Skip to main content

Mobile Main Menu

  • Library Portal
    • Library Resources
      • Search the Library
      • A-Z Databases
      • Browse Journals
    • Accessibility Tools
    • Subject Guides
      • Criminal Justice
      • Digital Education in Practice
      • Investigation, Security and Defence
      • Law
      • Psychology
      • Computing
      • Design and creativity
      • Finance and Accounting
      • Marketing
      • Health and Care Management
      • Human Resource Management
      • Business Management
      • Supply Chain Management and Logistics
      • Hospitality and Tourism
      • Foundation Year
  • English Language Hub
    • Academic Writing in English
    • Self-study Resources
  • Academic Skills
    • Academic Integrity
    • Academic Writing
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
  • Workshops and One-to-Ones
    • One-to-one Appointments
    • Workshops

Secondary navigation

  • Your Projects
  • Feedback to Win
  • iLearn
  • About Us
  • Office 365
  • Request it!
  • News Hub
Home
  • Library Portal
    • Library Resources
    • Accessibility Tools
    • Research Tools
    • Subject Guides
    • AppsAnywhere
    • Search the Library
    • A-Z Databases
    • Browse Journals
    • eBook Spotlight Collections

    Get started with the Library Portal

    Get Started
    • Accessible eBooks
    • Document Conversion Tools
    • RNIB Bookshare
    • Sensus Access

    Get started with the Library Portal

    Get Started
    • Research Tools

    Get started with the Library Portal

    Get Started
    Faculty of Social Sciences
    • Criminal Justice
    • Digital Education in Practice
    • Investigation, Security and Defence
    • Law
    • Psychology
    STEM
    • Computing
    Arden Business
    • Business Management
    • Design and Creativity
    • Finance
    • Marketing
    • Health and Care Management
    • Human Resource Management
    • Supply Chain and Project Management
    • Hospitality and Tourism
    • MBA and Executive Education
    IFS
    • Foundation Year
     

    Get started with the Library Portal

    Get Started

  • English Language
    • Academic Writing
    • Self-Study Resources
    • Workshops and one-to-ones
    • Academic Writing in English

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
    • Academic Grammar in Focus
    • Academic Vocabulary in Focus

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
    • English Language Hub One-to-one
    • English Language Hub Workshops

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
  • Academic Skills
    • Academic Integrity
    • Academic Writing
    • Artificial Intelligence
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library
    • Academic Integrity
    • Artificial Intelligence
    • Referencing Guides

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Academic Writing
    • Reading and Notetaking
    • Paraphrasing and Synthesising
    • Critical Thinking
    • Developing Your Academic Voice

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
     

    Book a one-to-one appointment

    Book a appointment

    • JISC Digital Capabilities Discovery Tool
    • Microsoft Office 365

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • What is a Dissertation?
    • Identifying a Research Topic
    • Formatting your Dissertation

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Assessment Types
    • Understanding Assignments
    • Assessment Strategies

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Maths and Statistics
    • Programming
    • SPSS

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
  • Workshops and One-to-Ones
    • One-to-one Appointments
    • Workshops
     

    Book onto a Learning Success Hub workshop

    Book a place
    • Academic Skills Workshops
    • Academic English Workshops
    • Library Workshops

