ABSTRACT

As such, the subject matter of this book varied widely, from detailed case histories and tactical analyses of specific attack-types to sweeping assessments of the major socioeconomic and technical factors shaping the information security environments of critically important countries. e balanced interweaving of technical depth with social and geopolitical breadth is essential to form the basis of a thorough understanding of information security’s core dynamics.