The appearance of hyperlinks does not constitute
endorsement by the U.S. Air Force of this Web site or the information, products,
or services contained therein. For other than authorized activities such
as military exchanges and
morale, welfare and recreation sites, the U.S. Air
Force does not exercise any editorial control over the information you may find
at these locations. Such links are provided consistent with the stated
purpose of this DoD Web site.
Some materials listed below require access to subscription databases. If you cannot gain access, contact your local library for availability. AU students and faculty can contact Web Maintainer for password.
Congressional Publications (ProQuest)
Defense Technical Information Center (DTIC®)
To access MSFRIC's complete list of databases, click here.
Air War College Gateway. Cyberspace and Information Operations Study Center.
Center for Internet Security. Integrated Intelligence Center.
Computer Science and Telecommunications Board, National Academy of Sciences. Cybersecurity and Trustworthiness Projects and Reports.
Homeland Defense & Homeland Security Studies. Information & Cyberspace.
Led by Representatives Jim Langevin and Mike McCaul. Congressional Cybersecurity Caucus.
National Academy of Sciences, Computer Science and Telecommunications Board. Cybersecurity and Information System Trustworthiness.
National Institute of Standards and Technology (NIST). Computer Security Resource Center.
U.S. Air Force. 24th Air Force.
U.S. Air Force. Air Force Command and Control Integration Center (AFC2IC).
U.S. Department of Defense. U.S. Cyber Command.
United States. Department of Homeland Security. Cybersecurity.
White House. Cyber Security.
Amoroso, Edward G. and Vacca, John R.
Cyber Attacks: Protecting National Infrastructure.
Waltham, MA, Butterworth-Heinemann, 2013. 319 p.
Book call no.: 363.3259 A524c
Baker, Kristin. Cyberspace Operations: Influence Upon Evolving War Theory. Carlisle Barracks, PA, U.S. Army War College, March 18, 2011. 26 p. (USAWC strategy research project)
Gray, Colin S.
Making Strategic Sense of Cyber Power: Why the Sky Is Not Falling.
Carlisle, PA, Strategic Studies Institute, U.S. Army War College, April 2013. 67 p.
Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization, edited by Pauline C. Reich and Eduardo Gelbstein.
Hershey, PA, Information Science Reference, 2012. 496 p.
Book call no.: 363.325 L415
Libicki, Martin C.
Crisis and Escalation in Cyberspace.
Santa Monica, CA, RAND, 2012. 172 p. (RAND Corporation monograph series)
Book call no.: 358.4140285 L695c
Cyber Warfare: How Conflicts in Cyberspace Are Challenging America and Changing the World.
Santa Barbara, CA, Praeger, 2012. 290 p. (Changing face of war)
Book call no.: 355.4 R816c
Shakarian, Paulo and others.
Introduction to Cyber-Warfare: A Multidisciplinary Approach.
Boston, Syngress, 2013. 318 p.
Book call no.: 355.4 S527i
Spade, Jayson M.
China's Cyber Power and America's National Security.
Carlisle Barracks, PA, U.S. Army War College, 2012. 71 p. (Information as power)
Book call no.: 005.80951 S732c
Tallinn Manual on the International Law Applicable to Cyber Warfare: Prepared by the International Group of Experts at the Invitation of the NATO Cooperative Cyber Defence Centre of Excellence, edited by
Michael N. Schmitt.
New York, Cambridge University Press, 2013. 282 p.
Book call no.: 341.63 T149
United States. Congress. House. Committee on Oversight and Government Reform.
Cybersecurity: Assessing the Nation's Ability to Address the Growing Cyber Threat.
Hearing. 112th Congress, 1st Session, July 7, 2011. Washington, GPO, 2011. 40 p.
Book call no.: 005.80973 U58cb
Winterfeld, Steve and Andress, Jason.
The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice.
Waltham, MA, Syngress, 2013. 150 p.
Book call no.: 355.343 W784b
Carpenter, Trisha D. Why Military Cyberspace? Marine Corps Gazette 97:90-95 May 2013.
Cilluffo, Frank J. and Cardash, Sharon L. Cyber Domain Conflict in the 21st Century. Whitehead Journal of Diplomacy and International Relations 14:41-47 Winter-Spring 2013.
Fryer-Biggs, Zachary. Cybersecurity Bubble Bursting for U.S. Contractors. Defense News 28:22 March 2013.
Steipp, Chadwick M. Funding Cyberspace. Air & Space Power Journal 27:119-128 July-August 2013.
Arnold, Chad and others. Strategies for Combating Sophisticated Attacks. Proceedings of the International Conference on Information Warfare & Security, 2013. 8 p.
Is This Really War?: As the Nation Mobilizes for Cybercombat, One Thinker Argues We may be making a Category Error with Grave Consequences.
Boston Globe, K1, September 15, 2013. Winter 2012.
China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence.
Journal of Strategic Security 4:1-23 May 2011.
Toward an International Law of the Internet.
Harvard International Law Journal 54:393-458 Summer 2013.
Library of Congress. Congressional Research Service. Cybersecurity: Authoritative Reports and Resources, [Compiled by] Rita Tehan. Washington, CRS, August 16, 2013. 102 p.
Martin, James E., Jr. Paradigm Change: Cybersecurity of Critical Infrastructure. Norfolk, VA, National Defense University, Joint Advance Warfighting School, April 2013. 97 p.
Running a War by Computer: Cyber Warfare and Its Dilemmas.
New Zealand International Review May-June 2013.
United States. Department of Homeland Security. Fact Sheet: Executive Order on Cybersecurity.
Wilson, Clay. Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues. Washington, Library of Congress, Congressional Research Service, March 20, 2007. 18 p.
Contact a subject specialist on this topic.
Links last updated on 11/20/2013 02:31 PM