Bibliography

Bibliography

Bibliography of cyber war related references.

Alberts, David S., and Thomas J. Czerwinski, eds. Complexity, Global Politics, and National Security. Honolulu, HI: University Press of the Pacific, 2002.

Alexander, Keith, Lieutenant Genera, USA. “Statement for the Record, Commander, Joint Functional Component Command for Network Warfare.” Before the House Armed Services Committee, Terrorism, Unconventional Threats, and Capabilities Subcommittee, Washington, DC, 5 May 2009. http://www.nsa.gov/public_info/speeches_testimonies/5may09_dir.shtml (accessed December 30, 2011).

——— “Statement For the Record, Commander, US Cyber Command.” Before the House Armed Services Committee, Washington, DC, 23 September 2010. http://www.defense.gov/home/features/2010/0410_cybersec/docs/USCC%20Command%20Posture%20Statement_HASC_22SEP10_FINAL%20_OMB%20Approved_.pdf (accessed December 30, 2011).

Allen, Patrick D., and Dennis P. Gilbert. “The Information Sphere Domain Increasing Understanding and Cooperation.” NATO Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia. http://www.ccdcoe.org/publications/virtualbattlefield/09_GILBERT%20InfoSphere.pdf (accessed January 9, 2012).

Anderson, Ross J. Security Engineering: a Guide to Building Dependable Distributed Systems. New York: Wiley, 2001.

Anonymous. Handbook for Volunteers of the Irish Republican Army: Notes on Guerrilla Warfare. Boulder, CO: Paladin Press, 1996.

Arquilla, John, David Ronfeldt, and editors. In Athena’s Camp: Preparing For Conflict in the Information Age. New York: Rand Corporation, 1997.

Asprey, Robert B. War in the Shadows: The Guerrilla in History. 2nd ed. London: William Morrow & Co., Inc., 1994.

Aucsmith, David. “Rethinking Cyber Defense.” High Frontier 7, no. 3 (May 2011): 35-37.

Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues in Computing and Internet. 2nd ed. New York: Prentice Hall, 2003.

Barnett, Thomas P. M. “The Seven Deadly Sins of Network-Centric Warfare.” U.S. Naval Institute Proceedings 125, no. 1 (January 1999): 36-9.

Beggs, Christopher. Safeguarding Infrastructure Assets from Cyber-Terrorism: Measuring and Protecting SCADA Systems from Cyber-Terrorists in Australia. Berlin: Lambert Academic Publishing, 2010.

Berkowitz, Bruce. The New Face of War: How War Will Be Fought in the 21st Century. New York: Free Press, 2003.

Betz, David J. “The More You Know, the Less You Understand: The Problem with Information Warfare.” The Journal of Strategic Studies 29, no. 3 (June 2006): 505-33.

Beyerchen, Alan. “Clausewitz, Nonlinearity, and the Unpredictability of War.” International Security 17, no. 3 (Winter 1992-1993): 59-90.

Blaker, James R. Transforming Military Force: the Legacy of Arthur Cebrowski and Network Centric Warfare. Westport, CT.: Praeger, 2007.

Brodie, Bernard. Strategy in the Missile Age. 1959. Reprint, New Haven, CT.: Rand Publishing, 2007.

Çambel, A.B. Applied Chaos Theory: a Paradigm For Complexity. Boston: Academic Press, 1993.

Cebrowski, Arthur K., Vice Admiral, USN. “Network-Centric Warfare: An Emerging Response to the Information Age.” Military Technology 27, no. 5 (May 2003): 16-22.

——— and Thomas P. M. Barnett. “The American Way of War.” U.S. Naval Institute Proceedings 129, no. 1 (January 2003): 42-44.

——— and John H. Garstka. “Network-Centric Warfare – Its Origin and Future.” U.S. Naval Institute Proceedings 124, no. 1 (Jan 1998): 139.

Chadwick, Andrew. Internet Politics: States, Citizens, and New Communication Technologies. New York: Oxford University Press, USA, 2006.

Clausewitz, Carl von. On War. 1St Edition ed. Translated by Michael Howard and Peter Paret. Princeton, NJ: Princeton University Press, 1989.

Colarik, Andrew Michael. Cyber Terrorism: Political and Economic Implications. Hershey, PA.: IGI Global, 2006.

