CyberSecurity

Chapter 1. Defensive Information Warfare
Chapter 2. Analogies and Realities
Chapter 5. Formulating the Problem
Chapter 7. Threat Characteristics
Chapter 8. Proposed IW-D Strategy
Chapter 9. Managing the Solution
Chapter 10. Framework for Progress
Chapter 11. Allocation of Responsibilities
Chapter 13. IWS Awareness and Understanding
Chapter 15. Building a Defense-in-Depth
Chapter 16. Organizational Action Plan