Table of Contents
Chapter 1. Cyber Warfare: Here and Now
Is Cyber War a Credible Threat?
Attribution, Deception, and Intelligence
Chapter 2. Political Cyber Attack Comes of Age in 2007
Reliance on Information as a Vulnerability
Rudimentary but Effective: Denial of Service
Leaving Unwanted Messages: Web Site Defacement
The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack
Get Introduction to Cyber-Warfare now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.