Shop portable fans
Buy new:
$36.10
FREE delivery Tuesday, May 27
Ships from: Amazon
Sold by: Happy Trade Store
$36.10
FREE Returns
FREE delivery Tuesday, May 27
Or fastest delivery Sunday, May 25
Only 1 left in stock - order soon.
$$36.10 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$36.10
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Ships from
Amazon
Amazon
Ships from
Amazon
Returns
30-day refund/replacement
30-day refund/replacement
This item can be returned in its original condition for a full refund or replacement within 30 days of receipt.
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
$16.25
Get Fast, Free Shipping with Amazon Prime FREE Returns
In Good Condition. This is a USED product and it is likely, though not guaranteed, to have HIGHLIGHTING, BENT pages, or MARKING on the pages or cover. Otherwise normal ware and tear are most likely present. The product though is in good operational condition. *SOME BOOKS ARE LIBRARY COPIES* In Good Condition. This is a USED product and it is likely, though not guaranteed, to have HIGHLIGHTING, BENT pages, or MARKING on the pages or cover. Otherwise normal ware and tear are most likely present. The product though is in good operational condition. *SOME BOOKS ARE LIBRARY COPIES* See less
FREE delivery Sunday, May 25 on orders shipped by Amazon over $35
Only 1 left in stock - order soon.
$$36.10 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$36.10
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Access codes and supplements are not guaranteed with used items.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the author

Something went wrong. Please try your request again later.

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon Hardcover – November 11, 2014

4.5 out of 5 stars 2,315 ratings

{"desktop_buybox_group_1":[{"displayPrice":"$36.10","priceAmount":36.10,"currencySymbol":"$","integerValue":"36","decimalSeparator":".","fractionalValue":"10","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"vgBAmfBuv4JV55dLjvaagHfmI5yUq9%2FdrcP%2BvZsbSzvSeEftHIX5R4CHXLe19SeCZKSIfVDv%2F9I%2FO2TlVvjQjcGWI5nD8EqUmKKk6yVJ5eiPBe10IB9XFEmmvJA%2B8RHghJFx2aForyR15s5pDPiTTPdHETUoWv%2BXabQIe5rBiixCLqLsbtgf4Oly92jWnf9r","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"$16.25","priceAmount":16.25,"currencySymbol":"$","integerValue":"16","decimalSeparator":".","fractionalValue":"25","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"vgBAmfBuv4JV55dLjvaagHfmI5yUq9%2FdPARpgbmh865oSMNOQQyLR4fsixLN9xES%2FU8s28x%2FvvWgFOI18kH2HJNFXA6Li9tzrYf%2FKXi%2FNiGbDNQB8mXd1NGZerdVmYU3UbtLWhRMvlUSCNpHlcwpQlQXRbx5nozS8ArZeLSxesWlYMxRAx2H4A%3D%3D","locale":"en-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Purchase options and add-ons

Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.
 
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
 
Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
 
 At first, the firm’s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity.
 
They had, they soon learned, stumbled upon the world’s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual,
physical destruction on a nuclear facility. 
 
In these pages,
Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet’s planning, execution, and discovery, covering its genesis in the corridors of Bush’s White House and its unleashing on systems in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making.
 
But
Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today’s flourishing zero-day “grey markets,” in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike—and shows us just what might happen should our infrastructure be targeted by such an attack.
 
Propelled by Zetter’s unique knowledge and access, and filled with eye-opening explanations of the technologies involved,
Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war.
The%20Amazon%20Book%20Review
The Amazon Book Review
Book recommendations, author interviews, editors' picks, and more. Read it now.

Frequently bought together

This item: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
$36.10
Get it as soon as Tuesday, May 27
Only 1 left in stock - order soon.
Sold by Happy Trade Store and ships from Amazon Fulfillment.
+
$24.40
Get it as soon as Sunday, May 25
Only 1 left in stock - order soon.
Sold by HMK TRADING CORP and ships from Amazon Fulfillment.
+
$28.08
Get it as soon as Sunday, May 25
Only 1 left in stock - order soon.
Sold by Pedestriians and ships from Amazon Fulfillment.
Total price: $00
To see our price, add these items to your cart.
Details
Added to Cart
These items are shipped from and sold by different sellers.
Choose items to buy together.

