APT1. Exposing One of China’s Cyber Espionage Units. Mandiant 2013 — https://cs.brown.edu/courses/csi1800/sources/2013_Mandiant_APT1_Report.pdf (dostęp: 11.09.2017).
Google Scholar
APT28. A Window into Russia’s Cyber Espionage Operations? “FireEye Special Report” 2014.
Google Scholar
Assessing Russian Activities and Intentions in Recent US Elections. Intelligence Community Assessment, Office of the Director of National Intelligence, 6.01.2017 — https://www.dni.gov/files/documents/ICA_2017_01.pdf (dostęp: 11.09.2017).
Google Scholar
Berger S.: Hackers Leak Ukraine Military Documents Revealing Plan to Increase Spending on Armed Forces — http://www.ibtimes.com/hackers‑leak‑ukraine‑military‑documents‑revealing‑plan‑increase‑spending‑armed‑forces‑1989742 (dostęp: 15.09.2017).
Google Scholar
Bing C.: Why the U.S. is Struggling with the Digital War on ISIS — https://www.cyberscoop.com/us‑cyber‑command‑digital‑war‑isis/ (dostęp: 17.09.2017).
Google Scholar
Buchanan B., Sulmeyer M.: Russia and Cyber Operations: Challenges and Opportunities for the Next U.S. Administration. Carnegie Endowment for International Peace 2016.
Google Scholar
Cohen A., Ham ilton R.E.: The Russian Military and the Georgia War: Lessons and Implications. Carlisle 2011.
Google Scholar
Cyber-Berkut atakuje polskie serwisy internetowe. Prezydent.pl padł. GPW także — https://niebezpiecznik.pl/post/cyber‑berkut‑atakuje‑polskie‑serwisy‑internetowe‑prezydent‑pl‑padl‑gwp‑tez/ (dostęp: 15.09.2017).
Google Scholar
Dunn Cavelty M.: The Militarisation of Cyberspace: Why Less May be Better. In: 2012 4th International Conference on Cyber Conflict. Eds. C. Czosseck, R. Ottis, K. Ziolkowski. Tallin 2012.
Google Scholar
Revelations from Wikileaks’ Hacked Clinton Emails — http://www.bbc.com/news/world‑us‑canada‑37639370 (dostęp: 16.09.2017).
Google Scholar
Gartenstein‑Ross D., Barr N., Moreng B.: The Islamic State’s Global Propaganda Strategy. “ICCT Research Paper” 2016, No 1.
Google Scholar
Grizzly Steppe — Russian Malicious Cyber Activity. Joint Analysis Report, Federal Bureau of Investigation, NCCIC — https://www.us‑cert.gov/sites/default/files/publications/JAR_16‑20296A_GRIZZLY%20STEPPE‑2016‑1229.pdf (dostęp: 11.09.2017).
Google Scholar
Harold S.W., Libicki M.C., Cevallos A.S.: Getting to Yes with China in Cyberspace. Santa Monica 2016.
Google Scholar
Henderson B., Graham C.: Russia Blamed as Macron Campaign Blasts ‘massive hacking attack’ ahead of French Presidential Election — http://www.telegraph.co.uk/news/2017/05/05/macron‑campaign‑blasts‑massive‑hacking‑attack‑aheadfrench‑presidential/ (dostęp: 16.09.2017).
Google Scholar
Herzog S.: Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. “Journal of Strategic Security” 2011, Vol. 4, No 2.
Google Scholar
Jacobs A., Helft M.: Google, Citing Attack, Threatens to Exit China — http://www.nytimes.com/2010/01/13/world/asia/13beijing.html?_r=1 (dostęp: 15.09.2017).
Google Scholar
Kaiman J.: China Reacts Furiously to US Cyber‑ espionage Charges — https://www.theguardian.com/world/2014/may/20/china‑reacts‑furiously‑us‑cyber‑espionagecharges (dostęp: 15.09.2017).
Google Scholar
Kamass a M.: Odtajnienie izraelskiego ataku na syryjski reaktor. Nieprzypadkowy moment — http://www.defence24.pl/odtajnienie‑izraelskiego‑ataku‑na‑syryjskireaktor‑nieprzypadkowy‑moment (dostęp: 25.03.2018).
Google Scholar
Key Events. In: Cyber War in Perspective: Russian Aggression Against Ukraine. Ed. K. Geers. Tallin 2015.
Google Scholar
Koval N.: Revolution Hacking. In: Cyber War in Perspective: Russian Aggression Against Ukraine. Ed. K. Geers. Tallin 2015.
Google Scholar
Kozłowski A.: Comparative Analysis of Cyberattacks on Estonia, Georgia and Kyrgyzstan. “European Scientific Journal” 2014, Vol. 3.
Google Scholar
Lakomy M.: Cracks in the Online “Caliphate”: How the Islamic State is Losing Ground in the Battle for Cyberspace. “Perspectives on Terrorism” 2017, Vol. 11, No 3.
Google Scholar
Lakomy M.: Cyberprzestrzeń jako nowy wymiar rywalizacji i współpracy państw. Katowice 2015.
