What's in a hat?
Chapter 1: Is it Legal to Strike Back?
Chapter 2: Automated Strike Back Worms
Chapter 3: Targeting an Attacking Host
Chapter 4: Aggressive Intrusion Prevention Systems Chapter 5: Honey Pots and Honey Nets
Chapter 6: Windows Insecurity: Shattering the Glass. Chapter 7: Disinformation Campaigns
Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know Your Enemy: Social Engineering Chapter 10: Google This!
Chapter 11: When Enough is Enough