Skip to main content

Mobile Main Menu

  • Library Portal
    • About Library
    • Search the Library
    • A-Z Databases
    • Research Tools
    • Subject Guides
    • Browse Journals
    • AppsAnywhere
    • Accessibility Tools
  • Academic Skills
    • About Academic Skills
    • Academic Integrity
    • Academic Writing
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library
  • English Language Hub
    • About English Language
    • Academic Writing in English
    • Self-Study Resources
  • Workshops
  • One-to-ones

Secondary navigation

  • Your Projects
  • Feedback to Win
  • iLearn
  • About Us
  • Office 365
  • Request It!
  • News Hub
Home

Main Menu

  • Library
    • About Library
    • Search the Library
    • A-Z Databases
    • Subject Guides
    • Research Tools
    • Browse Journals
    • AppsAnywhere
    • Accessibility Tools
    • All Reading Lists

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

  • Academic Skills
    • About Academic Skills
    • Academic Integrity
    • Academic Writing
    • Artificial Intelligence
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
  • English Language
    • About English Language
    • Academic Writing in English
    • Self-Study Resources

    Get personalised support from an Academic English Lecturer

    Book a one-to-one

    Get personalised support from an Academic English Lecturer

    Book a one-to-one

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
  • Workshops
  • One-to-Ones

Help

CRI5012

Cyber Espionage and Cyber Warfare

All the reading and resources from your modules, all in one place

Reading List Category
Resource Type
Lesson

Lesson 1

Key Text eBook

Understanding Cyber-Warfare: Politics, Policy and…

by Whyte, C. and Mazanec, B.
Essential Resource Website

Denial of Service (DoS) guidance

by National Cyber Security Centre
Essential Resource Website

Cyber Warfare: does International Humanitarian…

by Rodenhäuser, T.
Essential Resource Video

Cyberwarfare: How World War 3 Will Be Fought

by DailyWire+
Essential Resource Website

Bombs. Missiles. Malware. Indiscriminate…

by @ICRC

Lesson 2

Key Text eBook

Understanding Cyber-Warfare: Politics, Policy and…

by Whyte, C. and Mazanec, B.
Essential Resource Article

The Weaponization of Social Media: Spear Phishing…

by Bossetta, M.
Essential Resource Website

National Cyber Security Centre - NCSC.GOV.UK

by National Cyber Security Centre
Essential Resource Website

Modern cyberespionage and APTs, the need for…

by CloudMask
Essential Resource Website

Russian “hacktivists” are causing trouble far…

by Burgess, M.
Essential Resource Website

The evolution of spying: From WWII battlefields…

by Boerma, L.
Essential Resource Video

What is ADVANCED PERSISTENT THREAT ATTACK | Types…

by ISO Training Institute
Essential Resource Article

A survey on advanced persistent threats:…

by Alshamrani, A. et al.

Lesson 3

Key Text eBook

Understanding Cyber-Warfare: Politics, Policy and…

by Whyte, C. and Mazanec, B.
Essential Resource Article

China in the Asia-Pacific Cyber Domain: Okinawa…

by Buck, M. D.
Essential Resource Website

Cyber Operations Tracker | CFR Interactives

by Council on Foreign Relations
Essential Resource Website

In punishing Russia for SolarWinds, Biden upends…

by Volz, D.
Essential Resource Website

How Japan Is Modernizing Its Cybersecurity Policy

by Osawa, J.
Essential Resource Article

Cybersecurity Governance in Japan

by Ogawa, H. and Tsuchiya, M.
Essential Resource Website

NCSC Annual Review 2022

by National Cyber Security Centre
Essential Resource Website

Home | MI5 - The Security Service

by MI5
Essential Resource Article

North Korean cyber attacks and policy responses:…

by Hwang, J. and Choi, K.-S.
Essential Resource Article

Countering Cyber Asymmetry on the Korean…

by Ernst, M. and Lee, S.
Essential Resource Website

Everybody Spies in Cyberspace. The U.S. Must Plan…

by Zegart, A.
Essential Resource Website

Press Release: UK exposes Russian spy agency…

by Foreign, Commonwealth and Development Office and The Rt Hon Elizabeth Truss
Wider Reading Other

