Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

Cybersecurity and Cyberwar: What Everyone Needs to Know® 1st Edition

4.4 out of 5 stars 113 customer reviews
ISBN-13: 978-0199918119
ISBN-10: 0199918112
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon

Sorry, there was a problem.

There was an error retrieving your Wish Lists. Please try again.

Sorry, there was a problem.

List unavailable.
Buy used On clicking this link, a new layer will be open
$3.98 On clicking this link, a new layer will be open
Buy new On clicking this link, a new layer will be open
$11.99 On clicking this link, a new layer will be open
More Buying Choices
84 New from $7.50 56 Used from $3.97
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


The American Revolution: A Visual History
Visual History of the American Revolution
This complete overview of the war brings all the action to life, from the Boston Massacre and the Boston Tea Party to the Declaration of Independence and the Treaty of Paris. Hardcover
$11.99 FREE Shipping on orders with at least $25 of books. In Stock. Ships from and sold by Amazon.com. Gift-wrap available.

Frequently Bought Together

  • Cybersecurity and Cyberwar: What Everyone Needs to Know®
  • +
  • Cyber War: The Next Threat to National Security and What to Do About It
  • +
  • Future Crimes: Inside the Digital Underground and the Battle for Our Connected World
Total price: $34.27
Buy the selected items together

NO_CONTENT_IN_FEATURE

Image
Looking for the Audiobook Edition?
Tell us that you'd like this title to be produced as an audiobook, and we'll alert our colleagues at Audible.com. If you are the author or rights holder, let Audible help you produce the audiobook: Learn more at ACX.com.

Product Details

  • Series: What Everyone Needs to Know
  • Paperback: 320 pages
  • Publisher: Oxford University Press; 1 edition (January 3, 2014)
  • Language: English
  • ISBN-10: 0199918112
  • ISBN-13: 978-0199918119
  • Product Dimensions: 8.2 x 0.9 x 5.5 inches
  • Shipping Weight: 1 pounds (View shipping rates and policies)
  • Average Customer Review: 4.4 out of 5 stars  See all reviews (113 customer reviews)
  • Amazon Best Sellers Rank: #18,773 in Books (See Top 100 in Books)

Related Media

Customer Reviews

Top Customer Reviews

Format: Kindle Edition Verified Purchase
In Cybersecurity and Cyberwar, co-authors Peter W. Singer and Allan Friedman provide public policy and national security professionals with a comprehensive overview of cybersecurity matters. In straightforward prose, Singer and Friedman answer key questions in three parts: how it all works, why it matters, and what can be done and address subjects ranging from advanced persistent threats, cyber force structure, options for deterrence, the balance between offense and defense, lessons from public health, to the incentives behind public-private partnerships. To round out the discussion, I would strongly recommend Cybersecurity and Cyberwar in conjunction with with Ronald Deibert’s Black Code: Inside the Battle for Cyberspace and Thomas Rid’s Cyber War Will Not Take Place.
Comment 31 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
Like most people I was looking for answers to my personal LAN security issues and picked this book in the hopes of getting a deeper understanding of how to secure my network. But, I got an even better deal instead. This book covers the entire state of cyber security issues from car theft by network interference to Cyberwar.

The issue of network security has become global in scope and there are no political boundaries in Cyberspace. Nothing separates us personally from being raided by a thief whether he be an individual using an electronic jamer to keep your car unlocked or an employee of the Chinese government using commercial routers to collect personal data against you.

The misuse and abuse of Cyberspace is predicated on the natural openness of the design of the Ethernet. Education about the current situation is our primary defense against those who would use this valuable tool against us. And this book does an excellent job of appraising us about the dangers and defenses inherent in this communications medium.

This is not a book about how to setup the network security switches on your operating system. This is the book to tell you what has been happening in the entire world of Cyberspace that can affect you directly. Before you can defend yourself you need to know what the threat really is.

Most of the book is spent covering the current world level security threat complex. With the exception of Denial of Service and RoboLensing attacks, the book gives the reader very good advice on how to deny the attackers effective access to your computer network. The general answer lies here.

As in personal self defense, the answer comes through more effective communication with the security community and application of proper security measures. Reducing your threat cross section by using the approaches detailed in the book will help you to protect your data and your sleep.
Comment 20 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Kindle Edition Verified Purchase
For those who want to keep up on the latest information of where we are in this cyber world, this book is for you. I just could not put it down. There are so many questions that we don't find answers to in the local coffee shop. A sip of java and a shrug are not enough. For example, what is Stuxnet? Why is privacy so hard to maintain? Where do viruses and malware come from? Why can't we catch cyber villains? What are the larger threats? The smaller threats? What agencies protect us? What is cyber war? How can the ordinary person protect himself on line? So many important questions. Singer and Friedman have shown expertise in answering them, and sometimes with interesting stories from behind the scenes. For me, this is essential reading. And, like all things about computers, time sensitive. Read it now, and hope for a new book next year.
Comment 35 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
Dr. Singer's books are always engaging, and this book, co-authored Allan Friedman, continues that tradition.

This book is written to be consumed by any thoughtful reader -- it is not a deep dive in UNIX system administration challenges, it not full of computer acronyms, it does not require an advanced degree in computer science.

This book clearly educates the reader about cybersecurity issues, and then expands upon this discussion to enable the reader to conceptualize the challenges of the subject. A good example of this is their Short History of the Internet, which is a clear and concise and enjoyable read by itself. This history includes, in layman's terms, evolution, funding agencies, control entities, architecture, Al Gore, governance, cryptographic keys, and more. With this foundation the authors then expand into many cybersecurity challenges, like WikiLeaks and a variety of security threats.

I particularly liked the discussions on attribution, cybercrimes, and cyber terrorism -- these are not simple issues, and the authors articulate some of the complexities of attribution that make cybersecurity so difficult.

The authors wrap up the book by defining the Five Key Trends that Affect the Future of Cybersecurity – Cloud Computing, Big Data, Mobile, Cyberspace Demographics, and Internet-of-Things (IoT). These trends all increase the problem space of cybersecurity, and the authors define how these trends will drive an even higher demand for security in our future systems.

With this history, description of threats, frameworks, and trends, the authors truly accomplish their goal of delivering a primer of what one needs to know about cybersecurity and cyberwar.
Comment 9 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Recent Customer Reviews

Set up an Amazon Giveaway

Cybersecurity and Cyberwar: What Everyone Needs to Know®
Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more
This item: Cybersecurity and Cyberwar: What Everyone Needs to Know®