Kindle
$9.99
Available instantly
Buy new:
$48.58
FREE delivery Friday, July 12
Ships from: Amazon
Sold by: NorthPasific
$48.58
FREE Returns
FREE delivery Friday, July 12
Or fastest delivery Wednesday, July 10. Order within 10 hrs 57 mins
Only 1 left in stock - order soon.
$$48.58 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$48.58
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Ships from
Amazon
Ships from
Amazon
Sold by
Sold by
Returns
Eligible for Return, Refund or Replacement within 30 days of receipt
Eligible for Return, Refund or Replacement within 30 days of receipt
Returnable Yes
Resolutions Eligible for refund or replacement
Return Window 30 days from delivery
Refund Timelines Typically, an advance refund will be issued within 24 hours of a drop-off or pick-up. For returns that require physical verification, refund issuance may take up to 30 days after drop-off or pick up. Where an advance refund is issued, we will re-charge your payment method if we do not receive the correct item in original condition. See details here.
Late fee A late fee of 20% of the item price will apply if you complete the drop off or pick up after the ‘Return By Date’.
Restocking fee A restocking fee may apply if the item is not returned in original condition and original packaging, or is damaged or missing parts for reasons not due to Amazon or seller error. See details here.
Returns
Eligible for Return, Refund or Replacement within 30 days of receipt
Returnable Yes
Resolutions Eligible for refund or replacement
Return Window 30 days from delivery
Refund Timelines Typically, an advance refund will be issued within 24 hours of a drop-off or pick-up. For returns that require physical verification, refund issuance may take up to 30 days after drop-off or pick up. Where an advance refund is issued, we will re-charge your payment method if we do not receive the correct item in original condition. See details here.
Late fee A late fee of 20% of the item price will apply if you complete the drop off or pick up after the ‘Return By Date’.
Restocking fee A restocking fee may apply if the item is not returned in original condition and original packaging, or is damaged or missing parts for reasons not due to Amazon or seller error. See details here.

Return instructions

Item must be in original condition and packaging along with tag, accessories, manuals, and inserts. Unlock any electronic device, delete your account and remove all personal information.
Read full return policy
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
Payment
Secure transaction
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
$18.90
Get Fast, Free Shipping with Amazon Prime FREE Returns
Very good condition. Clean pages. No highlighting or underlining. The back cover has a very light tear. Ships directly from Amazon and is eligible for prime or super saver (free) shipping. Very good condition. Clean pages. No highlighting or underlining. The back cover has a very light tear. Ships directly from Amazon and is eligible for prime or super saver (free) shipping. See less
FREE delivery Thursday, July 11 on orders shipped by Amazon over $35
Or fastest delivery Wednesday, July 10. Order within 10 hrs 57 mins
Only 1 left in stock - order soon.
$$48.58 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$48.58
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Access codes and supplements are not guaranteed with used items.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the author

Something went wrong. Please try your request again later.

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon Hardcover – November 11, 2014

4.5 4.5 out of 5 stars 2,243 ratings

{"desktop_buybox_group_1":[{"displayPrice":"$48.58","priceAmount":48.58,"currencySymbol":"$","integerValue":"48","decimalSeparator":".","fractionalValue":"58","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"gjhH6meBEBHPHiHu3NoWfMLIQjFk1yl5IMSB9yf%2FSzU7jRmWYW2T84gBopAHBHp7TOZl6DtZXtAeiQR8nxbCL%2BL%2FmEK2HTbG%2FhYxVI3%2Ba5QGOt5rsbDcQTS%2BmfpR6iOuBN%2BQDloUpAxpgyaM%2BfL%2FVt9qEcLpPHAwPrx1C%2BTcRDia%2B%2Bs2iU1J7ju5He1JF4A6","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"$18.90","priceAmount":18.90,"currencySymbol":"$","integerValue":"18","decimalSeparator":".","fractionalValue":"90","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"gjhH6meBEBHPHiHu3NoWfMLIQjFk1yl54No6j6zpc1mI5OkHFISXBuJi%2F3WFIZ8X58T2NpnmgdwBjcdZlcVs243WCmGarRCSr%2FNasOSSPMfDzKVjGqPWaiZM8qoDiQbl61aSb%2BpQfvYLXaSoEiM5C5WOnUn4PSv00ATB3OfN049FvH4BrFO1RlYkEKScDtdo","locale":"en-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Purchase options and add-ons

Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.
 