Corbett, Sir Julian. Some Principles of Maritime Strategy. Annapolis, MD: United States Naval Inst., 1988.

Coveney, Peter, and Roger Highfield. Frontiers of Complexity: the Search For Order in a Chaotic World. Redmond, WA: Fawcett, 1995.

Czerwinski, Tom. Coping with the Bounds: Speculations On Nonlinearity in Military Affairs. Washington, D.C.: Natl Defense Univ Pr, 1998.

Dahl, Erik J., Commander, USN. “Network-Centric Warfare and the Death of Operational Art.” Defence Studies 2, no. 1 (Spring 2002): 1-24.

DeBlois, Bruce M., Richard L. Garwin, R. Scott Kemp, and Jeremy C. Marwell. “Space Weapons: Crossing the U.S. Rubicon.” International Security 29, no. 2 (Autumn 2004): 50-84.

Department of Defense. Department of Defense Dictionary of Military and Associated Terms: Joint Publication 1-02 (as Amended through 15 May 2011). Washington, DC: U.S. Government Printing Office, 2011.

——— Office of Force Transformation. The Implementation of Network-Centric Warfare. Washington, DC: Department of Defense, 2005.

——— Trusted Computer Security Evaluation Criteria – DOD 5200.28-Std. Washington, DC: Department of Defense, 1983.

——— “USSTRATCOM Space Control and Space Surveillance.” USSTRATCOM. http://www.stratcom.mil/USSTRATCOM_Space_Control_and_Space_Surveillance (accessed January 9, 2012).

Derian, James Der. “Virtuous War/virtual Theory.” International Affairs 76, no. 4 (October 2000): 771-88.

Douhet, Giulio. The Command of the Air. Edited by Joseph Patrick Harahan and Richard H. Kohn. Tuscaloosa, AL.: University Alabama Press, 2009.

Echevarria, Autulio J. “Clausewitz’s Center of Gravity: It’s Not What We Thought.” Naval War College Review (Winter 2003): 108-23.

The Economist. Cyberwar. July 1, 2010. http://www.economist.com/node/16481504?story_id=16481504&source=features_box1 (accessed January 7, 2012).

——— War in the Fifth Domain. July 1, 2010. http://www.economist.com/node/16478792 (accessed January 7, 2012).

Ellis, John. A Short History of Guerrilla Warfare. New York: St. Martin’s Press, 1976.

Ellison, Carl. “Ceremony Design and Analysis.” Paper presented at Rump Session of Crypto 2005 Conference, Santa Barbara, CA, August 14-18, 2005. http://eprint.iacr.org/2007/399.pdf (accessed March 2, 2012).

Feguson, R. Brian. “A Paradigm for the Study of War and Society.” In War and Society in the Ancient and Medieval Worlds: Asia, The Mediterranean, Europe, and Mesoamerica (Center For Hellenic Studies Colloquia), edited by Kurt A. Raaflaub and Nathan Rosenstein, 389-437. Washington, DC: Center for Hellenic Studies, 2001.

Galula, David. Counterinsurgency Warfare: Theory and Practice. Westport, CT: Praeger, 2006.

Ganor, Boaz. The Counter-Terrorism Puzzle: A Guide For Decision Makers. London: Transaction Publishers, 2007.

Gat, Azar. A History of Military Thought: from the Enlightenment to the Cold War. Oxford: Oxford University Press, 2002.

Gates, Robert M. “Quadrennial Roles and Missions Review Report, Department of Defense.” Report to Congress, Washington, DC, January 2009. http://www.defenselink.mil/news/Jan2009/QRMFinalReport_v26Jan.pdf (accessed May 22, 2012).

Geers, Kenneth. “Cyber Weapons Convention.” Computer Law and Security Review 26, no. 5 (September 2010): 547-51.

——— “The Challenge of Cyber Attack Deterrence.” Computer Law and Security Review 26, no. 3 (May 2010): 298-303.

Gompert, David C., Irving Lachow, and Justin Perkins. Battle-Wise: Seeking Time-Information Superiority in Networked Warfare. Washington, DC: National Defense University, 2006.

Gray, Colin S. Modern Strategy. New York: Oxford University Press, 1999.

Green, Leslie C. Contemporary Law of Armed Conflict (Melland Schill Studies). 3rd Revised edition ed. Manchester: Manchester University Press, 2008.

