Inside Cyber Warfare: Mapping the Cyber Underworld and over one million other books are available for Amazon Kindle. Learn more

Sorry, this item is not available in
Image not available for
Color:
Image not available

To view this video download Flash Player

 
FREE Shipping on orders over $35.

Used - Good | See details
Sold by hippo_books.
 
   
Have one to sell? Sell yours here
Start reading Inside Cyber Warfare: Mapping the Cyber Underworld on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Inside Cyber Warfare: Mapping the Cyber Underworld [Paperback]

by Jeffrey Carr
3.8 out of 5 stars  See all reviews (32 customer reviews)


Available from these sellers.


Free Two-Day Shipping for College Students with Amazon Student

Formats

Amazon Price New from Used from
Kindle Edition $17.27  
Paperback --  
Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now
There is a newer edition of this item:
Inside Cyber Warfare: Mapping the Cyber Underworld Inside Cyber Warfare: Mapping the Cyber Underworld 3.8 out of 5 stars (32)
$26.48
In Stock.

Book Description

December 22, 2009 0596802153 978-0596802158 1

What people are saying about Inside Cyber Warfare

"The necessary handbook for the 21st century."

--Lewis Shepherd, Chief Tech Officer and Senior Fellow, Microsoft Institute for Advanced Technology in Governments

"A must-read for policy makers and leaders who need to understand the big-picture landscape of cyber war."

--Jim Stogdill, CTO, Mission Services Accenture

You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.

  • Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine
  • Discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations
  • Read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival
  • Find out why many attacks originate from servers in the United States, and who's responsible
  • Learn how hackers are "weaponizing" malware to attack vulnerabilities at the application level



Editorial Reviews

About the Author

Jeffrey Carr (CEO, Taia Global, Inc.) is the author of "Inside Cyber Warfare: Mapping the Cyber Underworld" (O'Reilly Media 2009) and the founder and CEO of Taia Global, Inc., a boutique security consulting firm for Global 2000 companies. His book has been endorsed by General Chilton, former Commander USSTRATCOM and he has had the privilege of speaking at the US Army War College, Air Force Institute of Technology, Chief of Naval Operations Strategic Study Group and at over 60 conferences and seminars. His firm provides specialized cybersecurity services to a select group of companies and their executives in the defense, technology, and communication sectors world-wide.


Product Details

  • Paperback: 240 pages
  • Publisher: O'Reilly Media; 1 edition (December 22, 2009)
  • Language: English
  • ISBN-10: 0596802153
  • ISBN-13: 978-0596802158
  • Product Dimensions: 7 x 9.1 x 0.6 inches
  • Shipping Weight: 14.1 ounces
  • Average Customer Review: 3.8 out of 5 stars  See all reviews (32 customer reviews)
  • Amazon Best Sellers Rank: #698,639 in Books (See Top 100 in Books)

More About the Author

Mr. Carr is a recognized authority on cyber conflict and security who specializes in the investigation of network attacks against governments, corporations, and critical infrastructure by State and Non-State actors. He regularly consults with agencies of the U.S. and allied governments on Russian and Chinese cyber warfare strategy and tactics as well as new and emerging threats. His book "Inside Cyber Warfare" has been endorsed by General Chilton, Commander USSTRATCOM and his Chief of Staff MG Abraham Turner, among others, and he has been asked to speak on these issues at numerous venues including the Defense Intelligence Agency, US Army War College, Air Force Institute of Technology, NATO's CCDCOE Conference on Cyber Conflict, and DEFCON.

Customer Reviews

Most Helpful Customer Reviews
38 of 42 people found the following review helpful
2.0 out of 5 stars Light and Over-Hyped February 25, 2010
By Dave
Format:Paperback|Verified Purchase
I bought this book trying to further my understanding of Cyber Warfare and how it has become integral force multiplier/enabler in today's digital battlefield. Unfortunately, I quickly realized that this book was basically a regurgitation of what is available on the Internet with a little "googling". The book itself is tiresome to read and feels like you are just trying to weed through so much "chaff" as you attempt to find something compelling to take away. Granted, I think if you have done no initial reading on the subject and it is totally new to you- this book may be a good primer. Seriously though, if you are a student that wants to gain a better understanding of how cyberspace plays a role in a geo-political strategic context- this is not the book for you. If Jeffrey Carr is an expert in Cyber Warfare- he needs to way up the ante on another book and make it more than just a conglomeration of articles that are pretty much freely available on the Internet.
Was this review helpful to you?
9 of 10 people found the following review helpful
4.0 out of 5 stars Not for the faint hearted February 15, 2012
By Michael
Format:Paperback
Jeffrey Carr makes a living out of advising others on cyber security. It is unlikely that he'll be short of work in if only half is of what he writes about in this 300 page book is true.

Inside Cyber Warfare (O'Reilly Publishing) is as fascinating as it is worrying.

For example, how do you know who initiated a cyber attack? How do you tell the difference between cyber crime and cyber warfare, and does it matter (it does according to Carr, although the two are often linked). What are the differences between traditional war and cyber war, and what do these mean for things like defensive counter-measures or the traditional legal frameworks that guide war-making?