Editorial Reviews

Review

"Immensely enjoyable...Zetter turns a complicated and technical cyber- story into an engrossing whodunit...The age of digital warfare may well have begun."
--
Washington Post

"An authoritative account of Stuxnet’s spread and discovery...[delivers] a sobering message about the vulnerability of the systems—train lines, water-treatment plants, electricity grids—that make modern life possible."
--
Economist

"Exhaustively researched...Zetter gives a full account of this “hack of the century,” as the operation has been called, [but] the book goes well beyond its ostensible subject to offer a hair-raising introduction to the age of cyber warfare."
--
Wall Street Journal

“Part detective story, part scary-brilliant treatise on the future of warfare…an ambitious, comprehensive, and engrossing book that should be required reading for anyone who cares about the threats that America—and the world—are sure to be facing over the coming years.”
—Kevin Mitnick,
New York Times bestselling author of Ghost in the Wires and The Art of Intrusion

“Unpacks this complex issue with the panache of a spy thriller…even readers who can’t tell a PLC from an iPad will learn much from Zetter’s accessible, expertly crafted account.”
Publishers Weekly (starred)

“A true techno-whodunit [that] offers a sharp account of past mischief and a glimpse of things to come…Zetter writes lucidly about mind-numbingly technical matters, reveling in the geekery of malware and espionage, and she takes the narrative down some dark electronic corridors… Governments, hackers and parties unknown are launching ticking computer time bombs every day, all coming to a laptop near you.”
--
Kirkus

"An exciting and readable story of the world's first cyberweapon. Zetter not only explains the weapon and chronicles its discovery, but explains the motives and mechanics behind the attack -- and makes a powerful argument why this story matters."
--Bruce Schneier, author of
Secrets and Lies and Schneier on Security

About the Author

KIM ZETTER is an award-winning journalist who covers cybercrime, civil liberties, privacy, and security for Wired. She was among the first journalists to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. She has also broken numerous stories over the years about WikiLeaks and Bradley Manning, NSA surveillance, and the hacker underground.

Product details

  • Publisher ‏ : ‎ Crown
  • Publication date ‏ : ‎ November 11, 2014
  • Edition ‏ : ‎ First Edition
  • Language ‏ : ‎ English
  • Print length ‏ : ‎ 448 pages
  • ISBN-10 ‏ : ‎ 077043617X
  • ISBN-13 ‏ : ‎ 978-0770436179
  • Item Weight ‏ : ‎ 1.5 pounds
  • Dimensions ‏ : ‎ 6.4 x 1.42 x 9.61 inches
  • Customer Reviews:
    4.5 out of 5 stars 2,315 ratings

About the author

Follow authors to get new release updates, plus improved recommendations.
Kim Zetter
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Discover more of the author’s books, see similar authors, read book recommendations and more.

Customer reviews

4.5 out of 5 stars
2,315 global ratings

Review this product

Share your thoughts with other customers

Customers say

Customers find the book well-paced and easy to understand, with meticulous research that provides enough detail to grasp the implications. Moreover, the book offers great insight into cyber warfare, with one customer describing it as the best account of industrial cyber attacks, and another noting its relevance to current times. However, the narrative receives mixed feedback, with some customers finding it repetitious at times.

AI-generated from the text of customer reviews

237 customers mention "Readability"211 positive26 negative

Customers find the book highly readable, with each chapter being worth reading and striking the right balance between storytelling and informative content. One customer notes that it reads like a good mystery.

"...That being said, it is written towards the general computer user so I think most people can get the gist of the more technical details." Read more

"...To her credit, she strikes the right balance between telling a riveting story accessible to a wide audience and offering much technical detail in..." Read more

"...This book was perfectly paced, each chapter was worth reading, and all together, it portrayed a beautiful analysis about the topic." Read more

"...Why I love this book * Zetter strikes a beautiful balance between technical writing, suspense, and investigative journalism, that is not too..." Read more

130 customers mention "Information quality"130 positive0 negative

Customers praise the book's meticulous research and technical depth, providing enough detail to understand the implications of Stuxnet.

