Книга Эпоха открытий. Возможности и угрозы второго Ренессанса, страница 102. Автор книги Йен Голдин, Крис Кутарна

Разделитель для чтения книг в онлайн библиотеке

Онлайн книга «Эпоха открытий. Возможности и угрозы второго Ренессанса»

Cтраница 102

65. For more on the Thailand case, see Goldin, Ian and Mike Mariathasan (2014), The Butterfly Defect. Princeton, NJ: Princeton University Press.

66. Chongvilaivan, Aekapol (2012). “Thailand’s 2011 Flooding: Its Impact on Direct Exports and Global Supply Chains” // ARTNeT Working Paper Series, No. 113. По материалам hdl.handle.net/10419/64271.

67. Thailand Board of Investment (2012). “Expertise, New Investment Keep Thai E&E Industry at the Top” // Thailand Investment Review. По материалам www.boi.go.th.

68. Abe, Masato and Linghe Ye (2013). “Building Resilient Supply Chains against Natural Disasters: The Cases of Japan and Thailand” // Global Business Review 14: 567.

69. Ibid.

70. Smalley, Eric (2011, December 12). “Thai Floodwaters Sink Intel Chip Orders” // Wired. По материалам www.wired.com.

71. Thailand Board of Investment (2015). “E&E Industry: Hard Disk Drive Export, 2005–2014” // Thailand Investment Review. По материалам www.boi.go.th.

72. Oxford Economics (2010). The Economic Impacts of Air Travel Restrictions Due to Volcanic Ash, Report Prepared for Airbus. Oxford: Oxford Economics.

73. Kaplan, Eben (2007, April 24). “America’s Vulnerable Energy Grid” // Council on Foreign Relations.

74. US – Canada Power System Outage Task Force (2004). Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations. Washington, D.C. and Ottawa: Department of Energy and Ministry of Natural Resources. Р. 19.

75. Kharas, Homi (2015, January 9). “The Transition from ‘the Developing World’ to ‘a Developing World.’” // Kapuscinski Development Lectures. По материалам www.brookings.edu.

76. Airports Council International (2015). “Annual Traffic Data”. По материалам www.aci.aero/DataCentre/Annual-Traffic-Data.

77. World Shipping Council (2015). “Top 50 World Container Ports”. По материалам www.worldshipping.org/about-the-industry/global-trade.

78. EMC Corporation (2014, December 2). “Over $ 1.7 Trillion Lost per Year from Data Loss and Downtime According to Global IT Study”. По материалам uk.emc.com/about/news/press/2014/20141202–01.htm.

79. Miller, Rich (2013, July). “Who Has the Most Data Servers?” // Data Center Knowledge. По материалам www.datacenterknowledge.com/archives/2009/05/14/whos-got-the-most-web-servers.

80. IBM (2015). 2015 Cyber Security Intelligence Index. New York: IBM Security. По материалам public.dhe.ibm.com/common/ssi/ecm/se/en/sew03073usen/SEW03073USEN.PDF.

81. Greenberg, Andy (2015). “Hackers Remotely Kill a Jeep on the Highway – with Me in It” // Wired. С сайта www.youtube.com.

82. Symantec (2015). 2015 Internet Security Threat Report, Volume 20. Mountain View, CA: Symantec. По материалам www.symantec.com/security_response/publications/threatreport.jsp.

83. Rogin, Josh (2012, July 9). “NSA Chief: Cybercrime Constitutes the ‘Greatest Transfer of Wealth in History.’” // Foreign Policy. По материалам www.foreignpolicy.com.

84. Ibid.; IBM (2015). 2015 Cyber Security Intelligence Index. New York: IBM Security. По материалам public.dhe.ibm.com/common/ssi/ecm/se/en/sew03073usen/SEW03073USEN.PDF.

85. Rainie, Lee, Janna Anderson, et al. (2014, 29 October). “Cyber Attacks Likely to Increase” // Pew Research Center. По материалам www.pewinternet.org.

86. Ponemon Institute (2015). 2015 Cost of Data Breach Study: Global Analysis. Traverse City, MI: Ponemon Institute.

87. Associated Press (2015, September 23). “US Government Hack Stole Fingerprints of 5.6 Million Federal Employees” // The Guardian. По материалам www.theguardian.com.

88. Symantec (2015). 2015 Internet Security Threat Report. Volume 20. Mountain View, CA: Symantec. По материалам www.symantec.com/security_response/publications/threatreport.jsp

89. Kushner, David (2013, February 26). “The Real Story of Stuxnet” // IEEE Spectrum. По материалам spectrum.ieee.org/telecom/security.

90. Menn, Joseph (2015, May 29). “US Tried Stuxnet-Style Campaign against North Korea but Failed – Sources” // Reuters. По материалам www.reuters.com.

91. Bundesamt fur Sicherheit in der Informationstechnik (2014). Die Lage Der IT-Sicherheit in Deutschland 2014. Berlin: German Federal Office for Information Security. По материалам www.bsi.bund.de.

92. Industrial Control Systems Cyber Emergency Response Team (2015). ICS-CERT Year in Review. Washington, D.C.: Department of Homeland Security. По материалам ics-cert.us-cert.gov.

93. Maddison, Angus (2003). The World Economy: Historical Statistics, Vol. 2: Statistical Appendix. Paris: OECD.

7. Костры и сопричастность

1. Savonarola, Girolamo (1452–1498) (1971). “O Soul, by Sin Made Blind” // In Italian Poets of the Renaissance, edited by J. Tusiani. New York: Baroque Press. Р. 81.

2. Weinstein, Donald (2011). Savonarola: The Rise and Fall of a Renaissance Prophet. New Haven, CT: Yale University Press.

3. Cameron, Euan (2012). The European Reformation. Oxford: Oxford University Press.

4. Weinstein, Donald (2011). Savonarola: The Rise and Fall of a Renaissance Prophet. New Haven, CT: Yale University Press.

5. Ibid.

6. Viladesau, Richard (2008). The Triumph of the Cross: The Passion of Christ in Theology and the Arts. Oxford: Oxford University Press. Р. 30.

7. Jones, Jonathan (2011, October 19). “The Lusts of Leonardo Da Vinci” // The Guardian. По материалам www.theguardian.com.

Вход
Поиск по сайту
Ищем:
Календарь
Навигация