آلبرتس، دیوید س و دانیل س پاپ (1385)، گزیده ای از عصر اطلاعات؛ الزامات امنیت ملی در عصر اطلاعات، ترجمه علی علی آبادی و رضا نخجوانی، تهران: پژوهشکده مطالعات راهبردی.
روزنا، جیمز و دیگران (1390)، انقلاب اطلاعات، امنیت و فناوری های جدید، ترجمه؛ علیرضا طیب، تهران: پژوهشکده مطالعات راهبردی.
کاستلز، مانوئل(1380)، عصر اطلاعات: اقتصاد، جامعه و فرهنگ، مترجمان؛ احمد علیقلیان، افشین خاکباز، تهران: طرح نو.
غروی حسین، محمدی علی (1390) معرفی رویکردها و متدولوژیهای طراحی واجرای سناریوهای مقابله با تهدیدات سایبری، تهران: انتشارات دانشگاه دفاع ملی، مجموعه مقالات همایش ملی دفاع سایبری.
منوچهری، عباس (1376)، قدرت، مدرنیسم و پستمدرنیسم،اطلاعات سیاسی اقتصادی، شماره 122-121.
هانس جو اکیم مور گنتا (1389)،سیاست میان ملتها: تلاش در راه قدرت و صلح، مترجم: حمیرا مشیرزاده، تهران: وزارت امور خارجه.
منابع انگلیسی
Bagchi, Indrani (2008), “China Mounts CyberAttacks on Indian Sites,” The Times of India, May 5, 2008.
Bajaj, Kamlesh. (2010), The Cybersecurity Agenda. Mobilizing for International Action. available via The EastWest institute.
http://ewi.info/system/files/Bajaj_web.pdf.
Benedikt Michael. (1992) Cyberspace: First Steps, Cambridge, MIT Press.
Betz J. David andStevens Tim (2011),Cyberspace and The State: Toward a Strategy For Cyber - Power, The International Institute for Strategic Studies (IISS)
Bollier, David (2003), The Rise of Netpolik; How the Internet Is ChangingInternational Politics and Diplomacy,A Report of the Eleventh Annual Aspen InstituteRoundtable on Information Technology.
Bryant, Rebecca (2001), What Kind Of Space Is Cyberspace?, Minerva, 5:138-155.
Bunn, M. Elaine (2011), Can Deterrence Be Tailored? Strategic Forum, No. 225.
Cheswick William R. andBellovin Steven M. (2003), Firewalls and Internet Security: Repelling the Wily Hacker (2nd Edition).
Clarke Richard A. and Knake Robert. (2012), Cyber War: The Next Threat to National Security and What to Do About It, Paperback press.
Crampton, JeremyW. (2004), The Political Mapping of Cyberspace,Chicago: University of Chicago Press.
Eriksson, John and Giocomello(2006), “The Information Revolution, Security, and International Relations: (IR) relevant Theory?” International Political Science Review (2006), Vol. 27, No. 3, 221-244.
George, Alexander L. and Richard Smoke (1974), Deterrence in American Foreign Policy: Theory and Practice, New York: Columbia University Press.
Gibson, W. (1984) Neuromancer. New York, Ace Books.
Goodman, Will (2010), “Cyber Deterrence: Tougher in Theory than in Practice,” Strategic Studies Quarterly, Vol.4, No.3.
Kramer, Franklin D .et al (2009), Cyberpower and National Security, Dulles: National Defense University Press and Potomac Books.
Kuehl T. Daniel (2009) From Cyberspace to Cyberpower: Defining the Problem," in FD Kramer, S. Starr, L.K. Wentz (ed. ) (2008), Cyberpower and National Security, National Defense University Press, Washington (DC)
Kugler, Richard L. (2009), “Deterrence of Cyber Attacks,” in Franklin D. Kramer et al (2009), Cyberpower and National Security, Dulles: National Defense University Press and Potomac Books, Inc.
Libicki, Martin C. (2009)Cyber deterrence and cyberwar, USA, Rand Corporation.
Lin, Herbert. (2011) ‘Responding to sub-threshold cyber intrusions: a fertile topic for research and discussion’, inGeorgetown Journal of International Affairs, Special Issue, International Engagement on Cyber:Establishing International Norms and Improved Cybersecurity, pp. 127–135.
Morgan, Patrick M. (2010), “Applicability of Traditional Deterrence Concepts and Theory to the Cyber Realm,” paper presented at a workshop on deterring cyberattacks, Washington DC.
Nye, J (2011), The Future of Power in the 21st Century, New York: Public Affairs Press.
Obama, Barack. (2013), Improving Critical Infrastructure Cybersecurity, available via:
https://www.whitehouse.gov/issues/foreign-policy/cybersecurity
President Ronald Reagan, (1988) National Security Strategy of the United States, available at :
http://history.defense.gov/HistoricalSources/NationalSecurityStrategy.aspx
Starr ,Stuart H. (2008), Developing a theory of cyber power, in FD Kramer, S. Starr, L.K. Wentz (ed. )Georgetown Journal of International Affairs, Special Issue, International Engagement on Cyber:Establishing International Norms and Improved Cybersecurity, pp. 127–135.