You are on page 1of 8

KYBERNETICK KRIMINALITA

285

Literatura
A01 A02 Ambro J.: Jak siln je nae softwarov policie?, server Lupa 2005, http://www. lupa.cz/clanek.php3?show=4154. Arkin O.: ICMP Usage in Scanning, The Sys-Security Group, September 2000, k dispozici na strnkch http://www.blackhat.com/presentations/bh-europe00/OfirArkin/OfirArkin2.pdf. Internetov strnky Business Software Aliance, http://www.bsa.cz. Pouwelse J.A., Garbacki P., Epema D.H.J., Sips H.J.: The Bittorrent P2P File-sharing System: Measurements and Analysis, in 4th International Workshop on Peer-to-Peer Systems (IPTPS05), Feb 2005. The BitTorrent P2P file-sharing system, k dispozici na internetov strnce http://www.theregister.co.uk/2004/12/18/bittorrent_measurements_analysis/. MPAA to serve lawsuits on BitTorrent servers, k dispozici na internetov strnce http://www.theregister.co.uk/2004/12/14/mpaa_vs_bittorrent/.

B01 B02

B03 B04

Literatura

Literatura

286

KYBERNETICK KRIMINALITA

B05 B06 B07

Finnish police raid BitTorrent site, k dispozici na internetov strnce http:// www.theregister.co.uk/2004/12/14/finnish_police_raid_bittorrent_site/. SuprNova.org ends, not with a bang but a whimper, k dispozici na strnkch http://www.theregister.co.uk/2004/12/19/suprnova_stops_torrents/. P2P Movie Pirate Arrested in Hong Kong in First Criminal Case Against Bittorrent User, k dispozici na internetov strnce http://www.mpaa.org/MPAAPress/2005/2005_01_19.doc. MPAA Takes New Action Against TV Show Thieves, k dispozici na internetov strnce http://www.mpaa.org/MPAAPress/2005/2005_05_12_BitTorrent.pdf. BitTorrent Facilitating Illegal File Swapping of Star Wars On Day of Opening , k dispozici na internetov strnce http://www.mpaa.org/MPAAPress/2005/ 2005_05_19.doc. Illegal Bittorrent Site That Carried Star Wars Is Shut Down, k dispozici na strnkch http://www.mpaa.org/MPAAPress/2005/2005_05_25b.doc. Justice departenment announces international internet piracy sweep, k dispozici na strnkch http://www.usdoj.gov/opa/pr/2004/April/04_crm_263.htm. Editor Prosecuted For Warez Crimes; Faces 6 Years, k dispozici na strnkch http://ve3d.ign.com/articles/594/594301p1.html?fromint=1. Bohek M.: Strun koment autorskho zkona pro SKIP a knihovny, VE Praha, Praha 2001. Brackney R.C., Anderson R.H. : Understanding the Insider Threat, Proceedings of a March 2004 Workshop, RAND Corporation, 2004. Berkowitz B.D: The New Face of War: How War Will Be Fought in the 21st Century, Free Press, March 18, 2003 . Bene A.: Test bezpenosti internetbankingu: zklamn, server penze.cz, 1. kvtna 2005. Analza aktuln rovn zajitn kybernetick bezpenosti esk republiky, Ministerstvo vnitra R, 2006. Castells, M.: The Informational City: Information Technology, Economic Restructuring, and the Urban-Regional Process, Basil Blackwel, Cambridge MA 1989. Internetov strnky www.computeraddiction.com. Cromie W. J.: Computer Addiction Is Coming On-line, Harvard Univesity Gazette, January 21, 1999. erve P.: Crackproof Your Software, No Starch Press 2002. Czarnota B., Hart R.J.: Legal protection of computer programs in Europe: a guide to the EC directive, Butterworths, 1991. Stty nezvldaj kyberdungli, zprva TK ze dne 20. z 2004. CSI/FBI Computer Crime and Security Survey 2002, Computer Security Institute, 2002. Computer Crime & Abuse Report (India) 2001-02, Asian School of Cyber Laws, March 2003.

