Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats 1st Edition

3.9 out of 5 stars 7 customer reviews
ISBN-13: 978-1597496131
ISBN-10: 1597496138
Why is ISBN important?
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used On clicking this link, a new layer will be open
$9.46 On clicking this link, a new layer will be open
Buy new On clicking this link, a new layer will be open
$39.36 On clicking this link, a new layer will be open
More Buying Choices
25 New from $33.52 22 Used from $4.96 1 Collectible from $89.44
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student

Save Up to 90% on Textbooks Textbooks
$39.36 FREE Shipping. In Stock. Ships from and sold by Amazon.com. Gift-wrap available.

Frequently Bought Together

  • Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
  • +
  • Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day
Total price: $63.37
Buy the selected items together

Editorial Reviews


"Risks have evolved. We haven’t. While we stabilize toward checkbox compliance, adversaries and IT accelerate onward. Adversaries know you’re compliant – and do not care – they’re counting on it. Let’s replace faith-based dogma with intellectual honesty. As fellow Cassandras, Will and John confront you with modern threat models and challenge you to adapt".--Joshua Corman, Research Director for Enterprise Security, The 451 Group

"During 2010 three specific names signaled a fundamental shift in the risks that come from dealing in an interconnected world: Project Aurora, Stuxnet, and Wikileaks. This book provides the insights of an intelligence analyst on what got us to this point, and forecasts what information security professionals will be dealing with in the near future".--James Turner, Advisor, IBRS

"Cybercrime and Espionage was probably the most comprehensive and relevant book on the cyber security landscape written to date. The authors captured the true essence of the methods and cyber trade craft backed with use case after use case. I find this book a must have for any security professional or executive that has the responsibility for ensuring the protection of their corporate infrastructure."--Alan Kessler VP & GM HP Networking Security Products Group/TippingPoint

"John and Will have done a great job in framing the threat landscape and pointing out just how far we have to go in order to truly understand the cyber threats confronting us, to better secure our networks, and to mitigate risk within our respective organizations. Cybercrime and Espionage is a great read and should provide a call to action for any executive management team. Well done."--Nick Lantuh, President of Netwitness Corporation

"Overall, this was a really interesting reading material. The authors managed to provide a fresh perspective on the intricacies surrounding modern cyber crime of today, but have not neglected the ‘big picture’."--Help Net Security

About the Author

Will Gragido possesses over 18 years of information security experience. A former United States Marine, Mr. Gragido began his career in the data communications information security and intelligence communities. After USMC, Mr. Gragido worked within several information security consultancy roles performing and leading red teaming, penetration testing, incident response, security assessments, ethical hacking, malware analysis and risk management program development. Mr.Gragido has worked with a variety of industry leading research organizations including International Network Services, Internet Security Systems / IBM Internet Security Systems X-Force, Damballa, Cassandra Security, HP DVLabs, and now RSA NetWitness, where he leads the RSA FirstWatch Advanced Threat Intelligence team.

Will has deep expertise and knowledge in operations, analysis, management, professional services & consultancy, pre-sales / architecture and strong desire to see the industry mature and enterprises & individuals become more secure. Will is a long-standing member of the ISC2, ISACA, and ISSA. Mr.Gragido holds the CISSP and CISA certifications, as well as accreditations in the National Security Agency's Information Security Assessment Methodology (IAM) and Information Security Evaluation Methodology (IEM). Additionally, Mr.Gragido is a Faculty Member of the IANS Institute where he specializes in advanced threat, botnet, and malware analysis. Mr.Gragido is a graduate of DePaul University and is currently preparing for graduate school. An internationally sought after speaker, Will is the co-author of Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats.

John Pirc has more than 19 years of experience in Security R&D, worldwide security product management, marketing, testing, forensics, consulting, and critical infrastructure architecting and deployment. Additionally, John is an advisor to HP’s CISO on Cyber Security and lectured at the US Naval Post Graduate School.

John extensive expertise in the Security field stems from past work experience with the US Intelligence Community, as Chief Technology Officer at CSG LTD, Product Manager at Cisco, Product Line Executive for all security products at IBM Internet Security Systems, Director at McAfee's Network Defense Business Unit, Director of Product Management at HP Enterprise Security Products, Chief Technology Officer at NSS Labs, Co-Founder and Chief Strategy Officer at Bricata, LLC and most recently as Director of Security Solutions for Forsythe Technology.

In addition to a BBA from the University of Texas, John also holds the NSA-IAM and CEH certifications. He has been named security thought leader from SANS Institute and speaks at top tier security conferences worldwide and has been published in Time Magazine, Bloomberg, CNN and other tier 1 media outlets.

