Gebraucht kaufen
EUR 9,97
+ EUR 3,00 Versandkosten
Gebraucht: Gut | Details
Zustand: Gebraucht: Gut
Kommentar: SUPERSCHNELLE LIEFERUNG,VERSAND NOCH AM SELBEN TAG AUS UNSEREM LAGER IN GROSSBRITANNIEN. GROSSARTIGE BUECHER IN GUTEM ODER SEHR GUTEM ZUSTAND.
Ihren Artikel jetzt
eintauschen und
EUR 2,99 Gutschein erhalten.
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Anhören Wird wiedergegeben... Angehalten   Sie hören eine Probe der Audible-Audioausgabe.
Weitere Informationen
Dieses Bild anzeigen

Inside Cyber Warfare (Englisch) Taschenbuch – 3. Februar 2010


Alle Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Amazon-Preis Neu ab Gebraucht ab
Taschenbuch
"Bitte wiederholen"
EUR 58,43 EUR 9,97
4 neu ab EUR 58,43 8 gebraucht ab EUR 9,97 1 Sammlerstück ab EUR 8,76

Dieses Buch gibt es in einer neuen Auflage:


Hinweise und Aktionen

  • Beim Kauf von Produkten ab 40 EUR erhalten Sie eine E-Mail mit einem 10 EUR Gutscheincode, einlösbar auf ausgewählte Premium-Beauty-Produkte. Diese Aktion gilt nur für Produkte mit Verkauf und Versand durch Amazon.de. Für weitere Informationen zur Aktion bitte hier klicken.

  • Sparpaket: 3 Hörbücher für 33 EUR: Entdecken Sie unsere vielseitige Auswahl an reduzierten Hörbüchern und erhalten Sie 3 Hörbücher Ihrer Wahl für 33 EUR. Klicken Sie hier, um direkt zur Aktion zu gelangen.

Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.


Produktinformation

  • Taschenbuch: 232 Seiten
  • Verlag: O'Reilly & Associates; Auflage: 1 (3. Februar 2010)
  • Sprache: Englisch
  • ISBN-10: 0596802153
  • ISBN-13: 978-0596802158
  • Größe und/oder Gewicht: 17,8 x 1,5 x 23,3 cm
  • Durchschnittliche Kundenbewertung: 4.0 von 5 Sternen  Alle Rezensionen anzeigen (1 Kundenrezension)
  • Amazon Bestseller-Rang: Nr. 129.759 in Fremdsprachige Bücher (Siehe Top 100 in Fremdsprachige Bücher)

Mehr über den Autor

Entdecken Sie Bücher, lesen Sie über Autoren und mehr

Produktbeschreibungen

Über den Autor und weitere Mitwirkende

Jeffrey Carr (Principal, GreyLogic) is a cyber intelligence expert, columnist for Symantec's Security Focus, and author who specializes in the investigation of cyber attacks against governments and infrastructures by State and Non-State hackers. Mr. Carr is the Principal Investigator for Project Grey Goose, an Open Source intelligence investigation into the Russian cyber attacks on Georgia in August, 2008. The Grey Goose Phase I and Phase II reports have been widely read and well-received throughout the Intelligence, Defense, and Law Enforcement agencies of Western governments. His work has been quoted in The New York Times, The Washington Post, The Guardian, BusinessWeek, Parameters, and Wired.

In diesem Buch (Mehr dazu)
Ausgewählte Seiten ansehen
Buchdeckel | Copyright | Inhaltsverzeichnis | Auszug | Stichwortverzeichnis | Rückseite
Hier reinlesen und suchen:

Kundenrezensionen

4.0 von 5 Sternen
5 Sterne
0
4 Sterne
1
3 Sterne
0
2 Sterne
0
1 Sterne
0
Siehe die Kundenrezension
Sagen Sie Ihre Meinung zu diesem Artikel

Die hilfreichsten Kundenrezensionen

5 von 5 Kunden fanden die folgende Rezension hilfreich Von Christoph Spohr am 20. Juli 2010
Format: Taschenbuch
Anspruch des Buches ist nach dem Klappentext, in die neue Kriegsform des 21. Jahrhunderts einzugehen und aufzuzeigen, was sich jenseits der Überschriften in den Zeitungen abspielt. Dem Anspruch wird das Buch nicht gerecht. Wer googlen kann, wird in diesem Buch nichts finden, was im Netz nicht schon zum Thema publiziert wurde. Analytisch ist das Buch sehr schwach. Weder werden zentrale Begriffe wie "Cyber Warfare" schlüssig definiert, noch die Hauptakteure und ihre Motive auf nennenswertem Niveau analysiert. Wer sich mal das Inhaltsverzeichnis anschaut, sieht, daß es hauptsächlich um DDos-Attacken und gehackte offizielle Webseiten im Krieg zwischen Rußland und Georgien sowie Palästina und Israel geht. "Cyber Warfare" halten ich für einen reichlich pompösen Titel zur Beschreibung dieser Phänomene.

