Syse H., Plato: The Necessity of War, the Quest or Peace, „Journal of Military Ethics” 2002, vol. 1, no. 1, p. 36–44.
Aristotle, The Politics, Blacksburg 2009.
von Elbe J., The Evolution of the Concept of the Just War in International Law, „American Journal of International Law” 1939, vol. 33, p. 666-667.
Nussbaum A., Just War – A Legal Concept?, „Michigan Law Review” 1943, vol. 42, no. 3, p. 453-479.
Cicero M.T., Rudd N., Powell J.G.F., The republic, and the laws, Oxford 2008.
Augustine Saint Bishop of Hippo, Dods M., The city of god, Peabody 2013.
Isidore of Seville, Lindsay W. M., Isidori Hispalensis Episcopi Etimologiarum Sive Originum, Libri XVIII (1), Oxford 1911.
Bacon F., New Atlantis, Cambridge 2010.
Suarez F., Pereña L., Guerra, Intervención, Paz Internacional, Espasa-Calpe Madrid 1959, p. 76-77.
Blank L., Guiora A., Teaching an Old Dog New Tricks: Operationalizing the Law of Armed Conflict in New Warfare, [in:] The Laws of War and 21st Cenury Conflict, Gaston E.L. (ed.), New York 2012.
Das S. K., Kant K., Zhang N., Handbook on Securing Cyber-Physical Critical Infrastructure, Burlington 2012.
Loukas G., Cyber-Physical Attacks: A Growing Invisible Threat, Waltham 2015.
Aleksa K. (ed), Ką turime žinoti apie pasirengimą ekstre ma liosioms situacijoms ir karo metui, Vilnius 2014, p. 70, http://www.kam.lt/download/46229/ka%20turime%20zinoti%20(knyga%202014)%20sk.pdf (13 XI 2015).
Held D, The changing structure of international law: sovereignty transformed?, [in:] The Global Transformations Reader: an Introduction to the Globalization Debate, Held D., McGrew A. (eds.), Cambridge 2000, p. 162, https://www.polity.co.uk/global/pdf/GTReader2eHeld.pdf (13 XI 2015).
Schmitt M. N. (ed.), Tallinn Manual on the International Law Applicable to Cyber Warfare, Cambridge-New York 2013, p. 15-18, https://ccdcoe.org/tallinn-manual.html (13 XI 2015).
Rid T., Cyber war will not take place, [in:] Cyber Warfare. Critical Perspectives, Ducheine P., Osinga F., Soeters J. (eds.), Hague 2012.
Dinstein Y., Computer Network Attacks and Self-Defense, „International Law Studies” 2002, vol. 76, p. 99-119.
Pietraś M., Marzęda K. (eds.), Późnowestfalski ład międzynarodowy, Lublin 2008.
Lists of Intangible Cultural Heritage and the Register of Best Safeguarding Practices, http://www. unesco.org/culture/ich/en/lists (13 XI 2015).
The Antarctic Treaty, http://www.ats.aq/e/ats.htm (13 XI 2015).
Boulanin V., Arms production goes cyber: a challenge for arms control (SIPRI 2015), http:// www.sipri.org/media/newsletter/essay/Boulanin_May13 (13 XI 2015).
Abbet J., Inventing the Internet, Cambridge 2000.
Bordoni C., A Crisis Of The State? The End Of The Post-Westphalian Model (12 II 2013), http:// www.socialeurope.eu/2013/02/a-crisis-of-the-state-the-end-of-post-westphalian-model/ (13 XI 2015).
Cassese A., Current challenges to international humanitarian law, [in:] The Oxford handbook of international law in armed conflict, Clapham A., Gaeta P. (eds.), Oxford 2014.
The United States Army’s Cyberspace Operations Concept Capability Plan 2016-2028, Department of the Army USA TRADOC Pamphlet 525-7-8 (22 II 2010), p. 6, http://fas.org/irp/ doddir/army/pam525-7-8.pdf (14 XI 2015).
Barak A, Suler J., Reflections on the Psychology and Social Science of Cyberspace, [in:] Psychological Aspects of Cyberspace: Theory, Research, Applications, Barak A. (ed.), Cambridge-New York 2008, p. 1-12.
Abe K., Human Rights-ization of International Law: a Critical Analysis of the „Ethical Turn”, „Kokusaihō gaiko zasshi” 2013, vol. 111, p. 1-28, http://catalogue.ppl.nl/DB=1/SET=1/TTL= 211/SHW?FRST=216 (13 XI 2015).
United Nations Peacekeeping Group: Capacities to Ensure Integration, http://www.un.org/ en/peacekeeping/documents/dpkodfs_org_chart.pdf (13 XI 2015).
Troop and police contributors, http://www.un.org/en/peacekeeping/resources/statistics/contributors. shtml (13 XI 2015).
South Sudan accelerates ICT in all sectors, http://www.unesco.org/new/en/communication- -and-information/resources/news-and-in-focus-articles/in-focus-articles/2015/south-sudan- -accelerates-icts-in-all-sec tors (13 XI 2015).
Liberia’s ICT and Telecom Policy, http://www.moci.gov.lr/doc/ICT%20_%20Telecom%20Policy% 20Main%20Body.pdf (13 XI 2015).
Boutin B.,The Role of Control in Allocating International Responsibility in Collaborative Military Operations, Amsterdam 2015, (Ph.D. thesis Amsterdam Center for International Law of the University of Amsterdam).
Arnolds E. B., Garland N. F., The Defense of Necessity in Criminal Law: The Right to Choose the Lesser Evil, „Journal of Criminal Law and Criminology” 1974, vol. 65, no. 3, p. 289-301.
Barney D., White Hat Hackers – the forgotten good guys (31 III 2015), http://www.gfi.com/ blog/white-hat-hackers-the-forgotten-good-guys/ (13 XI 2015).
Peacekeeping Fact Sheet (31 VIII 2015), http://www.un.org/en/peacekeeping/resources/statistics/ factsheet.shtml (13 XI 2015).
Emergency Communications for Disaster Relief Deployment Archive, http://www.unfoundation. org/what-we-do/legacy-of-impact/technology/disaster-relief-deployments/ (13 XI 2015).
United Nations Global Pulse. Harnessing big data for development and humanitarian action, http://www.unglobalpulse.org/about-new (13 XI 2015).
SETI@home, http://setiathome.ssl.berkeley.edu/ (13 XI 2015).
Nye J. S., Soft Power: The Means to Success in World Politics, New York 2006.
Osmançavuşoğlu E., Challenges to United Nations peacekeeping operations in the post-Cold War era, „Journal of International Affairs” 1999-2000, vol. IV, no. 4, http://sam.gov.tr/wp-content/ uploads/2012/02/EmelOsmanCavusoglu.pdf (13 XI 2015).