EUR 18,78
  • Tous les prix incluent la TVA.
Il ne reste plus que 1 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 3 images

Behold a Pale Farce: Cyberwar, Threat Inflation, & the Malware Industrial Complex (Anglais) Broché – 17 avril 2014

4,2 étoiles sur 5
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile
4,2 étoiles sur 5 9 commentaires provenant des USA

Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 18,78
EUR 14,05 EUR 22,54
Note: Cet article est éligible à la livraison en points de collecte. Détails
Récupérer votre colis où vous voulez quand vous voulez.
  • Choisissez parmi 17 000 points de collecte en France
  • Les membres du programme Amazon Premium bénéficient de livraison gratuites illimitées
Comment commander vers un point de collecte ?
  1. Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
  2. Sélectionnez cette adresse lors de votre commande
Plus d’informations
click to open popover

Offres spéciales et liens associés

Description du produit

Présentation de l'éditeur

This book presents a data-driven message that exposes the cyberwar media campaign being directed by the Pentagon and its patronage networks. By demonstrating that the American public is being coerced by a threat that has been blown out of proportion much like the run-up to the Gulf War or the global war on terror this book discusses how the notion of cyberwar instils a crisis mentality that discourages formal risk assessment, making the public anxious and hence susceptible to ill-conceived solutions. With content that challenges conventional notions regarding cyber security, Behold a Pale Farce covers topics including cybercrime; modern espionage; mass-surveillance systems; and the threats facing infrastructure targets such as the Federal Reserve, the stock exchange, and telecommunications in a way that provides objective analysis rather than advocacy. This book is a must-read for anyone concerned with the recent emergence of Orwellian tools of mass interception that have developed under the guise of national security.

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.

Détails sur le produit

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Commentaires client les plus utiles sur (beta) (Peut contenir des commentaires issus du programme Early Reviewer Rewards) 4.2 étoiles sur 5 9 commentaires
8 internautes sur 9 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Fear, Money, Power, and Information Security 21 mai 2014
Par W. Banker - Publié sur
Format: Format Kindle Achat vérifié
Bill Blunden and Violet Cheung have written a timely and important book documenting (extensively footnoted throughout) the convergence of interests surrounding the notion of "cybergeddon" or as former Defense Secretary Leon Panetta put it, a possible "Cyber Pearl Harbor". Like the military industrial complex that Dwight D. Eisenhower warned of over 50 years ago, the Information Era has brought forth it's own actors who have a political and economic incentive towards threat inflation. Bill calls this the "malware industrial complex".

Cyberwarfare is a term which we have been repeatedly exposed to in the MSM, if not bludgeoned with, over the past six years. Both from politicians, and various actors who have an economic or political incentive to participate actively in "threat inflation". The net effect of these voices has been to foment a crisis mentality, and as Bill aptly documents and describes, to drive spending and budgets beyond the bounds of what otherwise could be achieved through rational fact based public discourse. As anyone within the Information Security industry will tell you, an attack vector normally has to have an actor(s) with a motive constituting a threat, a vulnerability or in this context a whole series of vulnerabilities within a set of systems, a number of exploits to take advantage of the aforementioned vulnerabilities, then impacts or outcomes that happen from exercising the exploits, and finally and most importantly meaningful consequences. This last point cannot be overstated. We hear all the time about thousands of attacks being launched against this or that, but they amount to little more than stones thrown against a massive iron gate...they are nuisances and nothing more.

When it comes to critical infrastructure you can trot out a whole list of vulnerabilities that have been documented within various ICS/SCADA components. Theoretically this represents potential exploits. But it is a lot harder to turn a potential exploit into a meaningful consequence than the number of documented vulnerabilities suggests. And this explains in large part (leaving aside actor motives for the moment) why there is nearly a complete absence of publicized attacks which have had meaningful consequences (other than being a nuisance to information security officials responsible for protecting said infrastructure). Bill points just this fact out, again and again. The hype over the threat has not translated into consequences that we can see and measure. And even some previously listed "cyber attacks" have been found to be not be cyber attacks at all, but failures of equipment due to environmental or operating conditions unrelated to information security breaches.

So in the absence of documented events constituting validation of all the fear and threat inflation we have had over the past six years what is one to make of it? Bill points out that we have seen this show before. We have seen various actors, both private and governmental inflate the threat in order to drive spending or public policy in excess of what could be critically justified if one adhered to a proper risk analysis framework which measured the actual threats and vulnerabilities against various outcomes. Threat inflation within information security and the economic incentives to engage in it, goes back at least to the dreaded Y2K bug where we were told that planes would drop from the sky as soon as computer clocks rolled over to the year 2000. The media sells fear, and various actors line up to provide the cure.

Bill does not say that there are no real threats. He goes on to point out that there are plenty of economic and espionage threats within cyberspace; they are real, growing, and cause significant (documented with $$) consequences. What he does do is separate the actual as well as reasonably probable threats from the hype of cyber doom.

If you are interested in the merging of economics, politics, propaganda, and information security you will find this book valuable if for no other reason than the extensive citations which will allow you to walk back the author's arguments as to why we are here, how we got here, and as the old latin phrase denotes "cui bono?"...or "who benefits?" from this existing state of affairs.

Well written, accessible, and fact filled.
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Eye Opener ... 3 août 2014
Par Gregory Brylski - Publié sur
Format: Broché Achat vérifié
CIA spying on senate intelligence committee members ... Ex-NSA chief setting up his own business at $1 million per day charge .. All major software vendors creating software that's inherently insecure ... What a joke it all is. If congress was so concerned about their privacy, then they should pass a bill requiring mfr's like Microsoft to actually develop software to be secure. This book shows not only how awful the NSA is, but how pathetic Congress is and how the software industry is really incompetent.
5.0 étoiles sur 5 T1 T2 T3 27 septembre 2014
Par Chris - Publié sur
Format: Format Kindle Achat vérifié
I want to thank Bill Blunden for making an overwhelmingly complex subject that is full of all the intrigue of a work of fiction not only understandable but enjoyable and captivating as well.
5.0 étoiles sur 5 Five Stars 20 novembre 2014
Par Harun Resit Altun - Publié sur
Format: Format Kindle Achat vérifié
Amazing book
9 internautes sur 12 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 Replaces one propaganda with another 6 juillet 2014
Par Scott Piper - Publié sur
Format: Format Kindle Achat vérifié
The preface starts strong, outlining the history of propaganda and seems to foreshadow what you hope will follow in the meat of the book. I wanted the book to be about the techniques used by the infosec industry to advocate their FUD (Fear, Uncertainty, Doubt). Instead, the preface concludes with referring to Snowden as a hero, and that is the real foreshadowing for the book. The book is strongly left-wing, and focuses on trying to advocate that the NSA is naughty. I've called out the book as left-wing, specifically because it tries to use the term "right-wing" as a derogatory term.

If you can get past it's unfortunate political bent, it does do a good job of retelling the history of cyber events. At a technical level, Blunden knows his stuff. The book does an excellent job of citing where it's information comes from, as each chapter concludes with pages of references. The book does accomplish the goal of exposing how we are not in a "cyberwar", and we have not had any cyber events that were on scale with any sort of natural disasters or other crime.

Conclusion: You'll get a good technical cyber history lesson (or refresher) from this book, but unfortunately it's too strongly biased.
Ces commentaires ont-ils été utiles ? Dites-le-nous