B08 B09

B10 B11 B12 B13 B14 B15 B16 B17 C01

C02 C03 C04 C05 C06 C07 C08

Literatura

KYBERNETICK KRIMINALITA

287

C09

Committing to Security: A CompTIA Analysis of IT Security and the Workforce, Computing Technology Industry Association (CompTIA), March 2003, dostupn na strnkch www.comptia.org/research/files/summaries/ securitysummary031703.pdf. Collin B. : The Future of CyberTerrorism, Proceedings of 11th Annual International Symposium on Criminal Justice Issues, The University of Illinois, Chicago, 1996. Campbell D.: Inside Echelon - The history, structure und function of the global surveillance system known as Echelon, http://www.heise.de/tp/r4/artikel/6/6929/1.html.

C10

C11

C12 C13 D01

Campbell D.: Interception Capabilities 2000, Edinburgh, April 1999. Campbell D.: More Naked Gun than Top Gun, Guardian, 26. November 1997. Denning, D. E. : Cyberterorism Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S., House of Representatives, Georgetown University, May 23 2000, k dispozici na http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html. Informace uveejnn na strnkch http://www.defenselink.mil/news/Apr1998/t04161998_t0416asd.html. Information Warfare, DoD Directive TS- 3600.1, 21. December 1992. Delio M.: Hackers Crack Into MS Systm, Wired News 27. 10. 2000 http://www.wired.com/news/culture/1,39778-0.html. Damashek M.: Method of retrieving documents that concern the same topic, US Patent number 5418951, 23. May 1995. Kraden software? Kad tvrt profesionl se piznv., server E-architekt 2004, www.e-architekt.cz, www.ipsos-na.com. Directive 91/250/EEC of 5/14/91 on the legal protection of computer pro-gram, Brusel, kvten 1991. Directive 96/9/EC of the European Parliament and of the Council of 11 March on legal protection of databases, Official Journal L077, 27. 3. 1996, pp. 20-28. The Patentability of Computer.Implemented Ideas, Brusel 2000. Akn pln Evropsk unie eEurope+, Brusel, June 2001. Framework Directive 2002/21/EC, Brusel, 2002. EC Directive 2002/20/EC, Brusel, 2002. EC Directive 2002/19/EC, Brusel, 2002. EC Directive 1997/13/EC, Brusel, 1997. Creating a Safer Information Society by Improving the Security of Infor-mation Infrastructures and Combating Computer-related Crime, Brusel, 26. ledna 2001. Komunik ze setkn ministr vnitra a spravedlnosti G8, Washington DC, 10. December 1997. Recommendation No. R (89) 9 of the Commitee of Ministers to Member States on Computer Related Crime, Rada Evropy,13. September 1989.
Literatura

