Background Image
Previous Page  202 / 441 Next Page
Information
Show Menu
Previous Page 202 / 441 Next Page
Page Background

TBB Dergisi 2013 (104)

Mehmet YAYLA

201

Muammer Ketizmen,

Türk Ceza Hukukunda Bilişim Suçları,

Ankara Üniversitesi Sosyal

Bilimler Enstitüsü Kamu Hukuku Anabilim Dalı Doktora Tezi, Ankara, 2006

Nafi Kaşıkçıoğlu,

“Elektronik Harp”

,

Siber Savunma Sempozyumu

, Askeri Müze ve Kül-

tür Sitesi Komutanlığı, Harbiye, İstanbul, 24-25 Mayıs 2011.

Norbert Wiener,

Cybernetics: Or Control and Communication in the Animal and the Machi-

ne.

Paris, (Hermann & Cie) & Camb. Mass., 1948.

Olaf Theiler,

“Yeni

Tehditler:Siber

Boyut”

,

NATO Dergisi On Yıl Sonra Alınan Dersler

,

http://www.nato.int/docu/review/2011/11-september/Cyber-Threads/TR/

index.htm, erişim tarihi: 3.11.2012.

Oxford Dictionaries,

http://oxforddictionaries.com/definition/american_english/

cyberwar?region=us&q=cyber+war, erişim tarihi:11.11.2012.

Resuhi Akdikmen, Langenscheıdt Standart Sözlüğü, İnkilap Kitapevi, İstanbul, 1992.

Rich Gibson, Schuyler Erle,

Google Maps Hack

, U.S.A., O’Reily Media Inc., 2006.

Richard A. Clarke, Robert K. Knake.

Cyber War : The Next Threat to National Security and

What to do About It

(1. Baskı), New York, 2010.

Ronald Deibert,

“Tracking the Emerging Arms Race in Cyberspace”

,

Bulletin of the Atomic

Scientists

, January/February 2011, 67 s.1-8.

Ryan Singel,

“White House Cyber Czar:’There is no Cyber War”

,

Wired

, 3.4.2010, http://

www.wired.com/threatlevel/2010/03/schmidt-cyberwar/

,

erişim

tarihi:

10.11.2012.

Sarah Gordon, Richard Ford,

“On the Definition and Classification of Cybercrime”

,

J. Com-

puter Virology

, no:1, 2006, s.13-20.

Seha L. Meray,

Devletler Hukukuna Giriş

, Ankara Üniversitesi Siyasal Bilgiler Fakültesi

Yayınları, 1962.

Serge Krasavin,

“What is Cyber Terrorism?”

,

http://www.crime-research.org/library/

Cyber- terrorism.htm, erişim tarihi:4.11.2012.

Shane M. Coughlan, Is There a Common Understanding of What Constitutes Cyber

Warfare?, (Yayımlanmamış Yüksek Lisans Tezi), The University of Birmingham

2003.

http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.102.1876&rep

=rep1&type=pdf, erişim tarihi: 15.05.2012.

Shitanshu Mishra,

“Network Centric Warfare in the Context of Operation Iraqi Freedom”

Strategic Analysis

, V.27, I.4, s.546-547.

http://www.idsa.in/strategicanalysis/

NetworkCentricWarfareintheContextofOperationIraqiFreedom_smishra_1003,

erişim tarihi:5.11.2012.

Sylvia Mercado Kierkegaard,

“International Cybercrime Convention”

,

http://www.igi-

global.com/viewtitlesample.aspx?id=7486, erişim tarihi:2.11.2011.

Thomas C.Wingfield,

The Law of Information Conflict: National Security Law in Cyberspa-

ce

, Aegis Research Corp., 2000.

Thomas Rid,

“Cyber War Will Not Take Place In”

,

Strategic Studies

, Volume 35, Issue 1,

2012, s.5-32.