computer break-ins, fraud, sabotage, espionage, piracy, identity theft, invasions of privacy, and electronic warfare. Denning describes these attacks with astonishing, real examples, as in her analysis of information warfare operations during the Gulf War Then, offering sound advice for security practices and policies, she explains countermeasures that are both possible and necessary.