The focus of Chapter 12, Incendiary attacks, may seem irrelevant in InfoSec, until we consider the role of the Podesta email and the DNC hacks.
The focus of Chapter 12, Incendiary attacks, may seem irrelevant in InfoSec, until we consider the role of the Podesta email and the DNC hacks.