This book is written to be a comprehensive guide to cybersecurity and cyberwar policy and strategy, developed for a one- or two-semester class for students of public policy (including political science, law, business, etc.). Although written from a U.S. perspective, most of its contents are globally relevant.It is written essentially in four sections. The first (chapters 1 – 5) describes how compromises of computers and networks permit unauthorized parties to extract information from such...