Please Sign Up to Request This Product

Inside Cyber Warfare

Mapping the Cyber Underworld

You need to be an approved reviewer to request a product. Please sign up to request access or login to your account.

If you've already signed up and you haven't heard from us yet please email reviewers@oreilly.com and we will check on your request.

Description

Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world use the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. The second edition goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside recent cyber-conflicts, including the use of Stuxnet. It also includes a foreword by Secretary Michael Chertoff and a guest essay by Melissa Hathaway, among others.

Reviews

On Feb 16 Rob Edwards wrote: Interesting Read
The book provides a good insight and snap shot of the climate of Cyber attacks, this can be challenging in what is a fast moving field. It is a must read if you want to understand the history of this field and see the roots of the current policies. Full Review  >

Rating: StarStarStarStarStar3.0

On Aug 30 Jon Unger wrote: An Inside Look at the Cyber Battlefield
Jeffery Carr's tell-all book was an interesting analysis into the current threat that the government and businesses face from the rise in using cyberspace as the new grounds for warfare. Originally I picked up the book thinking that this particular selection would help me in securing my network and/or maybe more of what the existing threats are within the Enterprise. Unfortunately the book focused more on the hidden world of government funded cyber pirates. This book took me quite a while to finish it up but I do remember that many of the concepts reminded me of how the entire Wikileaks and anonymous cyber war played out. I would say though that this book is probably the most detailed and best written book on the topic that I have came across. So I would, and have, recommended the book to several others that are more interested in cyber-terrorism and how the governments of today are using worms and Denial of Service attacks as their weapons. Full Review  >

Rating: StarStarStarStarStar3.0

On Aug 28 Bruno Sanchez wrote:
Full Review  >

Rating: StarStarStarStarStar1.0

On Aug 11 Mark Saunders wrote:
Full Review  >

Rating: StarStarStarStarStar4.0

On Mar 17 Pasan Wijesinghe wrote: A Very Descritive Book on Internet Wars
Jeffrey Carr is a well known computer security consultant and has worked with US defense authorities. So he is, by all means, in full capacity to write a book in this field which is unfamiliar to a majority of people with and without a technological background. Full Review  >

Rating: StarStarStarStarStar3.0

On Feb 15 Michael Lockwood wrote:
Full Review  >

Rating: StarStarStarStarStar4.0

On Feb 10 Alexey Smirnov wrote:
Full Review  >

Rating: StarStarStarStarStar4.0

On Jan 17 Tushar Jain wrote:
Full Review  >

Rating: StarStarStarStarStar3.0

On Dec 28 Juan Jose de Leon wrote: Cyber-attacks nature not covered in media
If you though hackers we're just bored teenagers, this book will change your mind. Full Review  >

Rating: StarStarStarStarStar4.0

Receive free ebooks and videos in exchange for your reviews.

Join the O'Reilly Reader Review Program

Learn more >

Returning?

Top Reviewers

Michal Konrad Owsiak, 85 Reviews

Santosh Shanbhag, 56 Reviews

Shawn Day, 55 Reviews

Doron Katz, 53 Reviews

Surachart Opun, 53 Reviews

See More Reviewers >

Featured Review

CISSP Training Kit

Naim Qachri wrote:
CISSP Training Kit by David R. Miller; Microsoft Press
David R. Miller presents an alternative way to study each major chapter of the CISSP… Full Review >

Rating: StarStarStarStarStar4.0