"...You can tell that Kim Zetter has a strong background in investigative journalism, and that she worked very hard to compile a thorough and well..." Read more

"...Ms. Zetter succeeds with much talent in making an arcane subject understandable to a lay audience while simultaneously satisfying the appetite of a..." Read more

"...was worth reading, and all together, it portrayed a beautiful analysis about the topic." Read more

"...The work is a great and fascinating study of how digital technology can and is being used just as effectively as kinetic weapons (e.g. bombs)...." Read more

59 customers mention "Cyber warfare"59 positive0 negative

Customers appreciate the book's coverage of cyber warfare, with one customer highlighting its detailed account of a nation-state cyber attack, while another notes it serves as a must-read for those interested in cyber espionage.

"...even more praise-worthy aspect of this book is it's description of how cyber warfare blossomed from it's furtive beginnings in the 80's to what we..." Read more

"...I've learned about the security implications of digital weapons...." Read more

"...The beautiful marriage of transnational security (politics) and technology as a weapon (cyber-security) *..." Read more

"...But the book is much more than that: it describes how governmental cyberwarfare has evolved over the past two decades, including many details of..." Read more

26 customers mention "Relevance"26 positive0 negative

Customers find the book relevant to current times and the future, with one customer noting how it explains the larger societal implications and another praising how it distills a complex international story.

"...She also provides a history of earlier, less destructive cyber attacks around the world and how we first tested how a virus could manifest into a..." Read more

"...While a lot has changed since 2014, this book is still relevant and worth reading for anyone working in cybersecurity or technology, or for anyone..." Read more

"...as other reviewers have pointed out, she did a great job of distilling a complex international story with hundreds of players into something readers..." Read more

"...this book stole all the great adjectives, but I will echo that this book is alarming, mesmerizing, compelling and add that I believe this is a..." Read more

21 customers mention "Pacing"15 positive6 negative

Customers find the book well-paced and riveting, with one customer describing it as a fast-paced detective novel.

"...This book was perfectly paced, each chapter was worth reading, and all together, it portrayed a beautiful analysis about the topic." Read more

"...But, for a dense, non-fictional accounting, it reads fast and was a thrilling story...." Read more

"...But, too many pages read with too little motion in the storyline per pages. Gets bogged down in computerese...." Read more

"...Very timely given the current talks with Iran and helped me understand more thoroughly the challenges facing our government (and others')...." Read more

12 customers mention "Accessibility"12 positive0 negative

Customers find the book accessible and easy to understand, with one customer noting that the technology is explained clearly for laymen to enjoy.

"...It is not only written in a way that makes it accessible to anyone, even with little knowledge on computer networks, industrial electronics and..." Read more

"...Well written and understood by people without an engineering and computer science background...." Read more

"...were available in the footnotes, and this makes the book more accessible by less-technical readers." Read more

"...of the more technical details the author discusses but the book is equally approachable by those without such a technical background...." Read more

11 customers mention "Visual quality"11 positive0 negative

Customers appreciate the visual quality of the book, noting its great detail, with one customer describing it as a work of journalistic art.

"...changed the course of war for good and this book does an amazing job of portraying that...." Read more

"...In my opinion, this book accurately captures the intricate details of the Stuxnet malware's operation and impact on its intended target process...." Read more

"...Kim Zetter wrote a beautiful book accompanying step by step the discovery and analysis of the largest (up today) computer virus...." Read more

"...Boy was I wrong. The book goes into great detail about how Stuxnet came to be including some brilliant research work on all aspects of the..." Read more

25 customers mention "Narrative quality"17 positive8 negative

Customers have mixed opinions about the narrative quality of the book, with some finding it better than fiction while others note it can be repetitious at times.