Product Details

  • Paperback: 272 pages
  • Publisher: Syngress; 1 edition (February 7, 2011)
  • Language: English
  • ISBN-10: 1597496138
  • ISBN-13: 978-1597496131
  • Product Dimensions: 7.5 x 0.6 x 9.2 inches
  • Shipping Weight: 1.2 pounds (View shipping rates and policies)
  • Average Customer Review: 3.9 out of 5 stars  See all reviews (7 customer reviews)
  • Amazon Best Sellers Rank: #1,127,317 in Books (See Top 100 in Books)

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Top Customer Reviews

Format: Kindle Edition Verified Purchase
This is an amazingly thoughtful and well researched book that provides a comprehensive and approachable overview of the world of crime and espionage as it pertains to the electronic world. If you don't have a background in intelligence and espionage matters, this is a great book that will get you up to speed in a manner that you can use in your day to day working life. The authors go out of their way to educate the reader in a broad manner about the world of intelligence. For example, they spend a considerable amount of time delving into the physical world of espionage and using that as a tool to teach readers about basic concepts and how they apply to the electronic world.

As an amateur historian, one of the things that appealed to me about this book is the attention to detail and depth that the authors go into in providing historical context for the world of crime and espionage. They make excellent use of historical figures such as Cicero, Seneca, Hammurabi, and Sun Tzu. Because human nature does not change, neither does the usefulness of learning from the examples and philosophy of historical figures such as these when trying to understand the modern world.

This work provides a solid philosophical underpinning for understanding the fundamentals of the modern world of cybercrime and espionage. It provides exceptional clarity for the events of the day by using the past to bring current events into focus. APT (Advanced Persistent Threat), for example, is a key element of this book. The authors discuss this issue using the lens of history while tapping modern events and researchers to explain the current state of affairs.

The book's eighth chapter provides an excellent example of how the authors blend history and current affairs to explain a point.
Read more ›
Comment 7 of 7 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
The book "Cybercrime and Espionage" by Will Gragido and John Pirc was written by two experienced Information Security Professionals who bring to the table a macroscopic approach to mitigating risks in today's evolving threat landscape.
The intended audience could appeal to historians, regular internet users, and anyone interested in the methods and motivations of cybercriminals and cyber espionage operators. These methods come to life with the author's use of case studies. For example Danielle Duann, a former IT manager who was sentenced 3 years of supervised release and $94,000 in restitution for destroying organ donation records after being fired from her job. Her method of access was creating a fake vpn user account. Moral of the story is a cybercriminal's motive could be revenge as opposed to profit. Also, a security professional must implement regular audits of user accounts, paying special attention to super users like Danielle.
I enjoyed Chapter 11 - Hiding in plain sight: Next generation techniques' and tools for avoidance and obfuscation. In it, the authors discuss techniques on how to bypass security hardware/software controls with publically available free tools. Websites like virscan.org provide quality assurance testing for malware by running the file through AV vendor engines which report back any positives. IP spoofing methods: "The Onion Router" TOR, allows you to route your traffic through multiple nodes all over the world which encrypt the source ip as it passes through each node.
The author's stress how and why methods are becoming more sophisticated. Mainly because criminals choose the less risky method of stealing credit card numbers as opposed to going in and robbing a bank.
Read more ›
Comment 6 of 6 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
I read this book with a critical eye knowing that it's title evokes a lot of skepticism and questions. I was pleasantly surprised to see the direction the authors had elected to take the book. It was very clear to me that they were targeting a wide audience, one which comprised the schooled and unschooled, in an attempt to introduce complex concepts and ideas. I was impressed by the detail and time put into the chapters. I found the emphasis on human intelligence extremely compelling and believe that the authors did a great job in establishing ties which bind the concepts clearly. Unlike other reviewers I didn't read or anticipate more than what the book or it's jacket implied. It's clear to me that the authors were setting the stage for future works; works that would provide and included more specific detailed analysis of individual attacks, operations and compromises. I'd like to see more of this in a second edition. I think the this book provides an excellent introduction into a world which many are simply ignorant of or choose to ignore.
Comment 2 of 2 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
This book provides a very good overview of the state of cybercrime in the world today. It is pretty obvious that the authors are experts in the field and make their living by helping large corporations secure their assets. Their observations and recommendations obviously come from their work keeping us safe from the bad guys. I was somewhat shocked at how massive the cyber threat really is and how sophisticated the attacks are becoming and that this is big business. Fortunately this book discussed some of the most current trends and techniques being employeed to combat the growing threat. Sometimes these topics can be somewhat dry but the authors keep it interesting and it makes for a good read. I highly recommend it.
Comment 3 of 5 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Set up an Amazon Giveaway

Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
This item: Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Price: $39.36
Ships from and sold by Amazon.com

Want to discover more products? Check out this page to see more: ebay books