Grenier, John. The First Way of War: American War Making On the Frontier, 1607-1814. New York: Cambridge University Press, 2005.

Guderian, Heinz. Achtung-Panzer!: the Development of Tank Warfare. London: Cassell, 1999.

Guevara, Ernesto Che. Guerrilla Warfare. New York: bnpublishing.com, 2007.

Guha, Manabrata. Reimagining War in the 21st Century: from Clausewitz to Network-Centric Warfare. New York: Routledge, 2011.

Hall, Wayne Michael. Stray Voltage: War in the Information Age. Annapolis, MD: US Naval Institute Press, 2003.

Hammes, Thomas X. “The Evolution of War: The Fourth Generation.” Marine Corps Gazette (September 1994).

——— The Sling and the Stone: On War in the 21st Century. Minneapolis, MN: Zenith Press, 2006.

Hanson, Victor. Carnage and Culture: Landmark Battles in the Rise to Western Power. New York: Anchor, 2002.

Harris, Brice F. America, Technology and Strategic Culture: a Clausewitzian Assessment. New York: Routledge, 2009.

Herodotus. The Landmark Herodotus: The Histories. Edited by Robert B. Strassler. Translated by Andrea L. Purvis. New York: Pantheon, 2007.

Holmes, Terence M. “Planning Versus Chaos in Clausewitz’s On War.” The Journal of Strategic Studies 30, no. 1 (February 2007): 129-51.

Howard, Michael, and David LeBlanc. Writing Secure Code. 2nd ed. Redmond, Wash.: Microsoft Press, 2003.

Howard, Michael, George J. Andreopoulos, and Mark R. Shulman, eds. The Laws of War: Constraints on Warfare in the Western World. New Haven, CT: Yale University Press, 1997.

Hubbard, Douglas W. How to Measure Anything: Finding the Value of ‘Intangibles’ in Business. 2nd ed. Hoboken, N.J.: Wiley, 2010.

Huitema, Christian. Routing in the Internet. 2nd ed. Upper Saddle River, NJ: Prentice Hall, 2000.

Hyberg, Per. “Network-Centric Warfare and Information Theory.” Journal of Electronic Defense 28, no. 12 (December 2005): 49-54.

Jasper, Scott, ed. Securing Freedom in the Global Commons. Stanford, CA: Stanford Security Studies, 2010.

Joes, Anthony James. Urban Guerrilla Warfare. Lexington: The University Press of Kentucky, 2007.

Johnsen, William T., Douglas V. Johnson II, James O. Kievit, Jr., Douglas C. Lovelace, and Steven Metz. The Principles of War in the 21st Century: Strategic Considerations. Lexington, KY: CreateSpace, 1995.

Joint Chiefs of Staff. Joint Pub 3-0: Joint Doctrine for Military Operations. Washington, DC: U.S. Government Printing Office, 1995.

Joint Technical Committee ISO/IEC JTC1. Informational Technology Evaluation Criteria for It Security: Security Techniques (ISO/IEC Standard 15408). Genève: ISO/IEC, 1999.

Jomini, Baron De. The Art of War. Princeton, NJ: Bottom of the Hill Publishing, 2011.

Kilcullen, David J. Counterinsurgency. Oxford: Oxford University Press, USA, 2010.

Kramer, Franklin D., Stuart H. Starr, and Larry Wentz, eds. Cyberpower and National Security. New York: Potomac Books Inc., 2009.

Krapp, Peter. “Terror and Play, or What Was Hacktivism?” Grey Room 21 (Fall 2005): 70-93.

Kuhn, Thomas S. The Structure of Scientific Revolutions,. [2d ed. Vol. 2, of International Encyclopedia of Unified Science. Foundations of the Unity of Science, V. 2, No. 2. Chicago: University of Chicago Press, 1970.

Lawrence, T. E. Seven Pillars of Wisdom: A Triumph: The Complete 1922 Text. Blacksberg, VA: Wilder Publications, 2011.

Laqueur, Walter. A History of Terrorism. New Brunswick, N.J.: Transaction Publishers, 2001.

Leonhard, Robert. The Principles of War for the Information Age. New York: Presidio Press, 2000.

Libicki, Martin C. Cyberdeterrence and Cyberwar. New York: Rand Publishing, 2009.

Lind, William S. Maneuver Warfare Handbook. Boulder, CO: Westview Press, 1985.

