On War In Anatol Rapoport. Harmondsworth: Penguin Books, 1982.
The Making of the Atomic Bomb . London: Simon & Schuster, 2012.
Hybrid War: Is the US Army Ready for the Face of 21st Cen¬tury Warfare In US Army Command and General Staff College., 2008.
Reflection on Future War." Naval War College Review 61, no. 3 (2008). "
All Glory Is Fleeting: Insights from the Se¬cond Lebanon War . Santa Monica, CA: RAND, 2012.
Hybrid Warfare and Challenges." Joint Force Quarterly 52 (2009): 34-48. "
Hybrid Wars: The 21st Century’s New Threats To Global Peace And Security." Scientia Militaria, South Afri¬can Journal of Military Studies 43, no. 1 (2015). "
Cyberwar is Coming!" Comparative Strategy 12, no. 2 (1993). "
Cyber War: The Next Threat to National Security And What To Do About It. New York: HarperCollins, 2010.
The Gray Zone." In White paper. Vol. 1., 2015. "
Towards the next Defence and Security Review: Part Two – NATO . London: House of Commons Defence Committee, 2014.
Hybrid Warfare: Fighting Complex Opponents from the Ancient World to the Present. Cambridge: Cambridge University Press, 2012.
The Future of the United Kingdom’s Nuclear Deterrent, December In Cm 6994. Vol. at 18., 2006.
"Tracking GhostNet: Investigating a Cyber Espionage Network." Information Warfare Monitor (2009).
National Security Strategy and Strategic Defence and Security Re-view 2015: A Secure and Prosperous United Kingdom." (2015): 40. "
Cyberspace and the Changing Nature of Warfare." In White paper pre¬sented at the 2008 Black Hat Conference, 7.0. "
Attributing Cyber Attacks." Journal of Strategic Studies 38 , no. 32 (2015). "
The Syrian Electronic Army Is Rewriting the Rules of War." The Conversation (2013). "
Syrian Electronic Army Turns on Assad Regime." Seczine: Security Magazine (2013). "
Fatal System Error: The Hunt for the New Crime Lords Who Are Bring¬ing Down the Internet . New York: Public Affairs, 2010.
Securing SCADA Infrastructure In White paper . Vol. 6. Sunnyvale, CA: Fortinet, 2010.
The Atlantic Charter., 2009.
NATO Chief: Cyber Can Trigger Article 5." Defense News (2015). "
Nation-State Cyber Strategies: Examples from China and Russia ." In Cyberpower and National Security, 477, 486. Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz ed. Dulles: Potomac Books, 2009. "