Trusted recovery and defensive information warfare by Sushil Jajodia, Peng Liu | Lex | Lex