11
April 7, 20118. http://dspace.uni.lodz.pl:8080/xmlui/bitstream/handle/11089/12511/11-
161_174-Koz%C5%82owski.pdf?sequence=1&isAllowed=y.
Libicki, Martin C. Cyber deterrence and Cyberwar. Rand Corporation, 2009.
Malawer, Stuart. "Cyberwarfare: Law & Policy Proposals for U.S. & Global Governance." GMU
School of Public Policy Research Paper 58, no. 11 (2010): 28-33.
https://ssrn.com/abstract=1437002.
Qiao, L and Xiangsui, W. Unrestricted Warfare, Beijing, PLA Literature and Arts Publishing
House, 2009.
Sheldon R. “China’s Great Firewall and Situational Awareness,” Strategic Insights, 10, no.2
(2011): pp. 36–51.
Singer WP & Friedman A 2014, Cybersecurity and Cyberwar, what everyone need to know,
New York, Oxford University Press.
Striennon R 2010, Surviving Cyberwar, Toronto, The Scarecrow Press.
Tabansky, Lior. 2017. The current state of cyber warfare. Accessed March 29, 2018.
https://www.cybersecurity-review.com/articles/the-current-state-of-cyber-warfare/.
Teplinsky, M. J. “Fiddling On the Roof: Recent Developments in Cybersecurity.” American
University Business Law Review 2, no. 2 (2013.): 225-322.
Thomas L T 2007, Decoding the Virtual Dragon, Fort Leavenworth, Foreign Military Studies
Office.