Contents: Chapter 1 Could something like this really happen Chapter 2 It’s all about the information Chapter 3 A cyber pearl harbor Chapter 4 Eligible receiver Chapter 5 Solar sunrise, moonlight maze Chapter 6 The coordinator meets mudge Chapter 7 Deny, exploit, corrupt, destroy Chapter 8 Tailored access Chapter 9 Cyber wars Chapter 10 Buckshot yankee Chapter 11 The who…