Please Sign Up to Request This Product

Inside Cyber Warfare

Mapping the Cyber Underworld

You need to be an approved reviewer to request a product. Please sign up to request access or login to your account.

If you've already signed up and you haven't heard from us yet please email and we will check on your request.


Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world use the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. The second edition goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside recent cyber-conflicts, including the use of Stuxnet. It also includes a foreword by Secretary Michael Chertoff and a guest essay by Melissa Hathaway, among others.


On Feb 16 Rob Edwards wrote: Interesting Read
The book provides a good insight and snap shot of the climate of Cyber attacks, this can be challenging in what is a fast moving field. It is a must read if you want to understand the history of this field and see the roots of the current policies. Full Review  >

Rating: StarStarStarStarStar3.0

On Aug 30 Jon Unger wrote: An Inside Look at the Cyber Battlefield
Jeffery Carr's tell-all book was an interesting analysis into the current threat that the government and businesses face from the rise in using cyberspace as the new grounds for warfare. Originally I picked up the book thinking that this particular selection would help me in securing my network and/or maybe more of what the existing threats are within the Enterprise. Unfortunately the book focused more on the hidden world of government funded cyber pirates. This book took me quite a while to finish it up but I do remember that many of the concepts reminded me of how the entire Wikileaks and anonymous cyber war played out. I would say though that this book is probably the most detailed and best written book on the topic that I have came across. So I would, and have, recommended the book to several others that are more interested in cyber-terrorism and how the governments of today are using worms and Denial of Service attacks as their weapons. Full Review  >

Rating: StarStarStarStarStar3.0

On Aug 28 Bruno Sanchez wrote:
Full Review  >

Rating: StarStarStarStarStar1.0

On Aug 11 Mark Saunders wrote:
Full Review  >

Rating: StarStarStarStarStar4.0

On Mar 17 Pasan Wijesinghe wrote: A Very Descritive Book on Internet Wars
Jeffrey Carr is a well known computer security consultant and has worked with US defense authorities. So he is, by all means, in full capacity to write a book in this field which is unfamiliar to a majority of people with and without a technological background. Full Review  >

Rating: StarStarStarStarStar3.0

On Feb 15 Michael Lockwood wrote:
Full Review  >

Rating: StarStarStarStarStar4.0

On Feb 10 Alexey Smirnov wrote:
Full Review  >

Rating: StarStarStarStarStar4.0

On Jan 17 Tushar Jain wrote:
Full Review  >

Rating: StarStarStarStarStar3.0

On Dec 28 Juan Jose de Leon wrote: Cyber-attacks nature not covered in media
If you though hackers we're just bored teenagers, this book will change your mind. Full Review  >

Rating: StarStarStarStarStar4.0

Receive free ebooks and videos in exchange for your reviews.

Join the O'Reilly Reader Review Program

Learn more >


Top Reviewers

Michal Konrad Owsiak, 94 Reviews

Santosh Shanbhag, 61 Reviews

Surachart Opun, 60 Reviews

Doron Katz, 57 Reviews

Shawn Day, 55 Reviews

See More Reviewers >

Featured Review

Mobile Design Pattern Gallery

Roberto Albano wrote:
Mobile Design Pattern Gallery by Theresa Neil
For whom it may concern mobile application development, this singular book can really help to… Full Review >

Rating: StarStarStarStarStar4.0