"...This is the best non-fiction book I have read in my life, and perfect for those who are interested in foreign affairs and how technology can be used..." Read more

"...Definitely not a dry read even though it has a lot of technical details...." Read more

"...The result is a slow and repetitive information dump that doesn't make for very compelling reading...." Read more

"...impressed and gripped to the book just as you would with a great espionage thriller...." Read more

excellent book - well-researched, well-written
5 out of 5 stars
excellent book - well-researched, well-written
this is one of best books that I read in 2018 - Kim does at excellent job making a complex technical story accessible - it reads like a spy novel. well-researched and well-written - when the footnotes sometimes take up half the page, you know that you are in good hands!
Thank you for your feedback
Sorry, there was an error
Sorry we couldn't load the review

Top reviews from the United States

  • Reviewed in the United States on December 16, 2014
    This book is very well written. You can tell that Kim Zetter has a strong background in investigative journalism, and that she worked very hard to compile a thorough and well thought out narrative. This book is also very well edited, which is helpful when slogging through a somewhat dense topic like this.

    One thing I will say up front is that this book isn't quite so much about the Iranian nuclear program and the sabotage thereof as it is about a specific area of cyber warfare that uses the Iranian program as a backdrop. If you are keen to read technical details about other countries covert uranium enrichment and weaponization processes, there are better books out there for that. But, if you want a good timeline and summary on how the world reacted to the Iranian program and dealt with it on many levels - something along the lines of a good Frontline episode - then this is your book.

    But perhaps the even more praise-worthy aspect of this book is it's description of how cyber warfare blossomed from it's furtive beginnings in the 80's to what we see today. The description of the book's namesake - zero day exploits - is excellent. I thought I knew the material well enough for a layman, but Ms. Zetter explained it out in great if not scary detail. Then she takes that topic as first introduced with the Stuxnet virus launched against the Iranian nuclear program and relates it to the world's infrastructure that is controlled by SCADA systems - a truly scary situation we are all in. She also provides a history of earlier, less destructive cyber attacks around the world and how we first tested how a virus could manifest into a physical act of destruction. And finally some insight how the white hats and black hats of the hacker world work today, including those in our government.

    This book is also a good investigation story. We see how researchers with Symantec and Kaspersky (and some smaller firms) all battled this virus, probing it, dissecting it, until they unlocked it's method and then it's purpose. Very informative, very logical - like a good detective story. And then right when you think they got this thing - you find out that Stuxnet was just the tip of the iceberg! Duqu and Flame come into the light and a whole new chapter on the Iranian sabotage unfolds.

    And finally, I would say that if you have absolutely no knowledge at all about how computers works - for example if the terms root kit or buffer overflow or *.dll files all are utterly foreign to you - then you might want to find another book on this topic. That being said, it is written towards the general computer user so I think most people can get the gist of the more technical details.
    5 people found this helpful
    Report
  • Reviewed in the United States on January 25, 2015
    Kim Zetter uses Stuxnet, the world’s first digital weapon used against Iran’s nuclear program, to make her audience aware of the challenges and opportunities that zero-day vulnerabilities and exploits represent for the nations with the greatest connectivity. Critical infrastructures represent a juicy target not only for cyber criminals (a.k.a. the black market), but also for law enforcement and intelligent agencies (a.k.a. the gray market) around the world. Ms. Zetter clearly highlights the numerous challenges that the software makers and web site owners (a.k.a. the white market) experience in trying to make their offerings as secure as possible. To her credit, she strikes the right balance between telling a riveting story accessible to a wide audience and offering much technical detail in the footnotes of her book. Furthermore, Ms. Zetter demonstrates with much clarity that the legal and policy issues surrounding the use of zero-day vulnerabilities and exploits have not been appropriately addressed in public in the United States. Like other countries involved with cyber warfare, the United States has to play both defense and offense in order to secure its interests. My only regret is that the author does not deal with the fast-growing Internet of Things. “Big Data” is a juicy target for the black, gray, and white markets mentioned above. In summary, Ms. Zetter succeeds with much talent in making an arcane subject understandable to a lay audience while simultaneously satisfying the appetite of a more tech-savvy audience.
    One person found this helpful
    Report
  • Reviewed in the United States on May 10, 2017
    I took this book in an attempt to understand what Stuxnet is and to understand its inner workings, but I have learned much more by picking it up.

