Strategic Cyber Effects (2) | part of Cyber Operations: A Case Study Approach | Wiley Data and Cybersecurity books | IEEE Xplore