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
 
Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
 
 At first, the firm’s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity.
 
They had, they soon learned, stumbled upon the world’s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual,
physical destruction on a nuclear facility. 
 
In these pages,
Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet’s planning, execution, and discovery, covering its genesis in the corridors of Bush’s White House and its unleashing on systems in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making.
 
But
Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today’s flourishing zero-day “grey markets,” in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike—and shows us just what might happen should our infrastructure be targeted by such an attack.
 
Propelled by Zetter’s unique knowledge and access, and filled with eye-opening explanations of the technologies involved,
Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war.

The Amazon Book Review
The Amazon Book Review
Book recommendations, author interviews, editors' picks, and more. Read it now.

Frequently bought together

$48.53
Get it as soon as Friday, Jul 12
Only 1 left in stock - order soon.
Sold by Composey LLC and ships from Amazon Fulfillment.
+
$24.00
Get it as soon as Monday, Jul 15
Only 11 left in stock (more on the way).
Ships from and sold by Amazon.com.
+
$38.94
Get it as soon as Friday, Jul 12
Only 1 left in stock - order soon.
Sold by Happy Trade Store and ships from Amazon Fulfillment.
Total price:
To see our price, add these items to your cart.
Details
Added to Cart
spCSRF_Control
Some of these items ship sooner than the others.
Choose items to buy together.

Editorial Reviews

Review

"Immensely enjoyable...Zetter turns a complicated and technical cyber- story into an engrossing whodunit...The age of digital warfare may well have begun."
--
Washington Post

"An authoritative account of Stuxnet’s spread and discovery...[delivers] a sobering message about the vulnerability of the systems—train lines, water-treatment plants, electricity grids—that make modern life possible."
--
Economist

"Exhaustively researched...Zetter gives a full account of this “hack of the century,” as the operation has been called, [but] the book goes well beyond its ostensible subject to offer a hair-raising introduction to the age of cyber warfare."
--
Wall Street Journal

“Part detective story, part scary-brilliant treatise on the future of warfare…an ambitious, comprehensive, and engrossing book that should be required reading for anyone who cares about the threats that America—and the world—are sure to be facing over the coming years.”
—Kevin Mitnick,
New York Times bestselling author of Ghost in the Wires and The Art of Intrusion

“Unpacks this complex issue with the panache of a spy thriller…even readers who can’t tell a PLC from an iPad will learn much from Zetter’s accessible, expertly crafted account.”
Publishers Weekly (starred)

“A true techno-whodunit [that] offers a sharp account of past mischief and a glimpse of things to come…Zetter writes lucidly about mind-numbingly technical matters, reveling in the geekery of malware and espionage, and she takes the narrative down some dark electronic corridors… Governments, hackers and parties unknown are launching ticking computer time bombs every day, all coming to a laptop near you.”
--
Kirkus

"An exciting and readable story of the world's first cyberweapon. Zetter not only explains the weapon and chronicles its discovery, but explains the motives and mechanics behind the attack -- and makes a powerful argument why this story matters."
--Bruce Schneier, author of
Secrets and Lies and Schneier on Security

About the Author

KIM ZETTER is an award-winning journalist who covers cybercrime, civil liberties, privacy, and security for Wired. She was among the first journalists to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. She has also broken numerous stories over the years about WikiLeaks and Bradley Manning, NSA surveillance, and the hacker underground.

