Bibliography
Alexander, C., Ishikawa, S., & Silverstein, M. (1977). A Pattern Language: Towns, Buildings, Construction. New York: Oxford University Press.
Alexander, K. (2007). Warfighting in Cyberspace. Washington, DC: Joint Force Quarterly. Retrieved from the U.S Army website on March 15, 2010 at http://www.carlisle.army.mil/D.IME/documents/Alexander.pdf
Bacher, P., Holz, T., Kotter, M., & Wicherski, G. (2008). Know Your Enemy: Tracking Botnets. Retreived from the Honeynet website on March 8, 2010 at http://www.honeynet.org/papers/bots/
Baschuk, B. (2010). Is the US ready for a cyberwar? National Public Radio. Retrieved from the NPR website on August 25, 2013 at http://www.npr.org/blogs/alltechconsidered/2010/02/cyberattack.html
Beidleman, S. (2009). Defining and Deterring Cyber War. Carlisle Barracks, PA: U.S. Army War College.
Bipartisan Policy Center. (BPC 2010). Cyber Shockwave, a cyber ware exercise televised by CNN.com on February 20 and 21, 2010. Information retrieved on January 24, 2013 from http://www.bipartisanpolicy.org/events/cyber2010
Center for Strategic & International Studies (CSIS). (2012). Twenty Critical Security Controls for Effective Cyber Defense: Consensus Audit Guidelines. Retrieved from SANS.org website January 24, 2013 at http://www.sans.org/critical-security-controls/
Council of Europe (COE). (2001). Convention on Cybercrime. Budapest, Hungary: European Treaty Series Number 185. Retrieved January 29, 2010 from COE web site http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT=185&CL=ENG ...
Get Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.