Wer noch kein Vorwissen zum Thema "Cyber Warfare" hat, für den mag dieses Buch eine flüssig geschriebene Einführung sein, wer dagegen slashdot oder heise verfolgt und selbständig Informationen im Netz googlen kann, der findet hier wenig Neues.
Kommentar War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback. Wenn diese Rezension unangemessen ist, informieren Sie uns bitte darüber.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen

Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)

Amazon.com: 41 Rezensionen
45 von 50 Kunden fanden die folgende Rezension hilfreich
Light and Over-Hyped 25. Februar 2010
Von Dave - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
I bought this book trying to further my understanding of Cyber Warfare and how it has become integral force multiplier/enabler in today's digital battlefield. Unfortunately, I quickly realized that this book was basically a regurgitation of what is available on the Internet with a little "googling". The book itself is tiresome to read and feels like you are just trying to weed through so much "chaff" as you attempt to find something compelling to take away. Granted, I think if you have done no initial reading on the subject and it is totally new to you- this book may be a good primer. Seriously though, if you are a student that wants to gain a better understanding of how cyberspace plays a role in a geo-political strategic context- this is not the book for you. If Jeffrey Carr is an expert in Cyber Warfare- he needs to way up the ante on another book and make it more than just a conglomeration of articles that are pretty much freely available on the Internet.
10 von 11 Kunden fanden die folgende Rezension hilfreich
Not for the faint hearted 16. Februar 2012
Von Michael - Veröffentlicht auf Amazon.com
Format: Taschenbuch
Jeffrey Carr makes a living out of advising others on cyber security. It is unlikely that he'll be short of work in if only half is of what he writes about in this 300 page book is true.

Inside Cyber Warfare (O'Reilly Publishing) is as fascinating as it is worrying.

For example, how do you know who initiated a cyber attack? How do you tell the difference between cyber crime and cyber warfare, and does it matter (it does according to Carr, although the two are often linked). What are the differences between traditional war and cyber war, and what do these mean for things like defensive counter-measures or the traditional legal frameworks that guide war-making?

One of the strengths of this book is that these questions are not pursued in an abstract manner - one of Carr's purposes in writing the book is provide guidance for policy makers dealing with these issues. To that end, he grounds the theory with the practice, drawing on real life experiences to flesh out the discussion.

Are there any negatives to this book? A couple, but nothing too serious. Perhaps necessarily the book makes a lot of use of a small number of examples of cyber warfare - presumably because these examples are well understood by the author and, to date, because there are not that many examples in the public arena. The result is a feeling at times of repetition - a problem the editors probably could probably have managed better.

Ultimately I left the book worried about what Carr sees as a blind spot in the way that governments go about ensuring cyber security for their people. How will our governments respond if all of a sudden our banking systems were compromised, flight controls into our major airports thrown into chaos, and public utilities sent off-line through rogue malware?

They'd no doubt want to blame someone - but whom? Assuming they could track down the source of these events, it is likely that they'd find the malicious code sitting on computers hosted inside their own borders; coded perhaps by hackers from multiple countries; and quite likely arising because of lax security by government, military and private sector agencies. Do you blame the North Koreans, China or Russia, or is it the work of a small network of independent hack-tavists pursuing their own vendettas? Think about this, a cyber attack that threw the US into disarray emanating from computers hosted in the UK, Canada, Australia and the USA itself, and perhaps coded by hackers including some living in those same countries.

The fight against terror moved the front line from between opposing armies, to battles in the streets where people live. Cyber war battles will redefine this terrain once again, with the 'enemy' remaining illusive, potentially to the point where it is not even clear who the enemy is.

This is a must read book for anyone with an interest in matters of cyber life or security. The scary thing was that by the time I'd finished reading this book I had imagined several ways that I could commit cyber war without being caught - not something that I intend to do (obviously) but evidence that this is a field that needs to be more actively understood and debated, not just by 'experts' in the field but by anyone who has an active cyber life.
5 von 5 Kunden fanden die folgende Rezension hilfreich
Can cyber-pirates own the world? 11. Februar 2012
Von Alexey I. Smirnov - Veröffentlicht auf Amazon.com
Format: Taschenbuch
The main purpose of this book is to investigate whether it is possible to launch a devastating attack without possessing any weapons, by only using an Internet-connected PC. It happened many times in the past that military commanders went on horses to fight with tanks, in which case a large army can fall victim to a small regiment.

From the very beginning, the author makes it very clear that the main threat comes from non-state hacker groups who are indirectly supported by governments. I think those groups are similar to pirates of the medieval ages. They rip off merchants sometimes, but they can be hired to protect trade routes from competing states. As usual, private organizations are much quicker at building up teams with necessary skills, whereas the official government policy is still in its infancy. Also, there is a clear division in what government and non-government organizations do: the informal hacker groups launch attacks, and government agencies try to defend against external threats. The book makes it very clear that this needs to change.