Product details

  • Publisher ‏ : ‎ Crown; First Edition (November 11, 2014)
  • Language ‏ : ‎ English
  • Hardcover ‏ : ‎ 448 pages
  • ISBN-10 ‏ : ‎ 077043617X
  • ISBN-13 ‏ : ‎ 978-0770436179
  • Item Weight ‏ : ‎ 1.5 pounds
  • Dimensions ‏ : ‎ 6.5 x 1.5 x 9.5 inches
  • Customer Reviews:
    4.5 4.5 out of 5 stars 2,243 ratings

About the author

Follow authors to get new release updates, plus improved recommendations.
Kim Zetter
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Discover more of the author’s books, see similar authors, read author blogs and more

Customer reviews

4.5 out of 5 stars
4.5 out of 5
2,243 global ratings

Customers say

Customers find the book fascinating, accurate, and perfect for introducing the domain to newcomers. They also say it's well-written, enjoyable, and worth reading. Readers describe the subject matter as excellent, relevant to today's times, and compelling.

AI-generated from the text of customer reviews

146 customers mention "Book enjoyment"142 positive4 negative

Customers find the book perfectly paced, worth reading, and excellently told. They also say the story is fascinating and the Kindle version is well implemented.

"...and that she worked very hard to compile a thorough and well thought out narrative...." Read more

"...While a lot has changed since 2014, this book is still relevant and worth reading for anyone working in cybersecurity or technology, or for anyone..." Read more

"...This book was perfectly paced, each chapter was worth reading, and all together, it portrayed a beautiful analysis about the topic." Read more

"...A reader without any background in the topic will find a fascinating and accessible story of some of the most interesting malicious software to date..." Read more

146 customers mention "Content"146 positive0 negative

Customers find the book fascinating, informative, and resourceful on the topic of Stuxnet. They say it offers many previously unknown and unpublished details that shock most. Readers also say the author does a great job of maintaining the suspense. They describe the book as entertaining and informative not only about the virus.

"...Very informative, very logical - like a good detective story...." Read more

"...While a lot has changed since 2014, this book is still relevant and worth reading for anyone working in cybersecurity or technology, or for anyone..." Read more

"...The work is a great and fascinating study of how digital technology can and is being used just as effectively as kinetic weapons (e.g. bombs)...." Read more

"...This book was perfectly paced, each chapter was worth reading, and all together, it portrayed a beautiful analysis about the topic." Read more

98 customers mention "Writing quality"73 positive25 negative

Customers find the writing quality of the book very well written and enjoyable to read. They also say the facets to the story are well presented, and the author is skillful at explaining the details without losing the reader in the weeds. Additionally, readers find the material fascinating and well structured.

"...This book is also very well edited, which is helpful when slogging through a somewhat dense topic like this...." Read more

"...Why I love this book* Zetter strikes a beautiful balance between technical writing, suspense, and investigative journalism, that is not too..." Read more

"...It is well written and exceptionally well researched including personal interviews and first source documents...." Read more

"...That said, it's incredibly technical and filled with jargon. As a non-programmer, I had a difficult time following...." Read more

30 customers mention "Subject matter"30 positive0 negative

Customers find the book an excellent look into cyberwarfare. They also say it's a great book for security researchers and anyone curious about geo politics and cyber. Readers also say the book provides the political backdrop and is a non-fiction work that reads like a Tom Clancy book.

"...This book is also a good investigation story...." Read more

"...This is the best non-fiction book I have read in my life, and perfect for those who are interested in foreign affairs and how technology can be used..." Read more

"...This is truly a ground breaking work on Cyber Warfare. If there is a criticism, it is the length and sometimes unnecessary details...." Read more

"...impressed and gripped to the book just as you would with a great espionage thriller...." Read more

9 customers mention "Plot"9 positive0 negative

Customers find the plot amazing, frightening, and page-turning. They also say the book reads like a spy novel, except sadly it's true.

