I. Cyber attack -- II. Cyber espionage and exploitation -- III. Cyber operations for infrastructure attack.
Summary
This book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well.