Many governments realized that long time ago, so in the second half of the book the author presents a comprehensive overview of cyber-capabilities of top 20 or so most advanced countries. This is a bit boring to read, as the book provides way too many details on the internal structure of ministries and agencies. But maybe it is a good reference material for professional strategic decision makers. In addition, when analyzing Russia, I think the book attributes too much power to a bunch of oligarchs. Trust me, they are not responsible for cyber-attacks launched from Russia. There are indeed some covert hacker groups which the book fails to identify.

To summarize, the book is thought-provocative and clearly lays out the looming threats. But in my opinion it fails to identify the driving forces of the cyber war. It is not any particular government or that wealthy guy. Cyber war is still a black market, and the author fails to shed some light on this dark side. Or maybe he just does not want to mess up with them. Because of this elusiveness, I only give 4 stars to this book.
11 von 14 Kunden fanden die folgende Rezension hilfreich
Disappointing 14. November 2010
Von Matt B - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
I found this book to be very disappointing in many regards. I expect a certain degree of quality in O'Reilly books and this one did not meet it. It's a thin book, and although there is some interesting content, enough to pass a couple of hours of late-night reading, the level of writing is about that of a mediocre Wikipedia article. The style is more appropriate for a blog or uneven journalistic account than a published book. Typos, very obvious ones, abounded throughout the text. The price is exorbitant for such a shallow pass at the subject.

I did not find it to be an intellectually stimulating work, and its best value was in directing me to other resources referenced by the work.

My guess is that the publisher wanted to capitalize off a cool subject, but this fails to attack the subject in any significant way.
9 von 12 Kunden fanden die folgende Rezension hilfreich
Like a personal intelligence briefing on the highest-end threats 18. Januar 2010
Von David J. Bianco - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
At the time of this writing, one of the biggest stories in the media is that Google and several other large technology companies were attacked by Chinese hackers. Although this seems to have caught almost everyone by surprise, it's no surprise to those of us in the trenches, responding to these types of incidents every day. "Inside Cyber Warfare: Mapping the Cyber Underworld" is by far the best available guide to this highly sophisticated threatscape.

The book's author is Jeffrey Carr, author of the well-known IntelFusion blog ([...]) and founder of Project Grey Goose, both of which provide high quality intelligence analyses on a number of cyberwar-related topics. The book reviews, organizes and expands upon many issues already covered on his blog, but does so in a way that actually adds value. This isn't a retread of old postings; it's an entirely new creation.

I used the term "intelligence analysis", and that's really what this book is: one big dossier on the means, motives, opportunities and identities of some of the major players in the cyber warfare arena. Specifically, this book's focus is on nation-states with known cyberwar capabilities, such as China, Russia and the United States. However, there is also some limited coverage both of other countries (e.g., North Korea) and other actors, such as organized crime.

The first couple of chapters begin by providing some basic background on cyberwar, defining terms, citing recent examples (such as the Russian attacks on Georgian websites in 2008) and discussing the transition from direct action by states to state-sponsored third party actors. This last concept is perhaps the most critical one in the entire book: states rarely do their own dirty work anymore. They tend to work through third parties, which is much less risky because it offers them plausible deniability. This is a major feature of today's cyberwar, and the book does an excellent job explaining why this happens and what the ramifications are for the victims of these attacks. This is a critical theme that carries through much of the rest of the book.

Chapters 3 and 4 focus more on the legalities of cyber warfare, definitions and relevant treaties. In fact, Chapter 4 (Responding to International Cyber Attacks as Acts of War) is one of the standout sections of the book. Written by guest author Lt. Cdr. Matthew Sklerov, USN, this chapter draws on numerous examples of case law and legal opinions to make a compelling case that the best defense against a cyberwar is to actively identify the aggressor and to attack them right back. Readers conditioned to think of legal arguments as dry and boring are in for a real treat, as this is quite a fascinating read.

The next several chapters establish a framework for performing intelligence investigations into the sources and motives behind cyber attacks, then explore several fruitful mechanisms for performing this research, such as by performing reconnaissance on relevant hacker forums, building social network graphs and the ever-popular "follow the money" approach. In doing so, Carr often shows how these mechanisms are really double-edged swords, providing as much or more benefit to the adversary as to the investigator. You can find some of this material elsewhere (Hacking: The Next Generation (Animal Guide) has quite a lot to say about social networks, for example), but in context with the rest of the book, these chapters still work quite well.

Finally, the last few chapters explore the role of cyberwar at the national level. Carr discusses and gives examples of relevant military doctrine from Russia, China and the US, showing how each nation views the key questions from different perspectives. Chapter 13 (Advice for Policy Makers from the Field) is particularly interesting, as three prominent experts each tackle one controversial cyberwar issue and give advice directly to policy makers, using this book as a sort of open letter.

"Inside Cyber Warfare: Mapping the Cyber Underworld" is the best book I've seen for those of us charged with defending against the highest-end threats to information security. It provides a comprehensive intelligence briefing on actors, capabilities, motivations and possible responses to acts of cyberwar. I highly recommend this for government, military and corporate readers who are responsible for either securing their own networks or for setting security policy. The threat is real, and these groups are active. Inside Cyber Warfare is the guide you need to help you understand the context in which your organization operates on the modern battlefield.
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.