Table of Contents Chapter 1. Cyber Warfare: Here and Now What Is Cyber War? Is Cyber War a Credible Threat? Attribution, Deception, and Intelligence Information Assurance I: Cyber Attack Chapter 2. Political Cyber Attack Comes of Age in 2007 Information in this Chapter Reliance on Information as a Vulnerability Rudimentary but Effective: Denial of Service Leaving Unwanted Messa…