The focus of Chapter 12, Incendiary attacks, may seem irrelevant in InfoSec, until we consider the role of the Podesta email and the DNC hacks.
Sun Tzu advises that we should first make ourselves invincible, and then await enemy vulnerability. Does this idea work in the realm of Cyber Security?