This volume presents scientific explanations of information warfare techniques, exploring their effects on military operations and the enterprise. It offers a template for planning infowar countermeasures based on risk, covering stealth communications and anti-hacking techniques.