Alexander, C., Ishikawa, S., & Silverstein, M. (1977). A Pattern Language: Towns, Buildings, Construction. New York: Oxford University Press.
Alexander, K. (2007). Warfighting in Cyberspace. Washington, DC: Joint Force Quarterly. Retrieved from the U.S Army website on March 15, 2010 at http://www.carlisle.army.mil/D.IME/documents/Alexander.pdf
Bacher, P., Holz, T., Kotter, M., & Wicherski, G. (2008). Know Your Enemy: Tracking Botnets. Retreived from the Honeynet website on March 8, 2010 at http://www.honeynet.org/papers/bots/
Baschuk, B. (2010). Is the US ready for a cyberwar? National Public Radio. Retrieved from the NPR website on August 25, 2013 at http://www.npr.org/blogs/alltechconsidered/2010/02/cyberattack.html
Beidleman, S. (2009). Defining and Deterring Cyber War. Carlisle Barracks, PA: U.S. Army War College.
Bipartisan Policy Center. (BPC 2010). Cyber Shockwave, a cyber ware exercise televised by CNN.com on February 20 and 21, 2010. Information retrieved on January 24, 2013 from http://www.bipartisanpolicy.org/events/cyber2010
Center for Strategic & International Studies (CSIS). (2012). Twenty Critical Security Controls for Effective Cyber Defense: Consensus Audit Guidelines. Retrieved from SANS.org website January 24, 2013 at http://www.sans.org/critical-security-controls/
Council of Europe (COE). (2001). Convention on Cybercrime. Budapest, Hungary: European Treaty Series Number 185. Retrieved January 29, 2010 from COE web site http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT=185&CL=ENG ...