Table of Contents
1. History of Cyber Conflicts
2. Notable Threats and Trends
3. Operational Security Successes and Failures
4. The Information Warfare Component
5. Programming Languages, Tools, and Frameworks
6. Setting Up Your Malware Lab
7. ProofofConcept Evasive Malware
8. Evasive Adversarial Tradecraft
9. Emerging Threats and Trends
Index
2. Notable Threats and Trends
3. Operational Security Successes and Failures
4. The Information Warfare Component
5. Programming Languages, Tools, and Frameworks
6. Setting Up Your Malware Lab
7. ProofofConcept Evasive Malware
8. Evasive Adversarial Tradecraft
9. Emerging Threats and Trends
Index