"This excellent analysis is essential reading for anyone concerned with the defense posture of the United States. All those with a stake in the security of the information infrastructure should read it. There is nothing else like it."--Dorothy Denning, Department of Computer Science, Georgetown University
"One of the most thoughtful and thorough books on the subject so far."--Seymour E. Goodman, Professor of International Affairs and Computing, Georgia Tech
"This book is the first comprehensive exploration of the strategic significance of information system vulnerability. Important reading for anyone trying to understand the full potential of cyber warfare."--Ashton B. Carter, Ford Foundation Professor of Science and International Affairs, Harvard University, Kennedy School of Government, and Co-Director, Harvard-Stanford Preventive Defense Project
"This excellent analysis is essential reading for anyone concernedwith the defense posture of the United States. All those with a stakein the security of the information infrastructure should readit. There is nothing else like it." Dorothy Denning , Georgetown University
Everyone and their brother is writing about security, but this book is different. The author is an expert and knows what he is taking about.
Excelling and rational book!
This is one of those book that make you understand why the MIT is one of the best university out there. Read morePublished on October 26, 2002