"...this book stole all the great adjectives, but I will echo that this book is alarming, mesmerizing, compelling and add that I believe this is a..." Read more

"This is an amazing and frightening book. I give the final chapter 10 stars...." Read more

"Fascinating and definitely a page-turner...." Read more

"...This book is a page turner. It reads like a spy novel, except sadly it is true. Kim has done a great job citing her public sources...." Read more

13 customers mention "Readability"5 positive8 negative

Customers are mixed about the readability of the book. Some find it very accessible and concise, while others say that each chapter is followed by very many lengthy footnotes. They also mention that the frequent and verbose footnote are a bit distracting, and that some sections of thebook are incredibly dense and hard to appreciate.

"...is well researched and engaging, the frequent and verbose footnotes are a bit distracting and it seems much of the content in the footnotes could..." Read more

"...It is not only written in a way that makes it accessible to anyone, even with little knowledge on computer networks, industrial electronics and..." Read more

"...She has extensive, extensive footnoting...it's distracting...hard to read the tiny font, and really, again, just stuff that should have gone into..." Read more

"...Each chapter is followed by very many lengthy footnotes, with some individual footnotes spanning a page or more, and the total number of footnotes..." Read more

excellent book - well-researched, well-written
5 Stars
excellent book - well-researched, well-written
this is one of best books that I read in 2018 - Kim does at excellent job making a complex technical story accessible - it reads like a spy novel.well-researched and well-written - when the footnotes sometimes take up half the page, you know that you are in good hands!
Thank you for your feedback
Sorry, there was an error
Sorry we couldn't load the review

Top reviews from the United States

Reviewed in the United States on December 16, 2014
This book is very well written. You can tell that Kim Zetter has a strong background in investigative journalism, and that she worked very hard to compile a thorough and well thought out narrative. This book is also very well edited, which is helpful when slogging through a somewhat dense topic like this.

One thing I will say up front is that this book isn't quite so much about the Iranian nuclear program and the sabotage thereof as it is about a specific area of cyber warfare that uses the Iranian program as a backdrop. If you are keen to read technical details about other countries covert uranium enrichment and weaponization processes, there are better books out there for that. But, if you want a good timeline and summary on how the world reacted to the Iranian program and dealt with it on many levels - something along the lines of a good Frontline episode - then this is your book.

But perhaps the even more praise-worthy aspect of this book is it's description of how cyber warfare blossomed from it's furtive beginnings in the 80's to what we see today. The description of the book's namesake - zero day exploits - is excellent. I thought I knew the material well enough for a layman, but Ms. Zetter explained it out in great if not scary detail. Then she takes that topic as first introduced with the Stuxnet virus launched against the Iranian nuclear program and relates it to the world's infrastructure that is controlled by SCADA systems - a truly scary situation we are all in. She also provides a history of earlier, less destructive cyber attacks around the world and how we first tested how a virus could manifest into a physical act of destruction. And finally some insight how the white hats and black hats of the hacker world work today, including those in our government.

This book is also a good investigation story. We see how researchers with Symantec and Kaspersky (and some smaller firms) all battled this virus, probing it, dissecting it, until they unlocked it's method and then it's purpose. Very informative, very logical - like a good detective story. And then right when you think they got this thing - you find out that Stuxnet was just the tip of the iceberg! Duqu and Flame come into the light and a whole new chapter on the Iranian sabotage unfolds.

And finally, I would say that if you have absolutely no knowledge at all about how computers works - for example if the terms root kit or buffer overflow or *.dll files all are utterly foreign to you - then you might want to find another book on this topic. That being said, it is written towards the general computer user so I think most people can get the gist of the more technical details.
4 people found this helpful
Report
Reviewed in the United States on January 24, 2022
"Countdown to Zero Day" reads like a spy novel but contains a wealth of information about how Stuxnet, Flame, and other cyberweapons deployed by the U.S. and Israel worked, how cybersecurity researchers discovered them and deciphered their inner workings, and what leaders in government and the private sector have to say about the possible future consequences of cyber warfare.

While the book is well researched and engaging, the frequent and verbose footnotes are a bit distracting and it seems much of the content in the footnotes could have been included in the main text.