One of the strengths of this book is that these questions are not pursued in an abstract manner - one of Carr's purposes in writing the book is provide guidance for policy makers dealing with these issues. To that end, he grounds the theory with the practice, drawing on real life experiences to flesh out the discussion.

Are there any negatives to this book? A couple, but nothing too serious. Perhaps necessarily the book makes a lot of use of a small number of examples of cyber warfare - presumably because these examples are well understood by the author and, to date, because there are not that many examples in the public arena. The result is a feeling at times of repetition - a problem the editors probably could probably have managed better.

Ultimately I left the book worried about what Carr sees as a blind spot in the way that governments go about ensuring cyber security for their people.
Read more ›
Comment | 
Was this review helpful to you?
4 of 4 people found the following review helpful
4.0 out of 5 stars Can cyber-pirates own the world? February 10, 2012
Format:Paperback
The main purpose of this book is to investigate whether it is possible to launch a devastating attack without possessing any weapons, by only using an Internet-connected PC. It happened many times in the past that military commanders went on horses to fight with tanks, in which case a large army can fall victim to a small regiment.

From the very beginning, the author makes it very clear that the main threat comes from non-state hacker groups who are indirectly supported by governments. I think those groups are similar to pirates of the medieval ages. They rip off merchants sometimes, but they can be hired to protect trade routes from competing states. As usual, private organizations are much quicker at building up teams with necessary skills, whereas the official government policy is still in its infancy. Also, there is a clear division in what government and non-government organizations do: the informal hacker groups launch attacks, and government agencies try to defend against external threats. The book makes it very clear that this needs to change.

Many governments realized that long time ago, so in the second half of the book the author presents a comprehensive overview of cyber-capabilities of top 20 or so most advanced countries. This is a bit boring to read, as the book provides way too many details on the internal structure of ministries and agencies. But maybe it is a good reference material for professional strategic decision makers. In addition, when analyzing Russia, I think the book attributes too much power to a bunch of oligarchs. Trust me, they are not responsible for cyber-attacks launched from Russia. There are indeed some covert hacker groups which the book fails to identify.
Read more ›
Comment | 
Was this review helpful to you?
8 of 10 people found the following review helpful
2.0 out of 5 stars Disappointing November 13, 2010
By Matt B
Format:Paperback|Verified Purchase
I found this book to be very disappointing in many regards. I expect a certain degree of quality in O'Reilly books and this one did not meet it. It's a thin book, and although there is some interesting content, enough to pass a couple of hours of late-night reading, the level of writing is about that of a mediocre Wikipedia article. The style is more appropriate for a blog or uneven journalistic account than a published book. Typos, very obvious ones, abounded throughout the text. The price is exorbitant for such a shallow pass at the subject.

I did not find it to be an intellectually stimulating work, and its best value was in directing me to other resources referenced by the work.

My guess is that the publisher wanted to capitalize off a cool subject, but this fails to attack the subject in any significant way.
Comment | 
Was this review helpful to you?
Most Recent Customer Reviews
3.0 out of 5 stars Interesting Read
The book provides a good insight and snap shot of the climate of Cyber attacks, this can be challenging in what is a fast moving field. Read more
Published 2 months ago by j051034
4.0 out of 5 stars Item as described!
Item as described! This was a very easy purchase and all of the books were in very good condition. Thanks!
Published 3 months ago by KNH
5.0 out of 5 stars Just one of the best on the subject
Practical. A book you want to have with you. Love the fact that you can read a chapter when you need to get some information or have tasks. One to keep.
Published 7 months ago by Michaeldreves
3.0 out of 5 stars good to start to understand cyber warfare issues
This a good book to start to understand this kind of issues. It isn't a book for technicians. Its a book for a decision's makers.
Published 12 months ago by Simon Riega_Martin
5.0 out of 5 stars Easy read
This is a very informative and easy-to-read book. It clearly shows the new "battle front" as being cyberspace and highlights the urgency, and importance of why effective... Read more
Published 13 months ago by Dan B
5.0 out of 5 stars Good one
Carr works in open source intelligence. That means no security clearance but 'merely' reads the available stuff on the Internet and draws conclusions. Read more
Published 15 months ago by Jeff O'Byrne
3.0 out of 5 stars Interesting read for DoD employees
Being former Air Force I could see how this book would be intriguing to someone active duty. The author gives a lot of military references. Read more
Published 18 months ago by Isaiah Schisler
4.0 out of 5 stars Good Book for an Outsider
I'm not a security professional, and I bought this book to do research for a cyber security term paper. Read more
Published 18 months ago by M. Smalley
5.0 out of 5 stars Ideal reading for anyone interested in policy-making and beginners in...
The book is an ideal reading for anyone interested in policy-making and those starting out in cyber security. Read more
Published 19 months ago by Rico Buraga
4.0 out of 5 stars Tell-all book on Cyberterrorism
Jeffery Carr's tell-all book was an interesting analysis into the current threat that the government and businesses face from the rise in using cyberspace as the new grounds for... Read more
Published 20 months ago by junger8
Search Customer Reviews
Only search this product's reviews
ARRAY(0xa2079f84)

What Other Items Do Customers Buy After Viewing This Item?


Forums

There are no discussions about this product yet.
Be the first to discuss this product with the community.
Start a new discussion
Topic:
First post:
Prompts for sign-in
 



Look for Similar Items by Category