Cyber Attacks, Counterattacks, and Espionage
In: Cryptography: Code Making and Code Breaking Ser
Cover -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- Chapter 1 A New Variation of Cryptography -- Chapter 2 Attackers have the Advantage -- Chapter 3 What Do Cyber Criminals Want -- Chapter 4 The Nations Respond -- Glossary -- For More Information -- For Further Reading -- Bibliography -- Index -- About the Author -- Back Cover