    Book onto a Learning Success Hub workshop

    Book a place
Support

UG Criminal Justice Reading Lists  CRI5012

Cyber Espionage and Cyber Warfare

All the reading and resources from your modules, all in one place

Reading List Category
Resource Type
Lesson

Lesson 1

Key Text eBook

Understanding Cyber-Warfare: Politics, Policy and…

by Whyte, C. and Mazanec, B.
Key Text Video

CRI5012 Cyber Espionage and Cyber Warfare: Module…

by Arden.
Essential Resource Website

Home Page

by National Protective Security Authority
Essential Resource Website

Denial of Service (DoS) guidance

by National Cyber Security Centre
Essential Resource Website

Cyber Warfare: does International Humanitarian…

by International Committee of the Red Cross
Essential Resource Video

Cyberwarfare: How World War 3 Will Be Fought

by DailyWire+

Lesson 2

Key Text eBook

Understanding Cyber-Warfare: Politics, Policy and…

by Whyte, C. and Mazanec, B.
Essential Resource Website

The evolution of spying: From WWII battlefields…

by Boerma, L.
Essential Resource Video

What is ADVANCED PERSISTENT THREAT ATTACK | Types…

by ISO Training Institute
Essential Resource Article

A survey on advanced persistent threats:…

by Alshamrani, A. et al.
Essential Resource Website

Russian “hacktivists” are causing trouble far…

by Burgess, M.
Essential Resource Website

Modern cyberespionage and APTs, the need for…

by CloudMask

Lesson 3

Key Text Website

The impact of spycraft on how we secure our data

by Hughes, M.
Key Text eBook

Understanding Cyber-Warfare: Politics, Policy and…

by Whyte, C. and Mazanec, B.
Essential Resource Website

In punishing Russia for SolarWinds, Biden upends…

by Volz, D.
Essential Resource Website

How Japan Is Modernizing Its Cybersecurity Policy

by Osawa, J.
Essential Resource Article

Cybersecurity Governance in Japan.

by Ogawa, H. and Tsuchiya, M.
Essential Resource Website

NCSC Annual Review 2022

by National Cyber Security Centre
Essential Resource Article

North Korean cyber attacks and policy responses:…

by Hwang, J. and Choi, K.-S.
Essential Resource Article

Countering Cyber Asymmetry on the Korean…

by Ernst, M. and Lee, S.
Essential Resource Website

Everybody Spies in Cyberspace. The U.S. Must Plan…

by Zegart, A.

Lesson 4

Key Text eBook

Understanding Cyber-Warfare: Politics, Policy and…

by Whyte, C. and Mazanec, B.
Essential Resource Video

Inside the battle to stop attacks by Russian…

by CBS Mornings
Essential Resource Video

The Hack That Made Google Shut Down | Darknet…

by Rhysider, J.
Essential Resource Article

Muddywater apt group and a methodology proposal…

by Tok, M. S. and Celiktas, B.
Essential Resource Video

WANNACRY: The World's Largest Ransomware…

by The TWS Channel

Lesson 5

Key Text eBook

Understanding Cyber-Warfare: Politics, Policy and…

by Whyte, C. and Mazanec, B.
Essential Resource Article

The Lazarus group: The Cybercrime Syndicate…

by Park, J.
Essential Resource Video

The Story Behind The Hack That Wreaked Havoc on…

by Cheddar
Essential Resource Video

The Sony Pictures Hack Explained

by Cinemagic English
Essential Resource Video

The Perfect Weapon (2020): Sony Hack (Clip) | HBO

by HBO
Essential Resource Website

Kim Jong Un has quietly built a 7,000-man cyber…

by Ioanes, E
Essential Resource Other

North Korean cryptocurrency operations: an…

by Kim, H. M., Lee, J., and Pak, R.

Lesson 6

Key Text eBook

Understanding Cyber-Warfare: Politics, Policy and…

by Whyte, C. and Mazanec, B.
Essential Resource Article

Russian Cyber Operations in the Invasion of…

by Lin, H.
Essential Resource Video

A Timeline of Russian Cyberattacks on Ukraine

by Wired
Essential Resource Website

Ukraine marks a turning point for cyberwarfare

by Vanberghen, C.
Essential Resource Website

Cyber Capabilities Are Not Weapons of War?

by Fidler, D.
Essential Resource Article

Cyber Warfare & Inadvertent Escalation

by Acton, J.M.
Essential Resource Video

How Cyberwarfare Actually Works

by Wendover Productions
Essential Resource Article

e-Health as a Target in Cyberwar: Expecting the…

by Wairimu, S
Essential Resource Video

Governments don't understand cyber warfare.…

by Bijou. R.,
Essential Resource Audio

The evolution of hybrid threats and possibilities…

by Tiilikainen. T.
Essential Resource Website

Ukraine says it is fighting first 'hybrid…

by Tidy, J.
Essential Resource Website

The advent of the ‘third revolution in military…

by Thornton, R. and Miron, M.
Essential Resource Article

Hannibal at the gates: Cyberwarfare & the…

by Datta, P.

