BN.com Gift Guide

Cyber War: The Next Threat to National Security and What to Do about It [NOOK Book]

Overview

Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security?and he was right. Now he warns us of another threat, silent but equally dangerous. Cyber War is a powerful book about technology, government, and military strategy; about criminals, spies, soldiers, and hackers. It explains clearly and convincingly what cyber war is, how cyber weapons work, and how vulnerable we are as a nation and as individuals to the vast and looming web of cyber criminals. This is the ...

See more details below
Cyber War: The Next Threat to National Security and What to Do about It

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$11.79
BN.com price

Overview

Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security—and he was right. Now he warns us of another threat, silent but equally dangerous. Cyber War is a powerful book about technology, government, and military strategy; about criminals, spies, soldiers, and hackers. It explains clearly and convincingly what cyber war is, how cyber weapons work, and how vulnerable we are as a nation and as individuals to the vast and looming web of cyber criminals. This is the first book about the war of the future—cyber war—and a convincing argument that we may already be in peril of losing it.

Read More Show Less

Editorial Reviews

Michiko Kakutani
In these pages Mr. Clarke uses his insider's knowledge of national security policy to create a harrowing—and persuasive—picture of the cyberthreat the United States faces today.
—The New York Times
Publishers Weekly
On today's battlefields computers play a major role, controlling targeting systems, relaying critical intelligence information, and managing logistics. And, like their civilian counter-parts, defense computers are susceptible to hacking. In September 2007, Israeli cyber warriors "blinded" Syrian anti-aircraft installations, allowing Israeli planes to bomb a suspected nuclear weapons manufacturing facility (Syrian computers were hacked and reprogrammed to display an empty sky). One of the first known cyber attacks against an independent nation was a Russian DDOS (Deliberate Denial of Service) on Estonia. Since it can rarely be traced directly back to the source, the DDOS has become a common form of attack, with Russia, China, North Korea, the U.S., and virtually every other country in possession of a formidable military having launched low-level DDOS assaults. Analysts across the globe are well aware that any future large-scale conflict will include cyber warfare as part of a combined arms effort. Clarke and Knake argue that today's leaders, though more computer savvy than ever, may still be ignorant of the cyber threats facing their national security.
Copyright © Reed Business Information, a division of Reed Elsevier Inc. All rights reserved.
New York Times Book Review
For AGAINST ALL ENEMIES: “Against All Enemies is too good to be ignored. . . . It is a rarity among Washington-insider memoirs—it’s a thumping good read.”
Financial Times
“Will strengthen Clarke’s claims as one of the founding fathers of cybersecurocracy....It is worth buying this book if only for his pithy five-page vision of this coming apocalypse and a return to stone-age conditions within a week, all because of a few pesky hackers and viruses.”
Booklist
“In this chilling and eye-opening book, Clarke and Knake provide a highly detailed yet accessible look at how cyber warfare is being waged and the need to rethink our national security to face this new threat.”
Slate
“[CYBER WAR] may be the most important book about national-security policy in the last several years.”
Michiko Kakutani
“Chilling... [A] harrowing — and persuasive — picture of the cyberthreat the United States faces today.”
Wall Street Journal
“Clarke and Knake are right to sound the alarm.”
Library Journal
Today's global society is totally dependent on the complex communications networks that connect individuals, businesses, and governments. Attacking these networks is relatively easier and cheaper for both governments and terrorists than more overt acts; it could also cause even more widespread and long-lasting damage. Clarke (Against All Enemies: Inside America's War on Terror), who was a White House security adviser to Presidents from Reagan through Clinton, discusses the various points of cyber vulnerability and critiques American efforts to protect its vital infrastructure. An electronic first strike could lead to an uncoordinated retaliation that could rapidly escalate out of control. Governments and companies all over the world are hard at work developing both offensive and defensive software programs, policies, and procedures to deal with this immediate threat, but Clarke wants to encourage more public debate on a topic that has been dominated by the technical experts. He previously wrote a technothriller, Breakpoint, on this very issue. VERDICT On an important subject, this book is written for general readers, although undergraduates could benefit from it as well. However, the lack of both a bibliography and an index (not to mention footnotes) is a serious deficiency.—Daniel K. Blewett, Coll. of DuPage Lib., Glen Ellyn, IL
Read More Show Less

Product Details

  • ISBN-13: 9780061992391
  • Publisher: HarperCollins Publishers
  • Publication date: 4/20/2010
  • Sold by: HARPERCOLLINS
  • Format: eBook
  • Pages: 320
  • Sales rank: 109,757
  • File size: 354 KB

Meet the Author

Richard A. Clarke has served in the White House for President Reagan, for both presidents Bush, and for President Clinton, who appointed him as National Coordinator for Security, Infrastructure Protection, and Counterterrorism. He teaches at Harvard Kennedy School, consults for ABC News, and is chairman of Good Harbor Consulting.