——— “Understanding Fourth Generation War.” Antiwar. Entry posted January 15, 2004. http://www.antiwar.com/lind/index.php?articleid=1702 (accessed January 3, 2012).

Lonsdale, David J. The Nature of War in the Information Age: Clausewitzian Future (Strategy and History). New York: Routledge, 2004.

Lynn, William J. “Defending a New Domain.” Foreign Affairs 89, no. 5 (Sep/Oct 2010): 97-108.

Mahan, A.T. The Influence of Sea Power Upon History, 1660-1783. New York: Dover Publications, 1987.

Marighella, Carlos. Minimanual of the Urban Guerilla. Pmplt ed. Montreal: Abraham Guillen Press/Arm the Spirit, 2002.

McIvor, Anthony D., ed. Rethinking the Principles of War. Reprint ed. Annapolis, MD: US Naval Institute Press, 2007.

Meilinger, Phillip S., ed. The Paths of Heaven: The Evolution of Airpower Theory. Maxwell Airforce Base, AL: Air Univ Press, 1997.

Mitchell, Melanie. Complexity: a Guided Tour. New York: Oxford University Press, USA, 2009.

Moffat, James. Complexity Theory and Network Centric Warfare. Washington, DC: Cforty Onesr Cooperative Research, 2003.

Osanka, Franklin Mark, ed. Modern Guerrilla Warfare: Fighting Communist Guerrilla Movements, 1941-1961. New York: The Free Press, 1962.

Osinga, Frans P.B. Science, Strategy and War: The Strategic Theory of John Boyd (Strategy and History). New York, NY: Routledge, 2006.

Owens, William A. Lifting the Fog of War. Baltimore: The Johns Hopkins University Press, 2001.

——— Kenneth W. Dam, Herbert S. Lin, and editors. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: National Academies Press, 2009.

Papaj, Christopher J. “Clausewitz and 21st Century Warfare.” Master’s thesis, Army War College, 2008.

Pape, Robert A. “The Strategic Logic of Suicide Terrorism.” The American Political Science Review 97, no. 3 (Aug., 2003): 343-61.

Paret, Peter, Gordon A. Craig, and Felix Gilbert, eds. Makers of Modern Strategy: from Machiavelli to the Nuclear Age. Princeton, NJ: Princeton University Press, 1986.

Paries, Jean. “Complexity, Emergence, Resilience….” In Resilience Engineering: Concepts and Precepts, edited by Erik Hollnagel, David D. Woods, and Nancy Leveson, 43-53. Burlington, VT: Ashgate Pub Co, 2006.

Parker, Geoffrey, ed. The Cambridge History of Warfare. New York: Cambridge University Press, 2005.

Perrow, Charles. Normal Accidents: Living with High-Risk Technologies. Princeton, NJ: Princeton University Press, 1999.

Phister, Paul W., Dan Fayette, and Emily Krzysiak. “The ‘CyberCraft’ Concept.” Military Technology 31, no. 9 (September 2007): 123-31.

Polk, Robert B. “A Critique of the Boyd Theory – Is It Relevant to the Army?” Defense Analysis 16, no. 3 (2000): 257-76.

Ralph Waldo Emerson Texts. http://www.emersoncentral.com/

Rattray, Greg. Strategic Warfare in Cyberspace. New York: The MIT Press, 2001.

Rice, Mason, Jonathan Butts, and Sujeet Shenoi. “A Signaling Framework to Deter Aggression in Cyberspace.” International Journal of Critical Infrastructure Protection 4, no. 2 (August 2011): 57-65.

Riley, H. Norton. “The von Neumann Architecture of Computer Systems.” Computer Science Department, California State Polytechnic University, Pomona, CA, September, 1987. http://www.csupomona.edu/…hnriley/www/VonN.html (accessed February 29, 2012).

Ryan, Peter, Steve Schneider, Michael Goldsmith, Gavin Lowe, and Bill Roscoe. Modelling and Analysis of Security Protocols. London: Addison-Wesley Professional, 2000.

Sageman, Marc. Understanding Terror Networks. London: University of Pennsylvania Press, 2004.

Sawyer, Ralph D., trans. The Seven Military Classics of Ancient China. New York: Basic Books, 2007.

