Hybrid Threat. Washington, DC: Department of the Army, 2010.
Harmon, Christopher C.. "
Illustrations of Discrete Uses of Force." In
Toward a Grand Strategy Against Terrorism, 114-115. New York: McGraw-Hill, 2010.
Cobb, Scott E.. The Importance of a U.S. Security Strategy in the Caspian Black Sea N/A Region In
USMC Command and Staff College. Vol. Master of Military Studies . Quantico, VA: Marine Corps University, 2010.
Wegener, Anne-Christine, and Mark Pyman. "
The Importance of Integrity Building." In
Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 178-185. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Minchev, Zlatogor. Information Processes and Threats in Social Networks: A Case Study In
IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Peltier, Thomas R.. Information Security Risk Analysis. 3rd ed. Boca Raton, FL: CRC Press, Taylor & Francis Group, 2010.
Frinking, Erik J., and J.G.M. Rademaker. "
Inlichtingen en Veiligheidsdiensten." In
Nationale Veiligheid en inlichtingen, 189-204. Alphen aan den Rijn: Kluwer, 2010.
Carr, Jeffrey. Inside Cyber Warfare. Sebastopol, CA: O’Reilly Media, 2010.
Lucas, George. "
Integrity Issues Related to Military Operations." In
Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 149-162. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Sahukar, Behram A.. "
Intelligence and Defence Cooperation in India." In
Intelligence Cooperation Practices in the 21st Century: Towards a Culture of Sharing, 31-41. Amsterdam: IOS Press, 2010.