|
Reference
|
|
*** (2008) Agreement between the governments of state members of the Shanghai organization of cooperation about cooperation in the field of ensuring the international information security
|
|
*** (2012) Armed forces of the United States. Joint Publication 3-13, Information Operations, http://www.dtic.mil/doctrine/new_pubs/jp3_13.pdf
|
|
*** (2000) The internet security glossary. http//www.ietf.org/rfc/rfc2828.txt
|
|
*** (2012) Zakon o informacionoj bezbednosti Republike Srbije − nacrt. http://www.digitalnaagenda.gov.rs/wpcontent/uploads/2012/01/ Nacrt_zakona_o_informacionoj_bezbednosti.pdf, dostupan 25. 1. 2012
|
|
Bayles, W. (2003) The ethics of computer network attack. http://www.totse.com/en/hack/legalities_of_hacking/excerpt4.html
|
2
|
Bodrožić, I. (2013) Krivična dela sa elementima visokotehnološkog kriminala. Bezbednost, Beograd, vol. 55, br. 2, str. 142-157
|
|
Council of Europe (2001) Convention on cybercrime. http://conventions.coe.int
|
18
|
Đorđević, I.Lj., Keković, Z. (2011) Koncept ljudske bezbednosti - alternativa ili nužnost. Bezbednost, Beograd, vol. 53, br. 2, str. 90-114
|
|
Federal Ministry of Interior (2011) Cyber security strategy for Germany. http://www.cio.bund.de/SharedDocs/Publikationen/DE/Strategische-Themen/css_engl_download.pdf?_blob=publicationFile
|
|
General Accounting Office (1998) Air traffic control: Weak computer security practices jeopardize flight safety. http://www.gao.gov/assets/230/225741.pdf
|
|
Gross, J. (2011) Enter the cyber-dragon. Vanity fair, http://www.vanityfair.com/culture/features/2011/09/chinese-hacking-201109
|
|
Hathaway, O., i dr. (2012) The law of cyber attack. California Law Review, http://www.law.yale.edu/documents/pdf/cglc/LawOfCyberAttack.pdf
|
|
Hersh, S. (2010) The online threat: Should we be worried about a cyber war?. The New Yorker, http://anniesearle.com/web-services/Documents/Newsletter%20News%20PDFs/Judging%20the%20cyber%20war%20terrorist%20threat.pdf
|
|
Hollis, D. (2007) Why states need an international law for information operations. Lewis & Clark Law Review, vol. 11, 1023-1042, http://law.lclark.edu/live/files/9551-lcb114art7hollis.pdf
|
|
Information Warfare Monitor (2009) Tracking GhostNet: Investigating a cyber espionage network. http://www.nartv.org/mirror/ghostnet.pdf
|
|
International Telecommunication Union (2009) Cybersecurity guide for developing countries. http://www.itu.int/ITU-D/cyb/publications/2009/cgdc-2009-e.pdf
|
|
Libicki, M. (1995) What is information warfare?. http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA367662
|
7
|
Marinković, N. (2007) Zamisao globalne bezbednosti - sa ili bez nacionalne. Bezbednost, Beograd, vol. 49, br. 4, str. 58-69
|
15
|
Mijalković, S. (2011) Obaveštajno-bezbednosne službe i nacionalna bezbednost. Bezbednost, Beograd, vol. 53, br. 1, str. 74-92
|
20
|
Mijalković, V.S. (2011) Nacionalna bezbednost. Beograd: Kriminalističko-policijska akademija
|
|
Milanović, Z., Radovanović, R. (2013) Digitalna forenzika u kontekstu zaštite informacionih sistema. Bezbednost, Beograd, vol. 55, br. 1, str. 61-83
|
|
Owens, W., i dr. (2009) Technology, policy, law, and ethics regarding U. S. acquisition and use of cyber attack capabilities. National Academy of Sciences, http://www.lawfareblog.com/wp-content/uploads/2013/01/NRC-Report.pdf
|
14
|
Petrović, L., Sinkovski, S. (2012) Korporativna bezbednost - osnove zaštite biznisa i preduzetništva. Bezbednost, Beograd, vol. 54, br. 3, str. 86-109
|
|
Reljanović, M. (2012) Krivično pravna zaštita elektronskih tajnih podataka. u: Pristup informacijama od javnog značaja i zaštita tajnih podataka, zbornik radova, Beograd: OEBS
|
1
|
Tanjević, N. (2012) Suzbijanje dečje pornografije na internetu - međunarodni i domaći krivičnopravni okvir. Bezbednost, Beograd, vol. 54, br. 2, str. 172-187
|
|
U.S.Department of Defense (2010-2011) Cyberspace operations lexicon: The vice chairman of joint chief of staff. http://www.nsci-va.org/CyberReferenceLib/2010-11.Joint%20Terminology%20for%20Cyberspace% 20Operations.pdf
|
|
United States Joint Forces Command (2003) Joint Forces Command Glossary. http://www.jfcom.mil/about/glossary.htm
|
|
|