Cybersecurity and Cyberwar: What Everyone Needs to Know

( 2 )

Overview


A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business ...
See more details below
Paperback
$12.44
BN.com price
(Save 26%)$16.95 List Price

Pick Up In Store

Reserve and pick up in 60 minutes at your local store

Other sellers (Paperback)
  • All (26) from $10.14   
  • New (21) from $10.14   
  • Used (5) from $11.51   
Cybersecurity and Cyberwar: What Everyone Needs to KnowRG

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$9.49
BN.com price
(Save 13%)$10.99 List Price

Overview


A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money off of them; lawyers and ethicists building new frameworks for right and wrong. Most of all, cybersecurity issues affect us as individuals. We face new questions in everything from our rights and responsibilities as citizens of both the online and real world to simply how to protect ourselves and our families from a new type of danger. And yet, there is perhaps no issue that has grown so important, so quickly, and that touches so many, that remains so poorly understood.

In Cybersecurity and CyberWar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyber expert Allan Friedman team up to provide the kind of easy-to-read, yet deeply informative resource book that has been missing on this crucial issue of 21st century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters, and what can we do? Along the way, they take readers on a tour of the important (and entertaining) issues and characters of cybersecurity, from the "Anonymous" hacker group and the Stuxnet computer virus to the new cyber units of the Chinese and U.S. militaries. Cybersecurity and CyberWar: What Everyone Needs to Know® is the definitive account on the subject for us all, which comes not a moment too soon.

What Everyone Needs to Know® is a registered trademark of Oxford University Press.

Read More Show Less

Editorial Reviews

From the Publisher

"...an impressive tour de force, Cybersecurity and Cyberwar gives us actual case studies, insider interviews, bizarre trivia, and a lot of dramatic statistics to help demystify the danger, and there is real danger. The timely book brings thoughtful, witty, and balanced analysis to this very important emerging discussion...it's a book I wish I had written." --Patrick Lin, The Atlantic

"If you're completely ignorant about malware and cyberattacks, this is the book for you. And if you think you know a lot about these topics, this is still the book for you. It's thorough, exhaustive, and easy to read...extremely approachable." --Mashable

"In confronting the cybersecurity problem, it's important for all of us to become knowledgeable and involved. This book makes that possible -- and also fascinating. It's everything you need to know about cybersecurity, wonderfully presented in a clear and smart way."--Walter Isaacson, author of Steve Jobs

"If you read only one book about 'all this cyberstuff,' make it this one. Singer and Friedman know how to make even the most complicated material accessible and even entertaining, while at the same time making a powerful case for why all of us need to know more and think harder about the (cyber)world we know live in."--Anne-Marie Slaughter, President, the New America Foundation

"Singer and Friedman blend a wonderfully easy to follow FAQ format with engaging prose, weaving explanations of the elements of cybersecurity with revealing anecdotes. From the fundamentals of Internet architecture to the topical intrigue of recent security leaks, this book provides an accessible and enjoyable analysis of the current cybersecurity landscape and what it could look like in the future."--Jonathan Zittrain, Professor of Law and Professor of Computer Science at Harvard University, and author of The Future of the Internet-And How to Stop It

"Singer and Friedman do a highly credible job of documenting the present and likely future risky state of cyber-affairs. This is a clarion call."--Vint Cerf, "Father of the Internet," Presidential Medal of Freedom winner

"I loved this book. Wow. Until I read this astonishing and important book, I didn't know how much I didn't know about the hidden world of cybersecurity and cyberwar. Singer and Friedman make comprehensible an impossibly complex subject, and expose the frightening truth of just how vulnerable we are. Understanding these often-invisible threats to our personal and national security is a necessary first step toward defending ourselves against them. This is an essential read."--Howard Gordon, Executive Producer of 24 and co-creator of Homeland

"In our digital age, the issues of cybersecurity are no longer just for the technology crowd; they matter to us all. Whether you work in business or politics, the military or the media-or are simply an ordinary citizen-this is an essential read."--Eric Schmidt, Executive Chairman, Google

"This is the most approachable and readable book ever written on the cyber world. The authors have distilled the key facts and policy, provided sensible recommendations, and opened the debate generally to any informed citizen: a singular achievement. A must read for practitioners and scholars alike."--Admiral James Stavridis, U.S. Navy (Ret), former Supreme Allied Commander at NATO

Read More Show Less

Product Details

  • ISBN-13: 9780199918119
  • Publisher: Oxford University Press
  • Publication date: 1/3/2014
  • Series: What Everyone Needs to Know Series
  • Pages: 320
  • Sales rank: 80,849
  • Product dimensions: 5.50 (w) x 8.10 (h) x 1.00 (d)

Meet the Author

P.W. Singer is Director of the Center for 21st Century Security and Intelligence at the Brookings Institution.