D02 D03 D04 D05 E01 E02 E03 E04 E05 E06 E07 E08 E09 E10 E11 E12

Literatura

288

KYBERNETICK KRIMINALITA

E13

Recommendation No. R (95) 13 of the Commitee of Ministers to Member States Concerning Problems of Criminal Procedural Law Connected with Information Technology, Rada Evropy, 11. September 1995. Convention on Cybercrime Rada Evropy, Budapest, 23. listopad 2001. Smrnice Evropskho parlamentu a Rady 95/46/ES, Lucemburk, jen 1995. Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data, Strassbourg, leden 1981. -: Echelon - Das globale Abhrnetzwerk, dostupn na strnkch http://kai.iks-jena.de/miniwahr/echelon-index.html. Featherstone M., Burrows R.: Cyberspace/Cyberbodies/Cyberpunk: Cultures of Technological Embodiment, SAGE Publications, London 1996. Featherstone, M.: Consumer Culture & Postmodernism, SAGE Publications; London 1994. Fogerty K., Marino E.L.: Chief Security Officers Speak Out about Biggist Security Risks, www.csoonline.com, January 21, 2003, dostupn na http://www.csoonline.com/releases/08290229_release.html. OS Identification Methods an Countermeasures, Foundstone Inc., August 2003. Gibson W.: Neuromancer, Laser Plze 1992; 1. angl. vyd. z roku 1984. Gibson W.: Burning Chrome, Harper Collins Publishers; London 1986. Gordon L. A., Loeb M. P., Lucyshyn W, Richardson R.: CSI/FBI Computer Crime and Security Survey 2006, Computer Security Institute, 2006. Ghosh N.: Indo-Pakistan Cyberwar a Battle in Ernest, The Straits Times. June 16, 2001. Herczeg J. : Meze svobody projevu, Orac, Praha 2004. Hun J.: Droga jmnem internet, Chip 7/2000. Internetov strnky www.hysteria.sk. Hartmanov D.: Prvn prava ochrany databz v nvrhu autorskho zkona, OSA Praha, Praha 2000. Howe M.: Ethiopians are Suspicious of Big U.S. Army Base, New York Times, Aug. 18, 1970. http://www.hanie.com/sam-thailand.htm. Hirsh M.: Wanted: Competent Big Brothers, Newsweek International Edition, Feb. 8, 2006. Harl: People Hacking: The Psychology of Social Engineering, Text of Harls Talk at Access All Areas III, March 7, 1997, k dispozici na strnkch http:// packetstormsecurity.nl/docs/social-engineering/aaatalk.html. Hlavek J.: trnct kraj a kriminalistick technika, Kriminalistick sbornk .5, Praha 2006. Ineternetov strnky www.internetworldstats.com. Internetov strnky http://www.snapshotspy.com/employee-computer-abuse-statistics.htm.

E14 E15 E16 E17 F01 F02 F03

F04 G01 G02 G03 G04 H01 H02 H03 H04 H05 H06 H07 H08

H09 I01 I02

Literatura

KYBERNETICK KRIMINALITA

289

I03 I04 I05 I06 I07 J01 J02 J03 J04 J04 J05

Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors, Software Engineering Institute, Carnegie Mellon University, 2005. Lev I.: E-Infitada: Political Disputes Cast Shadow in Cyberspace, Janes Intelligence Review, December 1, 2000. Ignatieff M.: Virtual War: Kosovo and Beyond, Picador (USA) 2001. Ze strnky http://www.robin-skate.estranky.cz/clanky/jak-zistit-heslo-e-mail-na-seznam__/jak-zistit-heslo-e-mail-na-seznam__. Ze strnky http://freshmeat.net/projects/icmpush/. Jones K.C.: A Rare Glimpse Into Richard Stallmans World, InterentWeek, Leden 06, 2006. Jirovsk V.: Principy pota, Matfyzpress, Praha 2000. Janczewski, L., Colarik, A. : Managerial Guide for Handling Cyber Terrorism. and Information Warfare, Idea Group USA, 2005. Jirovsk V. : Nebezpe kyberprostoru spolenost a kybernetick hrozby, Modern databze 2006, Komix, Praha 2006. Jirovsk V. Defacement graffiti or terrorist weapon, in Information Security Summit, Praha 2004. Jurek F.: Dekodr systmu rozpoznvn souvisl mluven ei s velkm slovnkem a s n-gramovm jazykovm modelem, Diplomov prce, Zpadoesk univerzita v Plzni, Fakulta aplikovanch vd, 2003.
Literatura

K01 K02 K03 K04 K05 L01 L02 L03 L04 M01

Kagan R. : Power and Weakness, Policy Review, No. 113, Hoover Institution, June/July 2002. Novotn O., Zapletal J. : Kriminologie, Eurolex Bohemia, Praha 2001. Kelley J.: Terror groups hide behind Web encryption, USA Today, 5. nora 2001. Katzensteiner T., Ruschmann D.: Antennen gedreht, Wirtschaftswoche Nr.46, 9 November 2000, str. 62-70. Klika D.: Netomnie, esej k pedmtu Kybernalita na Matematicko-fyzikln fakult Univerzity Karlovy, Praha 2004. Libicky M.: What is information warfare, National Defense University, August 1995. Lemos R.: Defacements rise in China hacker war, CNET News.com, April 30, 2001. -: Die Affre Lpez ist beendet, Wirtschaftsspiegel, 28 July 1998. Laurin F.: Secret Swedish E-Mail Can Be Read by the U.S.A, Calle Froste, Svenska Dagbladet, 18. November 1997. McCarron K.: Corpses, Animals, Machines and Mannequins: The Body and Cyberpunk, in Cyberspace/Cyberbodies/Cyberpunk: Cultures of Technological Embodiment, SAGE Publications, London 1996. The Mentor: The Conscience of a Hacker, Vol. 1, Issue 7, Phile 3, Phrack Inc. January 8, 1986, text je dostupn na internetov strnce www.mala.bc.ca/~soules/media112/hacker.htm.

