This scarce antiquarian book is a facsimile reprint of the original. Due to its age; it may contain imperfections such as marks; notations; marginalia and flawed pages. Because we believe this work is culturally important; we have made it available as part of our commitment for protecting; preserving; and promoting the world's literature in affordable; high quality; modern editions that are true to the original work.
#214215 in Books Eamon Dolan Mariner Books 2015-11-03 2015-11-03Original language:EnglishPDF # 1 8.00 x .79 x 5.31l; 1.00 #File Name: 0544570286288 pagesEamon Dolan Mariner Books
Review
0 of 0 people found the following review helpful. AwesomeBy Kindle CustomerDefinitely worth the read and very informative of the past; present and future of the internet as well as cyber security. Hopefully many things in this book never come to fruition like disallowing anonymity on the internet with digital passports. The internet and freedom of speech are becoming a smaller and smaller network that is not open to our future as it was never written in our constitution that we have the right to remain anonymous. I see a new amendment coming down from the Supreme Court YEARS from now that will provide anonymity and freedom of speech digitally.0 of 0 people found the following review helpful. Very Timely ReadBy VakhtangVery timely book. I was surprised how much of the "cyber war" takes place not in government or military circles but in the commercial world. I hope the author writes a follow-up soon.0 of 0 people found the following review helpful. A truly well researched and documented account of cyber security in our timeBy Mark S. MandellThis is about as thorough and exhaustively researched book on the subject of cyber security as you're going to find. It's certainly timely as well; what with the recent hacking into Sony and the embarrassing release of emails which may not turn out to be as destructive as it seems(though heads rolling at the top may be an expected casualty of the event; moreover it's difficult to definitely establish that North Korea in fact was the brains behind the hacking success).My own and only complaint is that it would have been helpful if the author with all his prodigious research had included at least one flow chart to graphically illustrate the source and direction of the hacking process even using real incidents which could enhance one's understanding in a visual way about how this kind of thing works.