1. | Aleksandrowicz, T.R., Liedel, K. (2014). Społeczeństwo informacyjne – sieć – cyberprzestrzeń. Nowe zagrożenia. |
2. | W: K. Liedel, P. Piasecka, T.R. Aleksandrowicz (red.), Sieciocentryczne bezpieczeństwo. Wojna, pok j i terroryzm w epoce informacji (s. 9–38). Warszawa: Difin. |
3. | Arquilla, J., Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, 12 (2), 141. |
4. | Arquilla, J. (2011). The Computer Mouse that Roared: Cyberwar in the Twenty-First Century. Brown Journal of World Affairs, 18, 39. |
5. | Brenner, S.W. (2009). Cyberthreats: The Emerging Fault Lines of the Nation State. Oxford: Oxford University Press. |
6. | Castells, M. (1996). The Information Age: Economy. Society and Culture, 1, 77–146. |
7. | Choucri, N., Goldsmith, D. (2012). Lost in cyberspace: Harnessing the Internet, international relations, and global security. DOI:10.1177/0096340212438696 |
8. | Bulletin of the Atomic Scientists, 68 (2), 70–77.Clark, R.M., Hakim, S. (2017). Protecting Critical Infrastructure at the State, Provincial, and Local Level: Issues in |
9. | Cyber-Physical Security. W: R.M. Clark, S. Hakim, Cyber-Physical Security Protecting Critical Infrastructure (s. 1–18). Philadelphia: Springer. |
10. | Clarke, R., Knake, R. (2010). Cyber War: The Next Threat to National Security and What To Do About It. New York: HarperCollins Publishers. |
11. | Dereń, J., Rabiak, A. (2014). NATO a aspekty bezpieczeństwa w cyberprzestrzeni. W: M. G rka, Cyberbezpieczeństwo jako podstawa bezpiecznego państwa i społeczeństwa w XXI wieku (s. 202–221). Warszawa: Difin. |
12. | Durch, W., Larik, J., Ponzio, R. (2016). Just Security and the Crisis of Global Governance. Survival. Global Politics and Strategy, 58 (4), 95–112. |
13. | Farwell, J.P., Rohozinski, R. (2011). Stuxnet and the Future of Cyber War. Survival, 53 (1), 23–40. |
14. | Feil, J.A. (2012). Cyberwar and Unmanned Aerial. Vehicles: Using New. Technologies, from Espionage to. Action. Case Western Reserve Journal of International, 45, 518. |
15. | Fontana, I. (2017). Disentangling the cyber politics–cyber security nexus: the new challenge of global politics. Global Affairs, 3 (1), 99–104. |
16. | Gruszczak, A. (2011). Hybridity of contemporary armed conflicts - Critical analysis. W: B. Zapała, W. Sokała, Asymmetry and hybridity – the old army against new conflicts (9–17). Warszawa: Biuro Bezpieczeństwa Narodowego. |
17. | Ilves, L.K., Evans, T.J., Cilluffo, F.J., Nadeau, A.A. (2016). European Union and NATO Global Cybersecurity Challenges: A Way Forward. Journal of the Center for Complex Operations, 6 (2), 126–141. |
18. | Jędrzejko, M., Morańska, D. (2013). Pułapki wsp łczesności. Cyfrowi Tubylcy. Socjopedagogiczne aspekty nowych technologii cyfrowych. Dąbrowa G rnicza–Warszawa: ASPRA-JR |
19. | Kaiser, R. (2015).The birth of cyberwar. Political Geography, 46, 11. |
20. | Li, Y. (2015). Is a Cyberwar Coming? – The alleged Sony hacking warns of the grave consequences of cyberwarfare. Beijing Review. Pobrane z: http://www.bjreview.com/ expert/txt/ 2015-01/12/content_663937.htm (10.07.2020). |
21. | Libicki, M.C. (2009). Cyberdeterrence and Cyberwar. RAND Corporation, 179–181. |
22. | Lindsay, J.R. (2020). Cyber conflict vs. Cyber Command: hidden dangers in the American military solution to a large-scale intelligence problem. Intelligence and National Security, 1, 1–19. |
23. | McGraw, G. (2013). Cyber War Is Inevitable (Unless We Build Security In). Journal of Strategic Studies, 36 (1), 109–119. |
24. | Mehan, J.E. (2009). CyberWar, CyberTerror, CyberCrime. IT Governance, 19–48. |
25. | Pearson, I. (2010). Cyberwar threats are all too real, assures futurologist. Engineering & Technology, 5, 25–26. |
26. | Rid, T. (2012). Cyber war will not take place. Journal of Strategic Studies, 35 (1), 5–32. |
27. | Suissa, R. (2012). Military Resilience in Low-Intensity Conflict: A Comparative Study of New Directions Worldwide. Plymouth: Lexington Books.Ventre, D. (2011). Cyberconflict: Stakes of Power. W: D. Ventre, Cyberwar and Information Warfare (s. 213–230). Londyn: Wiley – ISTE. |
28. | Ventre, D. (2011). Cyberwar and Information Warfare. Londyn: Wiley – ISTE. |
29. | Wall, D.S. (2008). Cybercrime, media and insecurity: The shaping of public perceptions of cybercrime. International Review of Law, Computers & Technology, 22 (1–2), 45–63. |
30. | Wlatz, E.(1998). Information Warfare, Principles and Operations. Norwood: Artech House Boston. |