Salta gli elementi di navigazione
logo ridotto
CSSII Centro Universitario di Studi Strategici Internazionali e Imprenditoriali

Bibliografia fondamentale

  U. Gori, L. Martino (a cura di), Intelligence e Interesse NazionaleAracne editrice, 2015.




  Healey, A Fierce Domain: Conflict in Cyberspace, 1986 to 2012Cyber Conflict Studies Association, 2013.




  S. Foni, L. Pardini, Capire Internet. Dalle basi all'ingegneria. Aracne editore, 2016.




 Kurose, James F. & Ross, Keith W., Computer Networking: A Top-Down Approach (6th Edition)Pearson, 2012




M. Libicki, Conquest in Cyberspace. National Security and Information WarfareCambridge University Press, 2007




  M. Caligiuri, Cyber Intelligence. Tra libertà e sicurezza. Interventi Donzelli, 2016




 F. Kramer, S. Starr, L. Wentz, Cyberpower and National SecurityPotomac Books, 2009.




  P. Singer, A. Friedman, Cybersecurity and Cyberpower. What Everyone Needs to KnowOxford University Press, 2014




  L. Tabansky, I. Ben-Israel, Cybersecurity in Israel. Springer, 2015




 D. S. Reveron, Cyberspace and National Security. Threats, Opportunities and Power in a Virtual World.Georgetown University Press, 2012.




 D. J. Betz, T. Stevens, Cyberspace and the State. Toward a Strategy for Cyber-Power. IISS The Adelphi Series, 2011




 T. Rid, Cyber War Will Not Take Place. Oxford University Press, 2013.




  F. Kaplan, Dark Territory. The Secret History of Cyber WarSimon & Schuster, 2016.




 J. Arquilla, D. Ronfeldt, In Athena's Camp. Preparing for Conflict in the Information AgeRand Corporation, 1997.




  D. E. Denning, Information Warfare and SecurityAddison Wesley Professional, 1998.




  K. D. Mitnick, L'arte dell'hackingFeltrinelli editore, 2014




  K. D. Mitnick, W. L. Simons, L'arte dell'ingannoFeltrinelli editore, 2005.




  K. D. Mitnick, L'arte dell'intrusioneFeltrinelli editore, 2006.




  G. J. Rattray, Strategic Warfare in CyberspaceMit Wordpress, 2001.




  International Group of Experts at NATO CCDCOE, Tallin Manual 2.0 on the International Law Applicable to Cyber OperationsCambridge University Press, 2017.




  C. Stoll, The Cuckoo's Egg. Tracking a Spy Through the Maze of Computer Espionage. Doubleday, 2007




  B. Wittes, G. Blum, The Future of Violence, Robots and Germs, Hackers and DronesBasic Boks, 2014.




   B. Buchanan, The Cybersecurity Dilemma. Hacking, Trust and Fear Between NationsC. Hurst & Co. Publishers, 2017.

ultimo aggiornamento: 15-Giu-2017
Condividi su Facebook Twitter LinkedIn
Unifi Home Page Dipartimento di Scienze per l'Economia e l'Impresa Dipartimento di Scienze Politiche e Sociali

Inizio pagina