington. U.S. Department of Defense. July 2011.
17. Global Trends-2025: A Transformed World. National Intelligence Council. Washington. November 2008.
18. Graham B. Bush Orders Guidelines for Cyber Warfare // The Washington Post. 7.02.2003.
19. Harrison L., Huntington S. Culture Matters: How Values Shape Human Progress. New York. 2000.
20. Hildreth S. Cyber Warfare: Background and Issues for Congress. Congressional Research Service Report for Congress. RL 30735. 19.06.2001.
21. Hosmer S. Operations against Enemy Leaders. Santa Monica: RAND, 2001.
22. Information Operations. Directive D 3600.1. Washington. DoD. 14.08.2006.
23. Information Operations. Directive 10-7. Washington. U.S. Department of Air Force. 6.09.2006.
24. Information Operations. Joint Publication 3-13. Washington. Joint Chiefs of Staff. 13.02.2006.
25. Information Operations Roadmap. Washington. DoD. 30.10.2003.
26. Information Warfare. Directive TS 3600.1. Washington. DoD. 21.12.1992.
27. International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World. Washington. The White House. May 2011.
28. Joint Doctrine for Information Operations. Joint Publication 3-13. Washington. Joint Chiefs of Staff. December 1998.
29. Knake R. Internet Governance in an Age of Cyber Insecurity. New York. Council on Foreign Relations. 2010.
30. Libicki M. Cyberdeterrence and Cyberwar. Santa Monica: RAND, 2009.
31. Libicki M. What is Information Warfare? Santa Monica: RAND, 1995.
32. Libicki M. Who Runs What in the Global Information Grid: Ways to Share Local and Global Responsibility. Santa Monica: RAND, 2000.
33. Lonsdale D. The Nature of War in the Information Age: Clausewitzian Future. London. 2004.
34. Lynn W. Defending a New Domain: The Pentagon's Cyberstrategy // Foreign Affairs. September/October 2010. P. 97-108.
35. Lynn W. Deputy Secretary of Defense. Remarks. National Space Symposium. Colorado Springs. 14.04.2010.
36. Lynn W. Protecting the Domain: Cybersecurity as a Defense Priority. Speech. Washington. CSIS. 15.06.2009.
37. Malander R., Riddile A., Wilson P. Strategic Information Warfare: A New Face of War. Santa Monica. RAND, 1996.
38. McGiffert C. Chinese Soft Power and Its Implications for the United States: Competition and Cooperation in the Developing World. Washington: CSIS, 2009.
39. The National Strategy to Secure Cyber Space. Washington. The White House. February 2003.
40. Nye J. Soft Power: The Means to Success in World Politics. New York: Public Affairs, 2004.
41. Nye J. The Future of American Power: Dominance and Decline in Perspective // Foreign Affairs. November/December 2010. P. 2-12.
42. Obama Barack. National Framework for Strategic Communication. Washington. The White House. 2009.
43. O'Neil M. Cyberchiefs: Autonomy and Authority in Online Tribes. London. 2009.
44. Pincus W. Pentagon Reviewing Strategic Information Operations // The Washington Post. 27.12.2009.
45. Post D. In Search of Jefferson's Moose: Notes on the State of Cyberspace. Oxford: Oxford University Press, 2009.
46. Public Sentinel: News Media and Governance Reform / Ed. by P. Norris. Washington: The MIT Press, 2009.
47. Rattray G. Strategic Warfare in Cyberspace. London: The MIT Press, 2001.
48. Rid T., Hecker M. War 2.0: Irregular Warfare in the Information Age. Westport, 2007.
49. Sartori A. Deterrence by Diplomacy. Princeton: Princeton University Press, 2005.
50. Schmidt E., Cohen J. The Digital Disruption: Connectivity and the Diffusion of Power // Foreign Affairs. November/December 2010. P. 75-85.
51. Securing Cyberspace for the 44th Presidency. Washington. CSIS Commission on Cybersecurity for the 44th Presidency. December 2008.
52. Securing Our Nation's Cyber Infrastructure. Washington. The White House. Office of the Press Secretary. 29.05.2009.
53. Shirky C. The Political Power of Social Media: Technology, the Public Sphere, and Political Change // Foreign Affairs. January/February 2011. P. 28-41.
54. Soft Power and U.S. Foreign Policy: Theoretical, Historical and Contemporary Perspectives / Ed. by Parmar I., Cox M. New York, London, 2010.
55. Soft Power Superpowers: Cultural and National Assets of Japan and the United States / Ed. by Watanabe Y., McConnell D. New York. 2008.
56. Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities / Ed. by W. Owens, K. Dam, H. Lin. Washington. 2010.
57. Wiener N. Cybernetics: or Control and Communication in the Animal and Machine. Cambridge: The MIT Press, 1948.
58. Wilson C. Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress. Congressional Research Service Report for Congress. RL32114. 17.10.2003.
59. Wolf Ch., Rosen B. Public Diplomacy: How to Think About and Improve it. Santa Monica: RAND, 2004.
Комментарии
Сообщения не найдены