-- Assessing the problem
-- The rise of the non-state hacker
-- The legal status of cyber warfare
-- Responding to international cyber attacks as acts of war
-- The intelligence component to cyber warfare
-- Non-state hackers and the social web
-- Follow the money
-- Organized crime in cyberspace
-- Investigating attribution
-- Weaponizing malware
-- The role of cyber in military doctrine
-- A cyber early warning model
-- Advice for policy makers from the field
-- Afterword.
-- The rise of the non-state hacker
-- The legal status of cyber warfare
-- Responding to international cyber attacks as acts of war
-- The intelligence component to cyber warfare
-- Non-state hackers and the social web
-- Follow the money
-- Organized crime in cyberspace
-- Investigating attribution
-- Weaponizing malware
-- The role of cyber in military doctrine
-- A cyber early warning model
-- Advice for policy makers from the field
-- Afterword.