Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.

Prix Kindle : EUR 2,99
TVA incluse

Ces promotions seront appliquées à cet article :

Certaines promotions sont cumulables avec d'autres offres promotionnelles, d'autres non. Pour en savoir plus, veuillez vous référer aux conditions générales de ces promotions.

Envoyer sur votre Kindle ou un autre appareil

Envoyer sur votre Kindle ou un autre appareil

Zero Day: The Threat In Cyberspace (English Edition) par [The Washington Post, Robert O'Harrow]
Publicité sur l'appli Kindle

Zero Day: The Threat In Cyberspace (English Edition) Format Kindle

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
EUR 2,99

Longueur : 73 pages Composition améliorée: Activé Page Flip: Activé
Langue : Anglais

Descriptions du produit

Présentation de l'éditeur

Will the world’s next war be fought in cyberspace? 

"It's going to happen," said former National Defense University Professor Dan Kuehl. 

So much of the world’s activity takes place on the internet now – including commerce, banking and communications -- the Pentagon has declared war in cyberspace an inevitability. For more than a year, Washington Post reporter Robert O'Harrow has explored the threats proliferating in our digital universe. This eBook is a compilation of that reporting. With chapters built around real people, including hackers, security researchers and corporate executives, this book will help regular people, lawmakers and businesses better understand the mind-bending challenge of keeping the internet safe from hackers and security breaches -- and all out war.

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 5788 KB
  • Nombre de pages de l'édition imprimée : 73 pages
  • Editeur : Diversion Books (9 janvier 2014)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B00B05MQGU
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Composition améliorée: Activé
  • Moyenne des commentaires client : Soyez la première personne à écrire un commentaire sur cet article
  • Classement des meilleures ventes d'Amazon: n°300.109 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Voulez-vous faire un commentaire sur des images ou nous signaler un prix inférieur ?

click to open popover

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Commentaires client les plus utiles sur (beta) HASH(0x99ffe840) étoiles sur 5 26 commentaires
17 internautes sur 17 ont trouvé ce commentaire utile 
HASH(0x98b0830c) étoiles sur 5 An excellent quick introduction to Cyberspace threats 25 mars 2013
Par David Wilson - Publié sur
Format: Format Kindle Achat vérifié
There are plenty of detailed books on hacking and cybersecurity, but if you need a crash course in the basics of the field, or a broad definition of the issues and potential impacts, this is a good place to start. You can move on to a lengthier and more detailed technical study later if you are so inclined.

This eBook reprints several articles originally published in the Washington Post in 2012 as parts of a series on cyberattacks and the threat they represent to governments and large businesses around the world. I had not previously realized the extent to which cyberwarriors are beachcombers and prospectors rather than brilliant designers of electronic warfare environments. They scan millions of lines of common code in the ubiquitous operating systems and control software on the Internet, testing for weaknesses with automated routines that write bad instructions here and there to see what happens. Once they find an action with an unanticipated but non-fatal consequence, they can zero in on the weakness and -- all too often -- find a way to into a control system that grants them the power to do great damage.

You will probably never get this kind of concise, explanatory reporting from any broadcast media source. It takes some actual sit-down investigative work over a period of weeks and months to develop a sense of the battlespace and the tactics and strategy needed to maneuver in it successfully, and then to report and explain it clearly to curious readers. All praise to the Post for laying out so clear an introduction to the threats and complexities of the Internet-controlled future in which we will all spend the rest of our lives.

If you are aware of the threat of cybercrime and cybersabotage but don't really have a grasp of how these threats operate and where they originate, this informative short eBook is a good place to start. Recommended.
8 internautes sur 9 ont trouvé ce commentaire utile 
HASH(0x98b08558) étoiles sur 5 Informative 28 mars 2013
Par John L. Henderson - Publié sur
Format: Format Kindle Achat vérifié
Over the past 10ish years I read much of the information in this book but Zero Day tied it all together for me. Leaves me doubting that the USA has this anywhere near under control or even understood well enough to mitigate the danger.
5 internautes sur 5 ont trouvé ce commentaire utile 
HASH(0x98b0851c) étoiles sur 5 Excellent insight and very understandable 18 mars 2013
Par Robert S. - Publié sur
Format: Format Kindle
This is a very enlightening series of articles that delve into how, by being more connected in our day to day lives, we are increasingly vulnerable to hacking or worse. What is the scariest is that our vulnerabilities will not be reduced anytime soon.
4 internautes sur 4 ont trouvé ce commentaire utile 
HASH(0x98b08af8) étoiles sur 5 Great read 13 janvier 2014
Par Dr Wayne - Publié sur
Format: Format Kindle Achat vérifié
This book is a variety of stories concerning actual cyber security events. It makes a good foundation for the conversation of security but should be held as support for any cyber security or penetration testing training. The chapters all vary so it is easy to stay with the book once you get started.
2 internautes sur 2 ont trouvé ce commentaire utile 
HASH(0x98b088ac) étoiles sur 5 Easily accessible and well written 29 juillet 2013
Par Wayne A McCoy - Publié sur
Format: Format Kindle
Zero Day is a term that computer security people use to refer to a new vulnerability. Although companies can be alerted to the threats, sometimes it takes some coercion by hackers to get a company to fix a hole.

In this extended piece from Robert O'Harrow Jr. of the Washington Post, he shows the kind of targets that hackers are looking to exploit. Control systems that run municipal water, electrical and sewage system have been networked for years, but are now a vulnerable target. Recently, these were targeted by the Stuxnet virus, which was created by the US and Israel to target Iran's uranium centrifuges (and did so quite effectively). Other systems at risk include healthcare systems.

Tools hackers use include search engines that expose vulnerable systems, hacking kits, and social engineering. Social engineering attacks are quite effective, and they are becoming specifically targeted.

This is a quick read, and well reported. It's quite accessible to non-technical people who may find this true life story as scary as a movie plot. White hat hackers are shown as the true front line heroes in this new war.
Ces commentaires ont-ils été utiles ? Dites-le-nous