M02

Literatura

290

KYBERNETICK KRIMINALITA

M03

Mogul R.: Danger Within Protecting your Company from Internal Security Attacks, www.csoonline.com, August 21, 2002, dostupn na http://www.csoonline.com/analyst/report400.html. Mao Ce-tung: On the Protracted War, Foreign Languages Press, Peking, 1954. Messmer, E.: Serb Supporters Sock it to NATO and U.S. Computers, Network World, 5. duben 1999. Maley R.: Case in Point: NT on the High Seas, Windows IT Pro Magazine, December 1997. Madsen W.: Crypto AG: The NSAs Trojan Whore?, k dispozici na strnkch http://mediafilter.org/caq/cryptogate/. Madsen W.: Puzzle palace conducting internet surveillance, Computer Fraud and Security Bulletin, June 1995. Mitnick K. D. & Simon W.L.: Umn klamu, Helion 2005. Medvedovsky I., Semjanov P., Leonov D., Lukacki A.: Internet attack, zone-h, 2002. Neuman P. G., Parker D. B.: A Summary of Computer Misuse Techniques, in Proceedings of th 12th National Computer Security Conference, October 1989, Baltimore, USA. Navrtilov J.: Kyberpunk v dle Williama Gibsona, diplomov prce, FSS MU, Brno 1998. Internetov strnky www.netaddiction.com. The New Hackers Dictionary na strnkch www.catb.org/~esr/jargon/html/index.html. Novotn O. a kol.: Trestn prvo hmotn, obecn st 1, ASPI, Praha 2003. Nastoupil R.: Trendy vojenstv potku ptho stolet a jejich vliv na vstavbu AR, na strnce http://www.army.cz/avis/vojenske_rozhledy/1998_2/nastoup.htm. NIPC Advisory (01-009) - Increased Internet Attacks Against U.S. Web Sites and Mail Servers Possible in Early May, April 26, 2001. ` la NSA : Au coeur des coutes amricaines, 1. 9. 2002 Ney J.P.: Visite exclusive a http://www.jpney.com/article.php3?id_article=105. Case No. 06-CV-10204 American Civil Liberties Union vers. National Security Agency, dostupn na strnkch http://www.icdc.com/~paulwolf/cointelpro/ACLUvNSA.pdf. NSA/CSS Classification Guide, NSA, 1. April 1983. Novotn F.: Trestn prvo hmotn, Nakladatelstv Ale enk, s.r.o. Pelhimov, 2004. Poster, M.: Postmodern Virtualities in Featherstone, Burrows 1996, pp. 79-95. Poster, M.: Cyberdemocracy: The Internet and the Public Sphere in Holmes 1997, pp. 212 228 (t http://www.hnet.uci.edu/mposter/writings/democ. html). Pibyl J., Kodl J.: Ochrana dat v informatice, Vydavatelstv VUT, Praha 1996. Pozor na vnitnho neptele, k dispozici na http://www.efocus.sk/focus/clanok.asp?id=141.

