Table of Contents
- Theory on Adversarial Operations and Principles of Computer Conflict
- Preparing for Battle
- Invisible is Best (Operating in Memory)
- Blending In
- Active Manipulation
- Real-Time Conflict
- The Research Advantage
- Clearing the Field

Offense versus defense in real-time computer conflict