Behold a Pale Farce et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
EUR 16,87
  • Tous les prix incluent la TVA.
Il ne reste plus que 5 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon.
Emballage cadeau disponible.
Quantité :1
Behold a Pale Farce: Cybe... a été ajouté à votre Panier
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Behold a Pale Farce: Cyberwar, Threat Inflation, & the Malware Industrial Complex (Anglais) Broché – 17 avril 2014


Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Broché
"Veuillez réessayer"
EUR 16,87
EUR 10,70 EUR 10,07

A court d'idées pour Noël ?

Offres spéciales et liens associés


Les clients ayant acheté cet article ont également acheté


Descriptions du produit

Behold a Pale Farce This book presents a data-driven message that exposes the cyberwar media campaign being directed by the Pentagon and its patronage networks. By demonstrating that the American public is being coerced by a threat that has been blown out of proportion--much like the run-up to the Gulf War or the global war on terror--this book discusses how the notion of cyberwar instills a crisis mentality that discourages formal risk assessment, making the public anxious and hence susceptible to ill-conceived solutions. With content that challenges conventional notions regarding cyber security, "Behold a Pale Farce" covers topics--including cybercrime; modern espionage; mass...


Détails sur le produit


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre (En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 8 commentaires
5 internautes sur 5 ont trouvé ce commentaire utile 
Fear, Money, Power, and Information Security 21 mai 2014
Par W. Banker - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
Bill Blunden and Violet Cheung have written a timely and important book documenting (extensively footnoted throughout) the convergence of interests surrounding the notion of "cybergeddon" or as former Defense Secretary Leon Panetta put it, a possible "Cyber Pearl Harbor". Like the military industrial complex that Dwight D. Eisenhower warned of over 50 years ago, the Information Era has brought forth it's own actors who have a political and economic incentive towards threat inflation. Bill calls this the "malware industrial complex".

Cyberwarfare is a term which we have been repeatedly exposed to in the MSM, if not bludgeoned with, over the past six years. Both from politicians, and various actors who have an economic or political incentive to participate actively in "threat inflation". The net effect of these voices has been to foment a crisis mentality, and as Bill aptly documents and describes, to drive spending and budgets beyond the bounds of what otherwise could be achieved through rational fact based public discourse. As anyone within the Information Security industry will tell you, an attack vector normally has to have an actor(s) with a motive constituting a threat, a vulnerability or in this context a whole series of vulnerabilities within a set of systems, a number of exploits to take advantage of the aforementioned vulnerabilities, then impacts or outcomes that happen from exercising the exploits, and finally and most importantly meaningful consequences. This last point cannot be overstated. We hear all the time about thousands of attacks being launched against this or that, but they amount to little more than stones thrown against a massive iron gate...they are nuisances and nothing more.

When it comes to critical infrastructure you can trot out a whole list of vulnerabilities that have been documented within various ICS/SCADA components. Theoretically this represents potential exploits. But it is a lot harder to turn a potential exploit into a meaningful consequence than the number of documented vulnerabilities suggests. And this explains in large part (leaving aside actor motives for the moment) why there is nearly a complete absence of publicized attacks which have had meaningful consequences (other than being a nuisance to information security officials responsible for protecting said infrastructure). Bill points just this fact out, again and again. The hype over the threat has not translated into consequences that we can see and measure. And even some previously listed "cyber attacks" have been found to be not be cyber attacks at all, but failures of equipment due to environmental or operating conditions unrelated to information security breaches.

So in the absence of documented events constituting validation of all the fear and threat inflation we have had over the past six years what is one to make of it? Bill points out that we have seen this show before. We have seen various actors, both private and governmental inflate the threat in order to drive spending or public policy in excess of what could be critically justified if one adhered to a proper risk analysis framework which measured the actual threats and vulnerabilities against various outcomes. Threat inflation within information security and the economic incentives to engage in it, goes back at least to the dreaded Y2K bug where we were told that planes would drop from the sky as soon as computer clocks rolled over to the year 2000. The media sells fear, and various actors line up to provide the cure.

Bill does not say that there are no real threats. He goes on to point out that there are plenty of economic and espionage threats within cyberspace; they are real, growing, and cause significant (documented with $$) consequences. What he does do is separate the actual as well as reasonably probable threats from the hype of cyber doom.

If you are interested in the merging of economics, politics, propaganda, and information security you will find this book valuable if for no other reason than the extensive citations which will allow you to walk back the author's arguments as to why we are here, how we got here, and as the old latin phrase denotes "cui bono?"...or "who benefits?" from this existing state of affairs.

Well written, accessible, and fact filled.
3 internautes sur 3 ont trouvé ce commentaire utile 
Amazing 3 juin 2014
Par Brian Cunningham - Publié sur Amazon.com
Format: Format Kindle
Heard the author speak on this book on the radio and was very impressed. Very grounded and scholarly presentation, and the facts are disturbing. THe US has been gutted by corporations and is in a bleak situation. Cybergeddon is one of many measures this new war has been waged.
4 internautes sur 6 ont trouvé ce commentaire utile 
Replaces one propaganda with another 6 juillet 2014
Par scribble - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
The preface starts strong, outlining the history of propaganda and seems to foreshadow what you hope will follow in the meat of the book. I wanted the book to be about the techniques used by the infosec industry to advocate their FUD (Fear, Uncertainty, Doubt). Instead, the preface concludes with referring to Snowden as a hero, and that is the real foreshadowing for the book. The book is strongly left-wing, and focuses on trying to advocate that the NSA is naughty. I've called out the book as left-wing, specifically because it tries to use the term "right-wing" as a derogatory term.

If you can get past it's unfortunate political bent, it does do a good job of retelling the history of cyber events. At a technical level, Blunden knows his stuff. The book does an excellent job of citing where it's information comes from, as each chapter concludes with pages of references. The book does accomplish the goal of exposing how we are not in a "cyberwar", and we have not had any cyber events that were on scale with any sort of natural disasters or other crime.

Conclusion: You'll get a good technical cyber history lesson (or refresher) from this book, but unfortunately it's too strongly biased.
Good content but needs a better editor. 4 octobre 2014
Par Trust No One - Publié sur Amazon.com
Format: Broché
First the problems:

-bias does show through
-poor proofreading and editing (hard to believe this was at multiple publishers)
-low quality printing, especially given the relatively high price for a paperback.

Second the good points:

- documented by extensive footnotes at end of each section.
- dry but not pain(t)fully so
- demonstrates clearly the problems with attribution
- demonstrates clearly that there are many players (including US govt) in this game
- explains many of the recently used techniques related to malware insertion/usage

On the whole, a whorthwhile read. Eventhough the author's bias shows through on a number of occasions, their points are backed up with facts unlike other books which also have a clear bias. Given the less than great production value, recommend picking up a used copy.
Eye Opener ... 3 août 2014
Par Gregory Brylski - Publié sur Amazon.com
Format: Broché Achat vérifié
CIA spying on senate intelligence committee members ... Ex-NSA chief setting up his own business at $1 million per day charge .. All major software vendors creating software that's inherently insecure ... What a joke it all is. If congress was so concerned about their privacy, then they should pass a bill requiring mfr's like Microsoft to actually develop software to be secure. This book shows not only how awful the NSA is, but how pathetic Congress is and how the software industry is really incompetent.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?