    I've learned some things about how the process of creating nuclear bombs look like. I've learned about the security implications of digital weapons. I've learned about what goes on in order to actually get permission to use a digital weapon. I now have a clearer picture of what the Iranian nuclear deal developed. I have a clearer picture of what could happen next in cyber warfare.

    And while the technical explanation of what Stuxnet is and how it behaved was dispersed over the different chapters, I've accomplished the original goal. It will still take me some time to have a full understanding of it, but this book gave me a clear direction on where to look at.

    I compared it to Dan Brown's Digital Fortress a couple of times in the last couple of days and I stay behind that comparison. This book is basically Digital Fortress that has actually happened. That alone makes this book even more amazing than it already was.

    I highly recommend it to everyone interested in cyberspace. Stuxnet changed the course of war for good and this book does an amazing job of portraying that. It also shows you all the drawbacks that Stuxnet had and problems it encountered on its way. At the end, it tells you how the researchers opened the Pandora's box after discovering it, proving that it wasn't a one-time thing and telling you about the entire system of malware Stuxnet was a part of.

    I rarely write book reviews, but this book deserves it. I highly recommend it and will continue recommending it for a long time in the future.

    I've started following Kim's work after grabbing this book and will continue following it for a long time. I really hope she'll find some other topic worth writing about and cover it in such great details as she did in this one. If (or when) she does that, I'll be grabbing it on day one. This book was perfectly paced, each chapter was worth reading, and all together, it portrayed a beautiful analysis about the topic.
    One person found this helpful
    Report

Top reviews from other countries

Translate all reviews to English
  • Robert D. Crane
    4.0 out of 5 stars If you are a technology person then you'll certainly enjoy the depth and detail that the bool provides
    Reviewed in Australia on January 3, 2016
    A really thorough treatise of the Stuxnet malware and the later ramifications it has generated. I felt the booked jumped around a little bit when swapping back and forth between the major players and the actual timeline as well as the affected targets in Iran.

    If you are a technology person then you'll certainly enjoy the depth and detail that the bool provides, especially when it comes to the footnotes. The author has done a great job pulling all the sources and information together and making it readable by all.

    If nothing else, this book should demonstrate what is digitally possible in the world we live in today and how afraid we should be about what could be unleashed tomorrow that could have ramifications far beyond what we think. We live in a digital world and that now too is under attack and being threaten like any battlefield of the past. The only thing now is that there are no longer any borders.
  • Harry J
    5.0 out of 5 stars Buy this book, it's must read for factory automation service providers
    Reviewed in India on September 23, 2020
    Best read of recent times. The author has taken great efforts to gather the information and present it for non technical readers who do not have an industrial automation background or work experience in that field.

    This book is based on true story and so perhaps that's what makes this book really exciting, intriguing and interesting.

    Hats off to the author once again for pulling this one. Best.
  • Hugo
    5.0 out of 5 stars Very Informative !
    Reviewed in France on April 2, 2015
    I had very little knowledge about Stuxnet and limited computer science skills and this book was very informative for me!
    The reading is not always easy, some chapters are a bit long but at the end of the book I felt like I learnt a lot.
  • shigeo
    4.0 out of 5 stars サイバー攻撃の恐るべき実態
    Reviewed in Japan on July 10, 2015
    サイバー攻撃は、ここまで出来るのか、ここまでやるのか、に驚いた。システム設計上、サイバー攻撃対策の構築に参考になる。それにしても、このウイルスが発見されたというレポートが出たとき、対ウイルスソフト業界(もちろんOSメーカを含む)がそれに対してほとんど無反応出会ったとは、意味深長である。辞書を引いてでも読むべき
    Report
  • Rodrigo
    5.0 out of 5 stars Leitura Sensacional
    Reviewed in Brazil on June 15, 2021
    Conteúdo incrível compartilhado pela jornalista Kim Zetter. Nota-se a preocupação de trazer a informação sem nenhum viés, focando exatamente nos fatos ocorridos. Além de aprender muito sobre segurança, traz um contexto histórico riquíssimo sobre muitos conflitos no Oriente Médio e até em outros locais do mundo.

    Certeza que é um livro que recomendo a qualquer pessoa que leia, sobretudo se for profissional da segurança da informação.