on Clausewitz, Carl. On War In Anatol Rapoport. Harmondsworth: Penguin Books, 1982.
Rhodes, Richard. The Making of the Atomic Bomb . London: Simon & Schuster, 2012.
Rid, Thomas. Cyber War Will Not Take Place . London: Hurst, 2013.
Jordan, Larry R.. Hybrid War: Is the US Army Ready for the Face of 21st Cen¬tury Warfare In US Army Command and General Staff College., 2008.
Owens, Mackubin Thomas. "Reflection on Future War." Naval War College Review 61, no. 3 (2008).
Glenn, Russell W.. All Glory Is Fleeting: Insights from the Se¬cond Lebanon War . Santa Monica, CA: RAND, 2012.
Hoffn, Frankma G.. "Hybrid Warfare and Challenges." Joint Force Quarterly 52 (2009): 34-48.
Bachmann, Sascha-Dominik, and Hakan Gunneriussan. "Hybrid Wars: The 21st Century’s New Threats To Global Peace And Security." Scientia Militaria, South Afri¬can Journal of Military Studies 43, no. 1 (2015).
Arquilla, John, and David Ronfeldt. "Cyberwar is Coming!" Comparative Strategy 12, no. 2 (1993).
Clark, Richard, and Robert Knake. Cyber War: The Next Threat to National Security And What To Do About It. New York: HarperCollins, 2010.
Rid, Thomas. Cyber War Will Not Take Place . London: Hurst, 2013.
Vandiver, John. Breedlove: NATO Must Redefine Responses to Unconventional Threats, Stars and Stripes., 2014.
Apps, Peter. Ambiguous Warfare’ Providing NATO with New Challenges, Reuters., 2014.
Command, United States Spe. "The Gray Zone." In White paper. Vol. 1., 2015.
Committee, House of Commons. Towards the next Defence and Security Review: Part Two – NATO . London: House of Commons Defence Committee, 2014.
Murray, Williamson, and Peter R. Mansoor. Hybrid Warfare: Fighting Complex Opponents from the Ancient World to the Present. Cambridge: Cambridge University Press, 2012.
Government, HM. The Future of the United Kingdom’s Nuclear Deterrent, December In Cm 6994. Vol. at 18., 2006.
Gehlbach, Scott. "Reflections on Putin and the Media." Post-Soviet Affairs 26, no. 1 (2010): 77-87.
Rid, Thomas. Cyber War Will Not Take Place . London: Hurst, 2013.
"Tracking GhostNet: Investigating a Cyber Espionage Network." Information Warfare Monitor (2009).
Government, HM. "National Security Strategy and Strategic Defence and Security Re-view 2015: A Secure and Prosperous United Kingdom." (2015): 40.
Geers, Kenneth. "Cyberspace and the Changing Nature of Warfare." In White paper pre¬sented at the 2008 Black Hat Conference, 7.0.
Rid, Thomas, and Ben Buchanan. "Attributing Cyber Attacks." Journal of Strategic Studies 38 , no. 32 (2015).
Fitton, Oliver, and Mark Lacy. "The Syrian Electronic Army Is Rewriting the Rules of War." The Conversation (2013).
Jones, Adam. "Syrian Electronic Army Turns on Assad Regime." Seczine: Security Magazine (2013).
Menn, Joseph. Fatal System Error: The Hunt for the New Crime Lords Who Are Bring¬ing Down the Internet . New York: Public Affairs, 2010.
. Securing SCADA Infrastructure In White paper . Vol. 6. Sunnyvale, CA: Fortinet, 2010.
The Atlantic Charter., 2009.
McLeary, Paul. "NATO Chief: Cyber Can Trigger Article 5." Defense News (2015).
Thomas, Timothy L.. "Nation-State Cyber Strategies: Examples from China and Russia ." In Cyberpower and National Security, 477, 486. Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz ed. Dulles: Potomac Books, 2009.
Gehlbach, Scott. "Reflections on Putin and the Media." Post-Soviet Affairs 26, no. 1 (2010): 77-87.