1. Alberts, David S., Reiner K. Huber, & James Moffat (2010) NATO NEC C2 Maturity Model. Washington, DC: DoD Command and Control Research Program.
2. Anderson, Robert H. et al. (1999) Securing the U.S. Defense Information Infrastructure: a Proposed Approach. Santa Monica, CA: RAND.
3. Arquilla, John & Douglas A. Borer, eds. (2007)Information Strategy and Warfare: A Guide to Theory and Practice. New York: Routledge.
4. Bennett, M., & E. Waltz (2007)Counterdeception Principles and Applications for National Security. Norwood, MA: Artech House.
5. Bloom, Richard (2013)Foundations of Psychological Profiling: Terrorism, Espionage, and Deception. Boca Raton, FL: Taylor & Francis Group.