Ch. I. Introduction -- Ch. II. The power of terrorism -- Ch. III. Cyber terrorism evolution -- Ch. IV. Global information infrastructure -- Ch. V. Current cyber attack methods -- Ch. VI. Attack scenarios -- Ch. VII. Thoughts for the future
Summary
"This book is a brief that outlines many of the recent terrorist activities, political objectives, and their use of cyber space"--Provided by publisher