1. Acton, J. M. (2017). Cyber weapons and precision guided munitions. In A. L. G. Perkovich (Ed.), Understanding cyber conflict.
2. Aid, M. (2013, October 15). The NSA's new code breakers. Foreign Policy.
3. Akamai. (n.d.). Global traffic management. Retrieved 11 14, 2018, from Akamai: https://www.akamai.com/us/en/multimedia/documents/product-brief/global-traffic-management-product-brief.pdf
4. Alinsky, S. (1989). Rules for radicals: A practical primer for realistic radicals. Vintage.
5. Anderson, N. (2010, 11 7). How China swallowed 15% of ‘net traffic for 18 minutes. Retrieved 11 13, 2018, from Ars Technica: https://arstechnica.com/information-technology/2010/11/how-china-swallowed-15-of-net-traffic-for-18-minutes/