Allan Friedman is a Visiting Scholar at the Cyber Security Policy Research Institute, School of Engineering and Applied Sciences at George Washington University.

Read More Show Less

Table of Contents

INTRODUCTION
Why Write a Book about Cybersecurity and Cyberwar?
Why Is There a Cybersecurity Knowledge Gap, and Why Does It Matter?
How Did You Write the Book and What Do You Hope to Accomplish?

PART I: HOW IT ALL WORKS
The World Wide What? Defining Cyberspace
Where Did This "Cyber Stuff" Come from Anyway? A Short History of the Internet
How Does the Internet Actually Work?
Who Runs It? Understanding Internet Governance
On the Internet, How Do They Know Whether You Are a Dog?
Identity and Authentication
What Do We Mean by "Security" Anyway?
What Are the Threats?
One Phish, Two Phish, Red Phish, Cyber Phish: What Are Vulnerabilities?
How Do We Trust in Cyberspace?
Focus: What Happened in WikiLeaks?
What Is an Advanced Persistent Threat (APT)?
How Do We Keep the Bad Guys Out? The Basics of Computer Defense
Who Is the Weakest Link? Human Factors

PART II: WHY IT MATTERS
What Is the Meaning of Cyberattack? The Importance of Terms and Frameworks
Whodunit? The Problem of Attribution
What Is Hactivism?
Focus: Who Is Anonymous?
The Crimes of Tomorrow, Today: What Is Cybercrime?
Shady RATs and Cyberspies: What Is Cyber Espionage?
How Afraid Should We Be of Cyberterrorism?
So How Do Terrorists Actually Use the Web?
What about Cyber Counterterrorism?
Security Risk or Human Right? Foreign Policy and the Internet
Focus: What Is Tor and Why Does Peeling Back the Onion Matter?
Who Are Patriotic Hackers?
Focus: What Was Stuxnet?
What Is the Hidden Lesson of Stuxnet? The Ethics of Cyberweapons
"Cyberwar, Ugh, What Are Zeros and Ones Good For?": Defining Cyberwar
A War by Any Other Name? The Legal Side of Cyber Conflict
What Might a "Cyberwar" Actually Look Like? Computer Network Operations
Focus: What Is the US Military Approach to Cyberwar?
Focus: What Is the Chinese Approach to Cyberwar?
What about Deterrence in an Era of Cyberwar?
Why Is Threat Assessment So Hard in Cyberspace?
Does the Cybersecurity World Favor the Weak or the Strong?
Who Has the Advantage, the Offense or the Defense?
A New Kind of Arms Race: What Are the Dangers of Cyber Proliferation?
Are There Lessons from Past Arms Races?
Behind the Scenes: Is There a Cyber-Industrial Complex?

PART III: WHAT CAN WE DO?
Don't Get Fooled: Why Can't We Just Build a New, More Secure Internet?
Rethink Security: What Is Resilience, and Why Is It Important?
Reframe the Problem (and the Solution): What Can We Learn from Public Health?
Learn from History: What Can (Real) Pirates Teach Us about Cybersecurity?
Protect World Wide Governance for the World Wide Web: What Is the Role of International Institutions?
"Graft" the Rule of Law: Do We Need a Cyberspace Treaty?
Understand the Limits of the State in Cyberspace: Why Can't the Government Handle It?
Rethink Government's Role: How Can We Better Organize for Cybersecurity?
Approach It as a Public-Private Problem: How Do We Better Coordinate Defense?
Exercise Is Good for You: How Can We Better Prepare for Cyber Incidents?
Build Cybersecurity Incentives: Why Should I Do What You Want?
Learn to Share: How Can We Better Collaborate on Information?
Demand Disclosure: What Is the Role of Transparency?
Get "Vigorous" about Responsibility: How Can We Create Accountability for Security?
Find the IT Crowd: How Do We Solve the Cyber People Problem?
Do Your Part: How Can I Protect Myself (and the Internet)?

CONCLUSIONS
Where Is Cybersecurity Headed Next?
What Do I Really Need to Know in the End?

Read More Show Less

Customer Reviews

Average Rating 5
( 2 )
Rating Distribution

5 Star

(2)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 Customer Reviews
  • Anonymous

    Posted April 19, 2014

    Cd 4747'/%+

    Be

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted January 1, 2014

    Fad Great resd Great read

    Great read. Useful, fun, informative and entertaining all in one

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 2 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)