1J. Markoff.New technology to make digital data self-destruct[].The New York Times July.202009
2.Targeting U.S Technologies2012:A Trend Analysis ofReporting from Defense Industry[]..2012
3Josh Rogin.'NSA Chief:Cybercrime Constitutes the’’GreatestTransfer of Wealth in History’’'. http://thecable.foreignpolicy.com/posts/2012/07/09/nsa_chief_cybercrime_constitutes_the_greatest_transfer_of_wealth_in_history . 2013
4William J.Lynn,III.'Remarks on Cyber'. http://www.defense.gov/speeches/speech.aspx?speechid=1535 . 2013
5.Strategy for Operations in Cyberspace[]..2011
6Eric M.Hutchins,Michael J.Cloppert,Rohan M.Amin.'Intelligence-Driven Computer Network Defense Informed by Analysis ofAdversary Campaigns and Intrusion Kill Chains'. http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf . 2013
7The Application of Computer Investigation and AnalysisTechniques to Gather Evidence Suitable for Presentation in a Court ofLaw. http://searchsecurity.techtarget.com/definition/computer-forensics . 2013
8Information Warfare Monitor and Shadowserver Foundation.'Shadows in the Cloud:Investigating Cyber Espionage2.0'. http://www.scribd.com/doc/29435784/SHADOWS-IN-THE-CLOUD-Investigating-Cyber-Espionage-2-0 . 2013
9Michael Daniel."Outreach and Policy Discussions at the RSAConference"[]..2013
10.Improving Critical Infrastructure Cybersecurity[].Executive Order on ImprovingCritical Infrastructure Cybersecurity(EO).2013
3Jon W. Beard. Management of Technology: A Three- Dimensional FramewOrk with Propositions for Future Research [J]. Knowledge, Technology, g~ Policy, Fall 2002,15,(3) .. 45-57.
4Keith Pavitt. Technology, Management and Systems of Innovation [J]. Edward Elgar,2012 : 33-36.
5Wheel White, Steven G and Clark Kim B. Revolutionizing Product DevelopmentffM'3. New York: The Free Press, 2012: 15-17.