Bibliography
- Baker , Stewart , Shaun , Waterman and George , Ivanov . 2010 . In the Crossfire: Critical Infrastructure in the Age of Cyber War , Santa Clara , CA : McAfee .
- Baldor , Lolita. 2010 . ‘US largely ruling out N. Korea in 2009 cyberattacks’ . Associated Press , 3 July
- Blainey , Geoffrey . 1988 . The Causes of War, , 3rd ed. , New York : Simon and Schuster .
- Broad , William J. 2011 . ‘Stuxnet worm used against Iran was tested in Israel’ . New York Times , 15 Jan
- Brodie , Bernard. 1946 . The Absolute Weapon: Atomic Power and World Order , New York : Ayer .
- Clarke , Richard and Robert , Knake . 2010 . Cyber War: The Next Threat to National Security and What to Do About It , New York: Ecco
- Clausewitz , Carl von . 1982 . On War , Harmondsworth , , UK : Penguin .
- Courville , Lt. Col. and Shane , P. 2007 . Air Force and the Cyberspace Mission: Defending the Air Force’s Computer Network in the Future . Occasional Paper, Maxwell Air Force Base, Alabama: Air War College, Center for Strategy and Technology . December 2007 .
- Derene , Glenn . ‘The Coming Cyberwar: Inside the Pentagon's Plan to Fight Back’ . Popularmechanics.com , nd, <www.popularmechanics.com/technology/military/4277463>
- Falliere , Nicolas . 2011 . W32.Stuxnet Dossier , CA : Symantec Security Response . <www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf>
- Fearon , James D. 1995 . ‘Rationalist Explanations for War’ . International Organization , 49/3 Summer : 379 – 414 .
- Fulghum , David A. 2007 . ‘Israel shows electronic prowess’ . Aviation Week & Space Technology , 25 Nov
- Hayes , Richard and Gary , Wheatley . 1996 . Information Warfare and Deterrence. NDU Press Book , Washington , DC : National Defense University .
- Jervis , Robert . 1978 . ‘Cooperation Under the Security Dilemma’ . World Politics , 30/2 Jan : 167 – 214 .
- Jervis , Robert . 1990 . The Meaning of the Nuclear Revolution: Statecraft and the Prospect of Armageddon , Ithaca , NY : Cornell UP .
- JP 1-02, DOD Dictionary of Military and Associated Terms, US Department of Defense, April 2010, <www.dtic.mil/doctrine/dod_dictionary/>
- Kramer, Franklin, Stuart Starr and Larry Wentz (eds), Cyberpower and National Security (Dulles, VA: Potomac Books 2009)
- Krepinevich , Andrew . 2009 . ‘The Pentagon's Wasting Assets’ . Foreign Affairs , 88/4 Aug : 18 – 33 .
- Kugler , Richard . ‘Deterrence of Cyber Attacks’, in Franklin Kramer, Stuart Starr and Larry Wentz (eds) . Cyberpower and National Security (Dulles, VA: Potomac Books 2009) , 317 – 20 .
- Lachow , Irving . ‘Cyber Terrorism: Menace or Myth’, in Franklin Kramer, Stuart Starr and Larry Wentz (eds) . Cyberpower and National Security (Dulles, VA: Potomac Books 2009) , 441 – 8 .
- Lewis , James . 2010 . ‘A Note on the Laws of War in Cyberspace’, CSIS . 25 April <http://csis.org/publication/note-laws-war-cyberspace>
- Lewis , James . 2010 . ‘Cross-Domain Deterrence and Credible Threats’, CSIS . July
- Libicki , Martin . 2009 . Cyberdeterrence and Cyberwar , Santa Monica, CA : RAND Corporation .
- Lord, Kristin M., and Travis Sharp (eds) America’s Cyber Future: Security and Prosperity in the Information Age (CNAS 2011), <www.cnas.org/node/6405>
- McCullough , Vice Admiral Bernard . 2010 . ‘Positioning the Navy for Cyber Warfare: US Fleet Cyber Command’, Center for Strategic and International Studies . 5 April <http://csis.org/event/cyber-warfare>
- Northrop Grumman Corporation, Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. Prepared for US–China Economic and Security Review Commission, 16 Oct. 2009
- Rattray , Gregory . 2001 . Strategic Warfare in Cyberspace , Cambridge , MA : MIT Press .
- Rid , Thomas . ‘Cyber War Will Not Take Place’ . Journal of Strategic Studies , 35/1 (Feb. 2012) 5 – 32 . <www.tandfonline.com/doi/abs/10.1080/01402390.2011.608939>
- Schelling , Thomas . 1966 . Arms and Influence , New Haven, CT : Yale UP .
- Sharma , Amit . 2010 . ‘Cyber Wars: A Paradigm Shift from Means to Ends’ . Strategic Analysis , 34/1 : 62
- Snyder , Glenn . 1961 . Deterrence and Defense: Toward a Theory of National Security Princeton , UP
- The White House . 2009 . ‘Remarks by the President on Securing Our Nation's Cyber Infrastructure’ . 29 May <www.whitehouse.gov/the_press_office/Remarks-by-the-President-on-Securing-Our-Nations-Cyber-Infrastructure/>
- Thomas , Timothy . 2001 . Testimony Before the US–China Commission (Transcript) . <www.uscc.gov/textonly/transcriptstx/testho.htm>
- US Department of Defense, Quadrennial Defense Review (QDR) Report, Feb. 2010
- Van Evera , Stephen . 1984 . ‘The Cult of the Offensive and the Origins of the First World War’ . International Security , 9/1 Summer : 58 – 107 .
- Van Tol , Jan . AirSea Battle: A Point-of-Departure Operational Concept (Center for Strategic and Budgetary Assessments 2010)
- Zetter , Kim . 2009 . ‘Lawmaker wants ‘show of force’ against North Korea for website attacks’ . Wired.com , 10 July