Google Scholar
Langner R.: To Kill a Centrifuge. The Langner Group. November 2013 — https://www.langner.com/wp‑content/uploads/2017/03/to‑kill‑a‑centrifuge.pdf (dostęp: 11.09.2017).
Google Scholar
Libicki M.: The Cyberwar Challenge to NATO. W: Cyberterroryzm zagrożeniem XXI wieku. Perspektywa politologiczna i prawna. Red. A. Podraza, P. Potakowski, K. Wiak. Warszawa 2013.
Google Scholar
Malkin B.: Edward Snowden Claims US Hacks Chinese Phone Messages — http://www.telegraph.co.uk/news/worldnews/asia/hongkong/10137215/Edward-Snowden‑claims‑US‑hacks‑ Chinese‑phone‑messages. html (dostęp: 11.09.2017).
Google Scholar
Morton C.: Stuxnet, Flame, and Duqu — the OLYMPIC GAMES. In: A Fierce Domain: Conflict in Cyber Space, 1986 to 2012. Ed. J. Healy. Arlington 2013.
Google Scholar
Nakas hima E., Ryan M.: U.S. Military Has Launched a New Digital War against the Islamic State — https://www.washingtonpost.com/world/national‑security/us‑militarys‑digital‑war‑against‑the‑islamic‑state‑is‑off‑to‑a‑slow‑start/2016/07/15/76a3fe82‑3da3‑11e6‑a66f‑aa6c1883b6b1_story.html?utm_term=.23b62580ea67 (dostęp: 17.09.2017).
Google Scholar
Nakas hima E.: U.S. Military Cyber Operation to Attack ISIS Last Year Sparked Heated Debate over Alerting Allies — https://www.washingtonpost.com/world/national‑security/us‑military‑cyber‑operation‑to‑attack‑isis‑last‑year‑sparked‑heated-debate‑over‑alerting‑allies/2017/05/08/93a120a2‑30d5‑11e7‑9dec-764dc781686f_story.html?utm_term=.c91ece2fddf6 (dostęp: 17.09.2017).
Google Scholar
Pakharenko G.: Cyber Operations at Maidan: A First-Hand Account. In: Cyber War in Perspective: Russian Aggression against Ukraine. Ed. K. Geers. Tallin 2015.
Google Scholar
Piklington E.: US and China to Discuss Cybersecurity at High-level Diplomatic Meetings — https://www.theguardian.com/world/2013/jun/02/us-china-cybersecurity-hacking‑espionage-meetings (dostęp: 19.05.2017).
Google Scholar
Podraza A.: Cyberterroryzm jako wzrastające zagrożenie dla bezpieczeństwa międzynarodowego
Google Scholar
w XXI wieku. W: Cyberterroryzm zagrożeniem XXI wieku. Perspektywa politologiczna i prawna. Red. A. Podraza, P. Potakowski, K. Wiak. Warszawa 2013.
Google Scholar
Red Line Drawn: China Recalculates Its Use of Cyber Espionage. “FireEye iSIGHT Intelligence Special Report”, June 2016.
Google Scholar
Rid T.: Cyber War Will Not Take Place. “Journal of Strategic Studies” 2012, Vol. 35, No 1.
Google Scholar
Sakkov S.: Foreword. In: Cyber War in Perspective: Russian Aggression Against Ukraine. Ed. K. Geers. Tallin 2015.
Google Scholar
Scarborough R.: U.S. Cyber Command Launches Hacking Offensive against Islamic State — http://www.washingtontimes.com/news/2016/feb/29/us-launches-cyber-attacks-islamic-state/ (dostęp: 17.09.2017).
Google Scholar
Schofield J.: Google, Yahoo, Adobe and Who? — https://www.theguardian.com/technology/2010/jan/14/google-yahoo-china-cyber-attack(dostęp: 15.09.2017).
Google Scholar
Senate Intelligence Committee: Russia and 2016 Election. “Fireye” 2017.
Google Scholar
Storm D.: Political Hackers Attack Russia, Nazi Defacement, Threaten US CENTCOM with Cyberattack — https://www.computerworld.com/article/2476002/cybercrime-hacking/political-hackers-attack-russia--nazi-defacement--threaten-us-centcom-with-cybera.html (dostęp: 15.09.2017).
Google Scholar
The White House, Off ice of the Press Secreta ry: FACT SHEET: President Xi Jinping’s State Visit to the United States — https://obamawhitehouse.archives.gov/the-press-office/2015/09/25/fact-sheet-president-xi-jinpings-state-visit-united-states (dostęp: 15.09.2017).
Google Scholar
Theohary C.A., Welt C.: Russia and the U.S. Presidential Elections. “CRS Insight” 2017, January 17.
Google Scholar
Thornburgh N.: Inside the Chinese Hack Attack — https://courses.cs.washington.edu/courses/csep590/05au/readings/Titan.Rain.pdf (dostęp: 11.09.2017).
Google Scholar
Towards Trustworthy Elections. New Directions in Electronic Voting. Eds. D. Chaum et al. Berlin 2010.
Google Scholar