Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
"This excellent analysis is essential reading for anyone concerned with the defense posture of the United States. All those with a stake in the security of the information infrastructure should read it. There is nothing else like it."--Dorothy Denning, Department of Computer Science, Georgetown University
"One of the most thoughtful and thorough books on the subject so far."--Seymour E. Goodman, Professor of International Affairs and Computing, Georgia Tech
"This book is the first comprehensive exploration of the strategic significance of information system vulnerability. Important reading for anyone trying to understand the full potential of cyber warfare."--Ashton B. Carter, Ford Foundation Professor of Science and International Affairs, Harvard University, Kennedy School of Government, and Co-Director, Harvard-Stanford Preventive Defense Project
"This excellent analysis is essential reading for anyone concernedwith the defense posture of the United States. All those with a stakein the security of the information infrastructure should readit. There is nothing else like it." Dorothy Denning , Georgetown University
A great work is starting to become a little dated on some of the various cyber topics at the 15 year point but worthy of a prominent place on the shelf. Read morePublished 6 months ago by Tiny
Everyone and their brother is writing about security, but this book is different. The author is an expert and knows what he is taking about.
Excelling and rational book!
This is one of those book that make you understand why the MIT is one of the best university out there. Read morePublished on October 26, 2002