@War: The Rise of the Military-Internet Complex

1.025,00 EGP

ASIN ‏ : ‎ B00HP6T7V0
Publisher ‏ : ‎ Harper; Reprint edition (November 11, 2014)
Publication date ‏ : ‎ November 11, 2014
Language ‏ : ‎ English
File size ‏ : ‎ 2345 KB
Text-to-Speech ‏ : ‎ Enabled
Screen Reader ‏ : ‎ Supported
Enhanced typesetting ‏ : ‎ Enabled
X-Ray ‏ : ‎ Enabled
Word Wise ‏ : ‎ Enabled
Sticky notes ‏ : ‎ On Kindle Scribe
Print length ‏ : ‎ 293 pages

Description

Price: $10.25
(as of Jul 30,2024 01:44:47 UTC – Details)




ASIN ‏ : ‎ B00HP6T7V0
Publisher ‏ : ‎ Harper; Reprint edition (November 11, 2014)
Publication date ‏ : ‎ November 11, 2014
Language ‏ : ‎ English
File size ‏ : ‎ 2345 KB
Text-to-Speech ‏ : ‎ Enabled
Screen Reader ‏ : ‎ Supported
Enhanced typesetting ‏ : ‎ Enabled
X-Ray ‏ : ‎ Enabled
Word Wise ‏ : ‎ Enabled
Sticky notes ‏ : ‎ On Kindle Scribe
Print length ‏ : ‎ 293 pages

Customers say

Customers find the book’s content excellent, insightful, and a good look at cyber warfare. They also describe the reading experience as awesome, easy to read, and great. Readers also find the plot interesting and eerie.

AI-generated from the text of customer reviews

This Post Has 10 Comments

  1. Great and informational
    As a student studying cyber security, this was an assigned book this semester, but it has become a book that I personally have recommended to other professors, as well as other students to help our research papers. There is so much information and history in this book, I am so glad that I bought a copy, and didn’t try to rent it. I have a kindle copy, but I may buy a paperback to loan out to friends and family. That’s how much I love this book. Harris has done a lot of research and it shows. I can’t wait to see what else he puts out.I will say there are times where he seems repetitive, but he does elaborate and go more in depth for the most part when he does repeat.

  2. Good investigation of what’s going on behind the scenes regarding Internet security
    Full disclosure: I do not know the author; do not have any financial interest in this book; I did buy the book from Amazon. @War is a good look at what is going on under the hood regarding cybersecurity. It profiles the activities of government and industry and the symbiotic relationship that has grown up, especially since 9/11. Most telling for me: the way policies are implemented after crises, rather than as a result of proactive planning. Also, the role of individual egos and ambitions in determining our cybersecurity strategy. Maybe not surprising, given than everyone in Washington is a politician. The growth of private cybersecurity companies is also remarkable. Mandiant being the best known, but quite a few others recently set up by former government employees. I felt Mr. Harris’ writing was balanced. He gives due credit to the NSA, but also suggests that private industry may do just as good a job securing critical infrastructure. His way forward suggests the primary role to be played by private industry. Mr. Harris also describes a “secure Internet” of the future. This could be a return to the walled garden of AOL; I happen to agree with him on this trend. I recommend the book to anyone interested in the future of the Internet and the roles of government and private industry.

  3. CYBER PEARL HARBOR
    Dan Coates is the United States Director of National Security. In a recent congressional hearing, he stated, “Frankly, the United States is under attack by entities that are using cyber to penetrate every actor that takes place in the United States ….” That statement, in reference to this report, is exactly what @WAR is about; cyber warfare and the development of the cyber-military-intelligence-industrial complex organized to detect and defend the United States from cyber attacks from both foreign and domestic entities.@WAR opens with a top-level meeting of government and private stakeholders, those entities who could be affected by a cyber attack. They where told of the emerging cyber threat. At that time, very little was known about cyber threats, let alone the scope of the threats. So not surprisingly, the invitees came away from their meeting shocked and completely surprised that our very existence was under attack by bad guys with desktop computers and an Internet connection. And the threat was growing at an accelerated pace, fueled by the breakthrough advancements in computer technologies, high-speed processors, more memory, fiber optic cables, just to name a few. Experts predicted that in the near future, cyber war would dominate the war theaters. Indeed, in 2012 the US former defense secretary, Leon Panetta referred to the growing cyber threat as, “Cyber Pearl Harbor.”The term Cyber Pearl Harbor was coined with the obvious purpose to jolt the audience into the realization that cyberwar was serious business, grave and immediate. Something had to be done. Cyber Pearl Harbor then led to the category, “Fifth Domain of Warfare.” Placing Cyber Warfare, referred to as Information, on the list along with the other four domains of warfare:LandSeaAirSpaceInformationEach chapter of the book is filled with interesting stories. After the the Fifth Domain of Warfare the author addresses the topic of the NSA’s monitoring inside the United States. That was an eyebrow-lifting discussion. Imagine every single phone conversation and electronic communication being recorded. Another story discusses how the Chinese stole huge amounts of information about our high-tech, stealth F-35 strike fighter; the most advanced jet fighter design in the world. In other words, our most secrete of secrets were silently sucked away through wiretaps, satellites and undersea cables using a cryptographic hash of zeros and ones. The book’s chapters are also loaded with an abundance of computer terms and phrases. War Driving, rogue access points, bots and digital backdoors, are only a few examples. To get the most enjoyment out of this book, you probably should have some knowledge of these terms and phrases.Finally, from Cyber Pearl Harbor to Dan Coates’ recent warning that we are still under cyber attack, @WAR connects the complex of dots so that we all may understand the cyber threat facing our nation, what it is, where it came from and how to deal with it. I found the book interesting and a bit scary. In the end, however, absolutely no doubt is left that Cyber Warfare has become a threatening reality that potentially affects every American, maybe even every person on the planet. I enjoyed the book and have no trouble giving @WAR a five stars recommendation.

  4. OK , if you are a cyber warfare novice
    If you have little or no familiarity with the military /intelligence cyber world, this book is a good first read. However if you have decent level of understanding of this topic you will find the book offers nothing really new as far as information or insight into cyber warfare. In my opinion the book drags on to long on many of the same points and becomes somewhat boring, I had to struggle to get through it.

  5. Awesome
    Definitely worth the read and very informative of the past, present and future of the internet as well as cyber security. Hopefully many things in this book never come to fruition like disallowing anonymity on the internet with digital passports. The internet and freedom of speech are becoming a smaller and smaller network that is not open to our future as it was never written in our constitution that we have the right to remain anonymous. I see a new amendment coming down from the Supreme Court YEARS from now that will provide anonymity and freedom of speech digitally.

  6. An interesting book that unfortunately could have brought the same information with one 3rd of the pages.It is long, so long… It tries to make its point like a novel, with lenghty and overall useless details such as the name of restaurant where this former spy met that journalist etc. etc.You can skip many pages to get to the point…

  7. Very interesting read. Section on TOR was good. Still uncertain if TOR or TAILS do fully what they say.

Leave a Reply

Your email address will not be published. Required fields are marked *