Schelling, Thomas C. Arms and Influence. 1966. Reprint, New Haven, CT.: Yale University Press, 2008.

Schrofl, Josef, Bahram M. Rajaee, and Dieter Muhr, eds. Hybrid and Cyber War as Consequences of the Asymmetry: a Comprehensive Approach Answering Hybrid Actors and Activities in Cyberspace: Political Social and Military Responses. New York: Peter Lang Pub Inc, 2011.

Sharp, Walter Gary Sr. Cyberspace and the Use of Force. Falls Church, Va.: Ageis Research Corp, 1999.

Simpkin, Richard E. Race to the Swift: Thoughts On 21st Century Warfare. Revised ed. London: B.T. Batsford, 1998.

Smith, Edward A. Jr. “Network-Centric Warfare.” Naval War College Review 54, no. 1 (Winter 2001): 59-61.

Smith, Thomas W. “The New Law of War: Legitimizing Hi-Tech and Infrastructural Violence.” International Studies Quarterly 46, no. 3 (September 2002): 355-74.

Strachan, Hew, and Andreas Herberg-Rothe, eds. Clausewitz in the Twenty-First Century. New York: Oxford University Press, USA, 2007.

Stein, Cara. “Exploring the Relationship between Cohesion and Complexity.” Journal of Computer Science 1, no. 2 (April 1, 2005): 137-45.

Streland, Arnold H. “Clausewitz on Space: Developing Military Space Theory through a Comparative Analysis.” Master’s thesis, Air Command and Staff College, Air University, 1999.

Sumida, Jon Tetsuro. Inventing Grand Strategy and Teaching Command: The Classic Works of Alfred Thayer Mahan Reconsidered (Woodrow Wilson Center Press S.). Charleston: The Johns Hopkins University Press, 1999.

Swiderski, Frank, and Window Snyder. Threat Modeling. Redmond, WA: Microsoft Press, 2004.

Temes, Peter. The Just War: An American Reflection On the Morality of War in Our Time. Chicago: Ivan R Dee, 2004.

Thompson, Robert. Defeating Communist Insurgency: Experiences from Malaya and Vietnam (Studies in International Security). London: Palgrave Macmillan, 1978.

Thucydides. The Landmark Thucydides: A Comprehensive Guide to the Peloponnesian War. Edited by Robert B. Strassler. New York: Free Press, 1996.

Toffler, Alvin, and Heidi Toffler. War and Anti-War: Survival at the Dawn of the 21st Century. Boston: Little Brown, 1993.

Tse-Tung, Mao. Collected Writings of Chairman Mao: Volume 2 – Guerrilla Warfare. El Paso, TX: El Paso Norte Press, 2009.

——— On Guerrilla Warfare. Translated by Samuel B. Griffith II. Urbana: University of Illinois Press, 2000.

——— Selected Works of Mao Tse-Tung: Volume 1. Peking: Foreign Language Press, 1975.

U.S. Air Force. Scientific Advisory Board. Report on Implications of Cyber Warfare, Volume 1: Executive Summary and Annotated Brief. SAB-TR-07-02. Washington, DC, 2007.

van Creveld, Martin Technology and War: from 2000 B.C. to the Present. A rev. and expanded ed. New York: Touchstone, 1991.

——— The Transformation of War. New York: Free Press, 1991.

Vego, Milan N. Operational Warfare: NWC 1004. Newport, RI: U.S. Naval War College, 2000.

——— “Systems Versus Classical Approach to Warfare.” Joint Force Quarterly 52 (Winter 2009): 40-48.

Waldman, Thomas. “’Shadows of Uncertainty’: Clausewitz’s Timeless Analysis of Chance in War.” Defence Studies 10, no. 3 (September 2010): 336-68.

Watts, Barry D. Clausewitzian Friction and Future War (McNair Paper 52). Washington, DC: National Defense University, 2004.

Woods, David D., and Erik Hollnagel. Joint Cognitive Systems: Patterns in Cognitive Systems Engineering. Boca Raton, FL: CRC Press, 2006.

Yaniv, Avner. Deterrence Without the Bomb: the Politics of Israeli Strategy. Lexington, Mass.: Lexington Books, 1987.

Zimm, Alan D. “Human-Centric Warfare.” U.S. Naval Institute Proceedings 125, no. 5 (May 1999): 28-31.

Leave a Comment ↓

No comments yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: