America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare (Anglais) CD – Livre audio, 29 septembre 2011
- Choisissez parmi 17 000 points de collecte en France
- Les membres du programme Amazon Prime bénéficient de livraison gratuites illimitées
- Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
- Sélectionnez cette adresse lors de votre commande
Description du produit
Revue de presse
Présentation de l'éditeur
Unabridged, 8 CDs, 10 hours
Read by Lloyd James
A former top-level National Security Agency insider goes behind the headlines to explore America's next great battlefield: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.
Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.
Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.
Détails sur le produit
Si vous vendez ce produit, souhaitez-vous suggérer des mises à jour par l'intermédiaire du support vendeur ?
Commentaires en ligne
Commentaires client les plus utiles sur Amazon.com (beta) (Peut contenir des commentaires issus du programme Early Reviewer Rewards)
Joel Brenner's _America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare_ is a brilliant exception to both of these categories. Mr. Brenner may be uniquely-positioned to write this work-- he is trained as both a lawyer and an economist, and he has served as the United States' National Counterintelligence Executive and as Senior Counsel at the National Security Agency. He has first-hand exposure to the problems posed by cyberwarfare, cybercrime, and cyber-espionage, and possesses both the intellect and analytic toolsets with which to approach these problems.
Mr. Brenner begins by outlining the different problem-spaces-- cybercrime, the electronic theft of intellectual property, threats to weapons systems from compromised components, threats to the national powergrid-- by drawing on individual cases and events, and weaving them into a comprehensive narrative. Mr. Brenner painstakingly backs up his observations with almost 500 footnotes. (As a practitioner working in this space, I am familiar with the majority of what Mr. Brenner discusses in _America the Vulnerable_, and I still came away with much excellent supplementary reading material courtesy of the well-sourced research.) He continues with an excellent predictive scenario-- "June 2017"-- which synthesizes all of the previous work and makes explicit the cumulative threat.
Next, Mr. Brenner undertakes a discussion of how the gathering of intelligence and the protection of secrets has been fundamentally altered by information's transitus into searchable, indexed digital media. He concludes with a chapter entitled "Managing the Mess", where he lays out a number of responses to the current problems, encompassing shifts in public policy, as well as practical operational responses to business in a world rich in emergent, disruptive technologies.
Mr. Brenner's ability to make technical attacks and weaknesses clear to less-technical readers is impressive. No prior background in information technology is necessary to read and understand this book; however, Mr. Brenner has been meticulous in his explanations of complex technologies, and information security professionals will clearly recognize the issues under discussion. Personally, this book will greatly benefit me when I have to articulate certain risks to my executive management team.
By its very nature, this book must be a survey-- Joel Brenner cannot completely plumb all the subjects he is addressing in a 320 page book, and some specialists may yearn for more in-depth discussion on areas of particular interest to them. That being said, I think Mr. Brenner has achieved something powerful here-- he is articulating technical, economic, and legal problems to non-specialists while retaining a maximum of complexity and nuance. And, he has some logical, *actionable* responses to the problem-space. Bravo!