Description of  Bytes, Bombs, and Spies: The Future of Offensive Cyber Operations

 
HyperLink