The all-purpose sword: North korea's cyber…

by Ji-Young, K., In, L. J. and Gon, K. K.
Wider Reading Website

The impact of spycraft on how we secure our data

by Hughes, M.
Wider Reading Website

New body will help the UK combat national…

by MI5

Lesson 4

Key Text eBook

Understanding Cyber-Warfare: Politics, Policy and…

by Whyte, C. and Mazanec, B.
Essential Resource Article

Muddywater apt group and a methodology proposal…

by Tok, M. S. and Celiktas, B.
Essential Resource Video

WANNACRY: The World's Largest Ransomware…

by The TWS Channel
Essential Resource Video

Inside the battle to stop attacks by Russian…

by CBS Mornings
Essential Resource Video

The Hack That Made Google Shut Down | Darknet…

by Jack Rhysider

Lesson 5

Key Text eBook

Understanding Cyber-Warfare: Politics, Policy and…

by Whyte, C. and Mazanec, B.
Essential Resource Other

North Korean Cryptocurrency Operations: An…

by Kim, H. M., Lee, J. and Paik, R.
Essential Resource Video

The Story Behind The Hack That Wreaked Havoc on…

by Cheddar
Essential Resource Video

The Sony Pictures Hack Explained

by Cinemagic English
Essential Resource Video

The Perfect Weapon (2020): Sony Hack (Clip) | HBO

by HBO
Essential Resource Other

Kim Jong Un has quietly built a 7,000-man cyber…

by Ioanes, E.
Essential Resource Article

The Lazarus group: The Cybercrime Syndicate…

by Park, J.

Lesson 6

Key Text eBook

Understanding Cyber-Warfare: Politics, Policy and…

by Whyte, C. and Mazanec, B.
Essential Resource Audio

The Evolution of Hybrid Threats and Possibilities…

by IIEA
Essential Resource Video

A Timeline of Russian Cyberattacks on Ukraine |…

by Wired
Essential Resource Article

Russian Cyber Operations in the Invasion of…

by Lin, H.
Essential Resource Website

Cyber Capabilities Are Not Weapons of War?

by Fidler, D.
Essential Resource Article

Cyber Warfare & Inadvertent Escalation

by Acton, J. M.
Essential Resource Video

How Cyberwarfare Actually Works

by Wendover Productions
Essential Resource Other

e-Health as a Target in Cyberwar: Expecting the…

by Wairimu, S.
Essential Resource Article

Hannibal at the Gates: Cyberwarfare & the…

by Datta, P.
Essential Resource Video

Rodrigo Bijou: Governments don't understand…

by TED
Essential Resource Website

Ukraine marks a turning point for cyberwarfare

by Vanberghen, C.
Essential Resource Website

Ukraine says it is fighting first 'hybrid…

by Tidy, J.
Essential Resource Website

The advent of the ‘third revolution in military…

by Thornton, R. and Miron, M.
Essential Resource Article

Russian Cyber Operations in the Invasion of…

by Lin, H.
Wider Reading Website

North Korean Cyberattacks: A Dangerous and…

by Klingner, B.
Wider Reading Other

North Korea’s Cyber Operations: Strategy and…

by Lewis, J. A. et al.

