Whitepaper:

How to survive a hacking attack?