Read More Show Less

Table of Contents

1 Trial Runs 1

2 Cyber Warriors 33

3 The Battlespace 69

4 The Defense Fails 103

5 Toward a Defensive Strategy 151

6 How Offensive? 179

7 Cyber Peace 219

8 The Agenda 257

Glossary 281

Read More Show Less

Customer Reviews

Average Rating 4
( 43 )
Rating Distribution

5 Star

(16)

4 Star

(12)

3 Star

(9)

2 Star

(3)

1 Star

(3)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
See All Sort by: Showing 1 – 20 of 43 Customer Reviews
  • Posted August 22, 2010

    Cyber Snore

    This book reads as if it was written by a person with an eight grade grasp of cyber security. Yes, the United States is vulnerable to cyber attacks but, despite the grandiose subtitle (The Next Great Threat and What to Do about It), the book offers no useful advise about what to do about cyber warfare. I suspect that is because the two authors are policy wonks who believe that policies and procedures can fix any problem.

    The authors style was annoying on several other counts as well. They repeated the same mantra that we need to protect our elecrical grid (ignoring the fact that we have several such grids, but who would expect a policy wonk to bother to know details>) and the authors rarely passed up a chance to bash former President Bush. Frankly, if Clarke was as annoying and as unknowledgable as this waste of $29.00 suggests, it is no wonder that President Bush did not want him giving advice on what has been a critical topic in Washington for about eight years.

    The most glaring omission in this book is that it contains on realization that the nation needs perhaps 50,000 highly skilled cyber warriors in the public and private sectors but has only about 1,000--and that 1,000 does not include either Mr. Clarke or Mr. Knake--and provides no indication that either of the authors understands that policies will not close the cyber skills gap though it will create jobs for ivy league consultants who only understand a small part of the problem.

    I would suggest anyone who thinks they need to read this book save their time and money and download the Lewis Commission Report from the Center for Strategic and International Studies website. That report is much shorter, much better written, contains ideas concerning how to address the problem, and is free.

    3 out of 3 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Posted May 23, 2010

    Cyber Bore

    I bought this book thinking it would be interesting and insightful, but it was just mediocre. Someone with Richard Clarke's experience and access should be able to do better. My chief compliant is that everything was grossly simplified and repetitive.

    Yet, I respect the book's message that the U.S.A. is VERY VULNERABLE to a cyber attack given our 'connected' society & industries. It's the next battlefield.

    3 out of 4 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted May 9, 2012

    Chilling thought on how vulnerable US is to cyber attack

    The book is what the author states at the beginning, not a great in-depth examination of either technologies, policy workings or military defense strategy and implementation, but at a level that would be understandable to someone not well versed in any of these areas. Having worked in the telecommunications and data network delivery industry, I can well appreciate the author's view of just how vulnerable to attack many systems are, and their impact on everyday life. Imagine a winter storm that takes down your power lines, and then everything that requires power - and the storm lasts six months. This overview is distressing enough, but how can our government's various components continue to not make a coordinated effort to address it and properly defend our nation from these threats? Oh, sorry, that would be expecting acutal thoughtful and effective action from our political (total-lack-of) leadership.

    This book certainly met its goal, and I will be looking to see more in this area of public policy for (hopefully) greater future success in securing the nation and its infrastructure from attack.

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted February 12, 2014

    GEMHEART

    I have icy blue eyes and blackish grayblue fur i am 17 moons. Loyal and kind and honest.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted February 7, 2014

    Silverstar to Technostar

    Would you be wiling to join your clan with Nightclan at tatares res one. We are very organized and need more cats thanks Silverstar.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted January 30, 2014

    Cleverclaw

    A cream colered shecat with light blue eyes. Like her name she is very clever. She is always calm and always has a factually of porportions to solve mysteries and puzzles. No crush and no mate. Loves puzzles games jokes riddles........and lots of complications. Dislikes dumbnes stupitity bad jokes poor puzzles and waking her up when she takes naps. For more ask

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted February 12, 2014

    Frostfur to all

    Go to second result to Rp.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted January 29, 2014

    Nightmoons

    Black and silver pelt with green eyes watched her family die by bloodclan cuz they werelooking for her and her parent wouldent tell she was kinda like a princess but not at the same time she is loyal and caring is 17 moons wants a mate and kits

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted January 28, 2014

    Steelpdlts bio

    Has a pelt ifused with some iron after a deadly accident that killed twelve twolegs and wiped out his clan.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted April 8, 2014

    Technostar...

    ...to anyone who came back here to see if this clan was still up let me say...im so sorry... im a terible person...everthing died...im sorry i wasnt active...im sorry i cant hold a cla together...im sorry i let people down...im sorry...

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted June 6, 2011

    No text was provided for this review.

  • Anonymous

    Posted May 23, 2010

    No text was provided for this review.

  • Anonymous

    Posted May 27, 2011

    No text was provided for this review.

  • Anonymous

    Posted May 28, 2010

    No text was provided for this review.

  • Anonymous

    Posted April 23, 2011

    No text was provided for this review.

  • Anonymous

    Posted April 20, 2010

    No text was provided for this review.

  • Anonymous

    Posted June 26, 2010

    No text was provided for this review.

  • Anonymous

    Posted December 31, 2010

    No text was provided for this review.

  • Anonymous

    Posted January 19, 2011

    No text was provided for this review.

  • Anonymous

    Posted December 29, 2010

    No text was provided for this review.

See All Sort by: Showing 1 – 20 of 43 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)