Lesson 7

Key Text eBook

Understanding Cyber-Warfare: Politics, Policy and…

by Whyte, C. and Mazanec, B.
Essential Resource Website

Cyber Crimes — FBI

by FBI
Essential Resource Other

NATO in the Cyber Age: Strengthening Security…

by Davis, S.
Essential Resource Other

The untold story of NotPetya, the most…

by Greenberg, A.
Essential Resource Video

Into The Grey Zone: How cyber warfare was used…

by Sky News
Essential Resource eBook

Hybrid Warfare: Security and Asymmetric Conflict…

by Weissmann, M. D., Nilsson, N., Palmertz, B. and Thunhold, P. (eds)
Essential Resource Other

Limiting viral spread: automated cyber operations…

by Kaminska, M., Broeders, D. and Cristiano, F.
Essential Resource Article

Cyber legalism: why it fails and what to do about…

by Kello, L.
Essential Resource Article

'Virtual' disenfranchisement: Cyber…

by Schmitt, M. N.
Essential Resource Video

Into The Grey Zone: Exploring the invisible…

by Sky News
Essential Resource Article

Cyber Dimension of Hybrid Wars: Escaping a “Grey…

by Mazaraki, N. and Goncharova, Y.
Essential Resource Video

The history of Russia’s 2016 election meddling in…

by PBS NewsHour
Wider Reading Other

Six Russian GRU officers charged in connection…

by Office of Public Affairs

Lesson 8

Key Text eBook

Understanding Cyber-Warfare: Politics, Policy and…

by Whyte, C. and Mazanec, B.
Essential Resource Article

Cyber deterrence with imperfect attribution and…

by Welburn, J. et al.
Essential Resource Article

Cyber Threats and Vulnerabilities to Conventional…

by Montgomery, M. and Borghard, E.
Essential Resource Website

Cyber Deterrence Is Dead. Long Live Cyber…

by Smeets, M. and Soesanto, S.
Essential Resource eBook

NL ARMS Netherlands Annual Review of Military…

by Osinga, F. and Sweijs, T.
Essential Resource Video

Cyber Report: Cyber Deterrence--What Works and…

by Defense & Aerospace Report
Essential Resource Other

The Five Eyes and offensive cyber capabilities:…

by Gold, J.
Essential Resource Video

Deterrence in Cyberspace — Joe Nye on…

by Belfer Center
Essential Resource Other

Characterizing the Risks of North Korean Chemical…

by Bennett, B. W. et al.
Essential Resource Video

GB Skip navigation Search Create Avatar…

by Government Matters
Essential Resource Other

11th International Conference on Cyber Conflict (…

by Minarik, T. et al. (eds.)
Essential Resource Article

Redefining deterrence in cyberspace: Private…

by Lilli, E.
Essential Resource eBook

Cyber Security Politics: Socio-Technological…

by Dunn Cavelty, M. and Wenger, A.

Lesson 9

Key Text eBook

Understanding Cyber-Warfare: Politics, Policy and…

by Whyte, C. and Mazanec, B.
Essential Resource Website

Cybersecurity predictions for 2023, according to…

by Robson, K.
Essential Resource Website

Machine Learning in Cybersecurity: How It Works…

by Gottsegen, G.
Essential Resource Other

CyberSecurity attack prediction: a deep learning…

by Fredj, B. et al.
Essential Resource Article

Internet of things meet internet of threats: New…

by Djenna, A., Harous, S., and Saidouni, D. E.
Essential Resource eBook

Bioethics in Medicine and Society

by Heston, T. F. and Ray, S.
Essential Resource Website

An Overview of Catastrophic AI Risks

by Hendrycks, D., Mazeika, M. and Woodside, T.
Essential Resource Website

2023 threat predictions: Beware 'economic…

by Weigand, S.
Wider Reading Other

Our Shared Digital Future: Building an Inclusive…

by Smith, J., Amour, L. S. and O'Halloran, D.

Footer

  • Library Portal
  • Academic Skills
  • English Language
  • Workshops
  • One-to-one Appointments

Footer 2

  • About Us
  • iLearn
  • News Hub
  • Support
  • Feedback To Win

Footer3

  • About Arden University
  • Cookies Policy
  • Privacy Policy
Contact Us
address icon

Arden University,
Middlemarch Park,
Coventry, CV3 4FJ, UK

email icon
  • Library@arden.ac.uk
  • AcademicSkills@arden.ac.uk
  • EnglishLanguageHub@arden.ac.uk
Arden University Learning Success Hub 

© 2005-2025 Arden University  | All rights reserved