Martin C. Libicki
36 works on record
Works

Conquest in Cyberspace
2007

Byting Back--Regaining Information Superiority Against 21st-Century Insurgents
2007

Exploring Terrorist Targeting Preferences
2007

Collecting the dots
2004

Defending cyberspace, and other metaphors
1997

Information technology standards
1995

The mesh and the net
1994

What makes industries strategic
1989

Cyberdeterrence and cyberwar

Mind the Gap

Byting BackA-Regaining Information Superiority Against 21st-Century Insurgents: RAND Counterinsurgency StudyA-Volume 1

How Insurgencies End

A Framework for Programming and Budgeting for Cybersecurity

Getting to Yes with China in Cyberspace

The U.S.-China Military Scorecard

Root Cause Analyses of Nunn-McCurdy Breaches

Assessing Living Conditions in Iraq's Anbar Province in 2009
Illuminating tomorrow's war
1999
The intersystem, or the RMA reified
1997
Information dominance
1997
Information & nuclear RMAs compared
1996
Tomorrow's Air Force
1996
Standards
1995
What is information warfare?
1995
The next enemy
1995
Standards: the rough road to the common byte
1994
The common byte, or, Why excellent information technology standards are both absolutely essential and utterly impossible
1992
Industrial strength defense
1988
Global demographic change and its implications for military power
Influences on the adoption of multifactor authentication
What should be classified?
Dominant battlespace knowledge
H4cker5 wanted
What Is Information Warfare? (SuDoc D 5.417:28)
WWW.U.S.DoD.Com
New Calculus of Escalation