Military history and network security

What can military history teach us about network security?