Abstract

This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat. Incorporates expertise from diverse viewpoints from the military, government agencies, industry, and academia Provides an informative timeline of key events in the development of cyber warfare capabilities Highlights the most prominent and effective cyber attacks in history as well as legal attempts to curb them

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call