While a lot has changed since 2014, this book is still relevant and worth reading for anyone working in cybersecurity or technology, or for anyone who wants to know more about that state of modern warfare.
One person found this helpful
Report
Reviewed in the United States on December 25, 2014
In 2010 Richard A. Clarke authored a work entitled: Cyber War. It warned of the dangers of cyber warfare, especially the vulnerability to the U.S. grid. Many of the critics of the work scoffed. It can't happen. There is too much protection and we haven't seen such a thing anywhere. Of course Stuxnet was already at work in Iran, as early as 2005, though it was not known what was causing the problem with the Iranian centrifuges at the time.

Kim Zetter reveals the launch of "The world's first digital weapon" and shows us it CAN happen here. The work is a great and fascinating study of how digital technology can and is being used just as effectively as kinetic weapons (e.g. bombs). Since the work was published North Korea (allegedly) attacked the Sony Corporation for creating a film that belittled North Korean leader Kim Jung-un. Shortly thereafter the North Korean Internet "disappeared." Naturally, neither North Korea or the US. claimed any responsibility.

The salient point of the work is that as ingenious as the attack by the U.S. and Israel was, it eventually was discovered due to flaws in its design, with the result that others now have the code available and can use it for different reasons. Until quantum cryptography is developed and refined, any computer-based system is vulnerable. The development of operating systems has led to the situation where many of the world’s extremely sensitive systems are controlled by the MS operating system: Windows. There are always likely to be zero day vulnerabilities in that OS. These are those that are not known by the developer, but discovered often by malevolent sources.

The Stuxnet worm was designed to attack very specific Siemens controllers. Its aim was to shut down or slow Iran's ability to produce weapons-grade uranium. Success was partial and transient, as is always the case in all warfare. But it could just as easily target a grid or other systems that advanced countries depend on. What would happen if the grid in the U.S. were shut down for even a month? Let your imagination run with that thought.

The author's final thought was: "Stuxnet still holds the distinction of being the only known case of cyber warfare on record. But that can change any time, now that Pandora's digital box has been opened."

It already has changed. A next target may well be the U.S. grid. Are we prepared? Can we be? What would be the result of all-out cyber warfare? Food for thought...
One person found this helpful
Report

Top reviews from other countries

Translate all reviews to English
Leitor
5.0 out of 5 stars Historia moderna e bem contada
Reviewed in Brazil on October 23, 2023
Muito instigante. Uma historia muito legal, vale a pena.
Jost Riedel
5.0 out of 5 stars Gripping story of the the first digital weapon
Reviewed in Germany on May 13, 2023
The book is superbly researched and well told.

Do not expect technical details, though.
One example: "But the digital warheads used an obscure programming language, unique to teh Siemens PLC, called STL." Well, STL is Siemens' dialect of IL (Instruction List), one of the five programming language for PLCs defined by IEC 61131-3.
Pierfrancesco Di Giuseppe
5.0 out of 5 stars Il primo virus informatico utilizzato per scopi bellici
Reviewed in Italy on August 17, 2021
Grande interesse per il primo episodio di utilizzo "bellico" di un virus informatico. Assolutamente da non perdere, per capire cosa ci aspetta in futuro.
JB
2.0 out of 5 stars No substance
Reviewed in Spain on July 28, 2021
Just pages and pages of light comments about the investigation of different antivirus companies in the technical content of the virus with some link to what was going on in Iran, some pages with a very rough description of the structure of Stuxnet and a final bunch of pages about the risks of someone launching an updated version of Stuxnet ...
One person found this helpful
Report
Harry J
5.0 out of 5 stars Buy this book, it's must read for factory automation service providers
Reviewed in India on September 23, 2020
Best read of recent times. The author has taken great efforts to gather the information and present it for non technical readers who do not have an industrial automation background or work experience in that field.

This book is based on true story and so perhaps that's what makes this book really exciting, intriguing and interesting.

Hats off to the author once again for pulling this one. Best.
2 people found this helpful
Report