Lesson 7

Key Text eBook

Understanding Cyber-Warfare: Politics, Policy and…

by Whyte, C. and Mazanec, B.
Essential Resource Other

NATO in the Cyber Age: Strengthening Security…

by Davis, S.
Essential Resource Other

The untold story of NotPetya, the most…

by Greenberg, A.
Essential Resource Video

Into The Grey Zone: How cyber warfare was used…

by Sky News
Essential Resource Other

Conceptualizing and countering hybrid threats and…

by Weissmann, M.D.
Essential Resource Other

Limiting viral spread: automated cyber operations…

by Kaminska, M., Broeders, D. and Cristiano, F.
Essential Resource Article

Cyber legalism: why it fails and what to do about…

by Kello, L.
Essential Resource Article

Virtual disenfranchisement: Cyber election…

by Schmitt, M.N.
Essential Resource Video

Into The Grey Zone: Exploring the invisible…

by Sky News
Essential Resource Article

Cyber Dimension of Hybrid Wars: Escaping a “Grey…

by Mazaraki, N. and Goncharova, Y.
Essential Resource Video

The history of Russia’s 2016 election meddling in…

by PBS NewsHour

Lesson 8

Key Text eBook

Understanding Cyber-Warfare: Politics, Policy and…

by Whyte, C. and Mazanec, B.
Essential Resource eBook

Cyber Security Politics

by Dunn Cavelty, M. and Wenger, A.
Essential Resource Other

Rough-and-ready: a policy framework to determine…

by Healey, J. and Jenkins, N.,
Essential Resource Article

Redefining deterrence in cyberspace: Private…

by Lilli, E.
Essential Resource Article

Cyber Threats and Vulnerabilities to Conventional…

by Montgomery, M. and Borghard, E.
Essential Resource Website

Cyber Deterrence Is Dead. Long Live Cyber…

by Smeets, M. and Soesanto, S.
Essential Resource Article

Cyber deterrence: the past, present, and future

by Soesanto, S. and Smeets, M.
Essential Resource Article

Cyber deterrence with imperfect attribution and…

by Welburn, J., Grana, J. and Schwindt, K.
Essential Resource Video

Cyber Report: Cyber Deterrence--What Works and…

by Defense & Aerospace Report
Essential Resource Other

The Five Eyes and offensive cyber capabilities:…

by Gold, J.
Essential Resource Video

Deterrence in Cyberspace — Joe Nye on…

by Belfer Center
Essential Resource Other

Characterizing the Risks of North Korean Chemical…

by Bennett, B. W. et al.
Essential Resource Video

Does cyber deterrence work?

by Government Matters

Lesson 9

Key Text eBook

Understanding Cyber-Warfare: Politics, Policy and…

by Whyte, C. and Mazanec, B.
Essential Resource Website

2023 threat predictions: Beware 'economic…

by Weigand, S.
Essential Resource Website

Cybersecurity predictions for 2023, according to…

by Robson, K.
Essential Resource Website

Machine Learning in Cybersecurity: How It Works…

by Gottsegen, G.
Essential Resource Article

CyberSecurity attack prediction: a deep learning…

by Fredj, B. et al.
Essential Resource Article

Internet of things meet internet of threats: New…

by Djenna, A., Harous, S., and Saidouni, D. E.
Essential Resource Other

Internet of things and distributed denial of…

by Díaz, J. E. M.
Essential Resource Website

Statement on AI Risk

by Center for AI Safety

Footer

  • Library Portal
  • Academic Skills
  • English Language
  • Workshops
  • One-to-one Appointments

Footer 2

  • About Us
  • iLearn
  • News Hub
  • Support
  • Feedback To Win

Footer3

  • About Arden University
  • Cookies Policy
  • Privacy Policy
Contact Us
address icon

Arden University,
Middlemarch Park,
Coventry, CV3 4FJ, UK

email icon

Library@arden.ac.uk
AcademicSkills@arden.ac.uk
EnglishLanguageHub@arden.ac.uk

footer logo

Follow us on

  • Arden twitter

© 2005-2025 Arden University  | All rights reserved