M04 M05 M06 M07 M07 M08 M09 N01

N02 N03 N04 N05 N06

N07 N08 N09

N10 N11 P01 P02

P03 P04

Literatura

KYBERNETICK KRIMINALITA

291

P05 P06

Peschl A.: Datensicherheit im Unternehmen...bringt Sie mit Sicherheit zum Erfolg Siemens Business Services, Siemens 2002. Psutka J., Ircing P., Psutka J., Haji J., Byrne W., Mrovsk J.: Automatic Transcription of Czech, Russian and Slovak Spontaneous Speech in the MALACH Project, In: Proceedings of Interspeech Lisboa 2005, s. 1349-1352. ISSN 10184074., 2005. Internetov strnky www.root.cz. Russinovichem M.: Sony, Rootkits and Digital Rights Management Gone Too Far, dostupn na http://www.sysinternals.com/blog/2005/10/sony-rootkits-and-digital-rights.html. Reason, J.: Managing the Risks of Organizational Accidents, Ashgate Publishing Company, Aldershot 1997. Rues R., Kunz, P.: Corporate Open Source Intelligence on the Internet, in European Conference on Information Warfare, University of Reading, 2003. ROI for the Automated Enterprise, Alinean Report, January 2004, dispozici na strnkch http://www.alinean.com/Newsletters/2004-1-Jan.asp. Rona T.P. : Weapons Systems and Information War, Boeing Aerospace Copany, 1976. Smejkal V., Sokol T., Vlek M.: Potaov prvo, C.H.Beck, Praha 1995. Suler, J.: Computer and Cyberspace Addiction, International Journal of Applied Psychoanalytic Studies, Vol. 1, pp. 359-362. Smirjak M.: Zabezpeen informanch systm finannho trhu, k dispozici na http://programovanie.pc.sk/bezpecnost/bezpecnost/clanok.ltc?ID=176. Shane S., Bowman T.: No Such Agency Part Four: Rigging the Game, The Baltimore Sun, December 4, 1995, pp. 9-11. Schtze A.: Wirtschaftsspionage: Was macht eigentlich die Konkurrenz?, Landesamt fr Verfassungsschutz Baden-Wrttemberg, 1998. Suler J.: The Psychology of Cyberspace, na strnkch www.rider.edu! Toft, B., Reynolds, S.: Learning from disasters: a management approach, Perpetuity Press, Leicester, 1997. The first Hacker World War... January 24, 2006, http://www.vitalsecurity.org/2006/01/first-hacker-world-war.html. Taleck G.: SYNSCAN: Towards Complete TCP/IP Fingerprinting, NFR Security, Inc., 2004. Taylor P.W : Governing Informatics, When digital government becomes digital governance, Center for Digital Government, December 2002. Attack from Internet, zone-h, 2004. International review of criminal policy United Nations Manual on the prevention and control of computer-related crime, 8th UN Congress, Havana, August-September 1990. 96/9/EC Interpretation Case Study: The British Horseracing Board Ltd and Others vs. William Hill Organization Ltd., UNC School of Law, 2006. Vysko J.: Manar a bezpenos informanho systmu organizcie, dizertan prca (PhD), Fakulta managementu UK Bratislava, Jl 2000.
Literatura

R01 R02

R03 R04 R05 R06 S01 S02 S03 S04 S05 S06 T01 T02 T03 T04 T05 U01

U02 V01

Literatura

292

KYBERNETICK KRIMINALITA

W01 W02 W03 W04 W05 W06 W07 W08 Z01 Z02 Z03 Z04

Wiener N.: Cybernetics: or the Control and Communication in the Animal and the Machine, M.I.T. Press 1948. Internetov strnky firmy Websense, www.websense.com. Warez je sport, Internet . 59, str. 14-20, 2001, elektronick verze nap. http:// jkd.euweb.cz/?xl=warez. Weinberg, G.M. : An Introduction to General System Thinking, Dorset House, New York, 1975. White House Website Attacked, BBC News, 5. kvten 2001. Pike J. : Echelon, k dispozici na strnkch http://www.fas.org/irp/program/ process/echelon.htm. Wright S.: An appraisal of technologies for political control, European Parliament, Directorate General for Research, 6. January 1998. Weill P.: Dont Just Lead, Govern!, MIT Sloan School of Management, April 2003. Listina zkladnch prv a svobod, stavn zkon . 2/1993 Sb. ve znn stavnho zkona . 162/1998 Sb. Trestn zkon, zkon . 140/1961 Sb. ve znn pozdjch pedpis Zkon o trestnm zen soudnm (trestn d), zkon . 141/1961 Sb. ve znn pozdjch pedpis. Zkon o znalcch a tlumoncch, zkon . 36/1967 Sb. ve znn pozdjch pedpis.

Literatura

You might also like