Shop the Business Savings Event
Buy used:
$7.29
FREE delivery January 15 - 16. Details
Or fastest delivery January 9 - 14. Details
Used: Very Good | Details
Sold by WonderBook
Condition: Used: Very Good
Comment: 100% Guaranteed. Serving Millions of Book Lovers Since 1980. Very Good condition. Very Good dust jacket. A copy that may have a few cosmetic defects. May also contain a few markings such as an owner?s name, short gifter?s inscription or light stamp.
Access codes and supplements are not guaranteed with used items.
Added to

Sorry, there was a problem.

There was an error retrieving your Wish Lists. Please try again.

Sorry, there was a problem.

List unavailable.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the author

Something went wrong. Please try your request again later.

Cyberwars Hardcover – August 21, 1997

4.0 4.0 out of 5 stars 2 ratings

To some a brand-new forum for the freedom of speech, the Internet is also the most up-to-date way to gather intelligence. Brilliant hackers like Kevin Mitnik—modern-day “pirates”—pose real security threats to government and industry. Cyberwars explores a dangerous new world where international terrorists plot their attacks and are tracked by secret service organizations on-line, drug traffickers do business and launder money, and electronic economic espionage is the order of the day. Examining efforts to police on-line communication and content, Guisnel assesses the implications of pervasive surveillance for the inherently democratic medium of the Internet. As these issues are the focus of ongoing debates in government and the private sector, Cyberwars couldn’t be more timely.

Customer reviews

4 out of 5 stars
2 global ratings

Review this product

Share your thoughts with other customers

Top reviews from the United States

  • Reviewed in the United States on March 9, 1999
    This book is a lightweight in the recent flood of cyberscare publications. It presents some interesting perspectives on US-French competition in the world of industrial espionage but overall it is not very informative. Its principal failing is that it is a book about technology that butchers technical details.
    The author's disconnect with technology is demonstrated in his discussion of the Clipper chip. Clipper is now installed in most stand-alone voice encryptors that are sold in the US. At the beginning of each phone call a new session key is shared between the two callers. It is not practical to find this session key by guessing but a separately encrypted version is sent along with the conversation. The session key can be discovered by government agencies through appropriate procedures. The author's discussion of this states that a NSA proposal "...would add a device called the clipper chip to every telephone or computer manufactured in the United States." For most phones that use analog transmission of voice this would clearly make no sense. Apparently the author missed the issue entirely.
    In places the book becomes more of a political platform than a balanced discussion. After condemning filtering programs that block access to porn sites he states that "The fun for those who devote themselves to censorship is the daily discovery of new sites that they can condemn and prohibit"
    Even commonly known security details are missed. In a discussion of phone phreaking the author states that the publication titled 2600 was named after the frequency that a quarter made when falling into a pay phone. 2600 Hertz is actually the frequency of a supervisory tone that was used to bypass toll equipment.
    In an evaluation of the hacker Kevin Mitnick's his technical abilities were rated as #2 in the world. I am personally aquatinted with associates of Mitnick who state that he is a technical wannabe that excels only in dumpster diving and social engineering.
    [exerpted from a review for Security Management -- all rights reserved by the author]
    11 people found this helpful
    Report