What Everyone Needs to Know^DRG
De som köpt den här boken har ofta också köpt Elon Musk av Walter Isaacson (inbunden).
Köp båda 2 för 451 krChildren at War is the first comprehensive book to examine the growing and global use of children as soldiers. P.W. Singer, an internationally recognized expert in twenty-first-century warfare, explores how a new strategy of war, utilized by armie...
Eric Schmidt, Executive Chairman, Google In our digital age, the issues of cybersecurity are no longer just for the technology crowd; they matter to us all. Whether you work in business or politics, the military or the media -- or are simply an ordinary citizen -- this is an essential read.
Admiral James Stavridis, U.S. Navy (Ret), former Supreme Allied Commander at NATO This is the most approachable and readable book ever written on the cyber world. The authors have distilled the key facts and policy, provided sensible recommendations, and opened the debate generally to any informed citizen: a singular achievement. A must read for practitioners and scholars alike.
Walter Isaacson, author of Steve Jobs In confronting the cybersecurity problem, it's important for all of us to become knowledgeable and involved. This book makes that possible -- and also fascinating. It's everything you need to know about cybersecurity, wonderfully presented in a clear and smart way.
Anne-Marie Slaughter, President, the New America Foundation If you read only one book about 'all this cyberstuff,' make it this one. Singer and Friedman know how to make even the most complicated material accessible and even entertaining, while at the same time making a powerful case for why all of us need to know more and think harder about the (cyber)world we know live in.
Vint Cerf, "Father of the Internet," Presidential Medal of Freedom winner Singer and Friedman do a highly credible job of documenting the present and likely future risky state of cyber-affairs. This is a clarion call.
Howard Gordon, Executive Producer of 24 and co-creator of Homeland I loved this book. Wow. Until I read this astonishing and important book, I didn't know how much I didn't know about the hidden world of cybersecurity and cyberwar. Singer and Friedman make comprehensible an impossibly complex subject, and expose the frightening truth of just how vulnerable we are. Understanding these often-invisible threats to our personal and national security is a necessary first step toward defending ourselves against them. This is an essential read.
Jonathan Zittrain, Professor of Law and Computer Science at Harvard University, author of The Future of the Internet - And How to Stop It Singer and Friedman blend a wonderfully easy to follow FAQ format with engaging prose, weaving explanations of the elements of cybersecurity with revealing anecdotes. From the fundamentals of Internet architecture to the topical intrigue of recent security leaks, this book provides an accessible and enjoyable analysis of the current cybersecurity landscape and what it could look like in the future.
Politico Cybersecurity and Cyberwar: What Everyone Needs To Know aims to demystify "cyber stuff" and arm readers - from the everyday Internet user to the policymaker - with the necessary tools to better understand cybersecurity and the threats that face it ... Essential reading for anyone inte...
<br>Peter W. Singer is a Senior Fellow and the Director of the 21st Century Defense Initiative at the Brookings Institution.<br>Allan Friedman is a Fellow in Governance Studies and Research Director of the Center for Technology Innovation at the Brookings Institution.<br>
1. WHY CYBERSPACE IS WONDERFULEL AND COMPLICATED; WHAT IS CYBERSPACE?; WHY DO PEOPLE TALK ABOUT THE DIFFERENCE OF A NETWORKED WORLD?; HOW DOES THE INTERNET ACTUALLY WORK?; WHO OWNS THIS THING?; WAITEL YOU MEAN NO ONE RUNS THE INTERNET?; WHAT CAN GOVERNMENTS DO ONLINE? WHAT ARE THE LIMITS OF STATE POWER?; JUST HOW DEPENDENT ARE WE ON CYBERSPACE?; 2. SECURITY AND INSECURITY ONLINE; WHAT DO WE MEAN BY A <"SECURE>" SYSTEM?; WHAT IS THE DIFFERENCE BETWEEN AN ATTACK ON A NETWORK AND AN ATTACK ON A SYSTEM?; HOW DOES ANTI-VIRUS SOFTWARE WORK?; HOW DO YOU DEFEND A NETWORK?; WHY IS ANONYMITY A PROBLEM ONLINE? WHY IS IT RELATIVELY EASY TO ACT WITHOUT ACCOUNTABILITY?; HOW CAN YOU AUTHENTICATE SOME ONE TO BE SURE THEY ARE WHO THEY SAY THEY ARE?; HOW DO WE KEEP DATA SECURE IN CYBERSPACE?; 3. THREATS AND BAD ACTORS; O DIFFERENTIATING THREATS; O VALUE AT RISK; WHAT ARE THE BAD GUYS AFTER? WHAT CAN YOU REALLY DO WITH A COMPUTER?; WHAT'S THE WORST YOU CAN DO? CAN A HACKER REALLY TURN OFF THE POWER GRID?; O DIFFERENT MOTIVATIONS OF ATTACKERS; O DIFFERENT TYPES OF ATTACKS; O WHAT IS CYBER TERRORISM, ACTUALLY?; WHAT DOES "CYBERWARFARE" MEAN?; HOW ARE COUNTRIES MILITARIZING CYBERSPACE? WHY?; SO IF WE JUST BUILT BETTER SYSTEMS, COULD WE HAVE A SECURE INTERNET?; 4. CASE STUDIES / EXAMPLES OF ATTACKS; O AURORA / GOOGLE {PHISHING, ATTRIBUTION}; O STUXNET {CRITICAL INFRASTRUCTURE, INTELLIGENCE}; O WIKILEAKS DATA BREACH & FALLOUT {DATA PROTECTION, DOS}; O ISRAEL-SYRIA AIR DEFENSE {CYBER-KINETIC CROSSOVER, CYBERWAR}; -; 5. WHY SECURING CYBERSPACE IS HARD; WHAT ARE SOME MECHANISMS THAT ENABLE US TO TRUST SYSTEMS OR DATA?; WHAT IS THE DIFFERENCE BETWEEN ESPIONAGE AND EXPLOITATION?; WHY NOT JUST WRITE BETTER SOFTWARE?; WHY CAN'T NETWORK OPERATORS DETECT BAD BEHAVIOR?; WHY SECURITY THROUGH OBSCURITY DOESN'T WORK; HOW DO WE KNOW WHAT HAS HAPPENED AFTER A CYBER INCIDENT?; HOW DOES THE RISE IN <"CLOUD COMPUTING>" CHANGE THE DYNAMICS OF CYBER SECURITY?; WHAT MAKES MOBILE COMPUTING DIFFERENT?; IF EVERYONE'S SYSTEMS ARE VULNERABLE, CAN'T DEFENDERS JUST INTERRUPT THE ATTACKER'S SYSTEMS?; WHY IS IT SO HARD TO KNOW WHO THE ATTACKERS ARE?; WHY DOES ATTRIBUTION MATTER?; HOW DO WE MEASURE A CYBER RISK?; WHY AREN'T USERS ABLE TO PROTECT THEMSELVES?; DON'T VENDORS AND SERVICE PROVIDERS HAVE ENOUGH INCENTIVES TO PROVIDE GOOD SECURITY?; WHY AREN'T COMPANIES INVESTING ENOUGH TO PROTECT THEMSELVES?; 6. INTERNATIONAL DIMENSIONS; WHAT CHANGES WHEN CYBER PROBLEMS CROSS INTERNATIONAL BORDERS?; HOW DO COUNTRIES DIFFER IN THEIR APPROACH TO CYBERSPACE?; WHO HAS THE BIGGEST CYBER ARMIES?; WHAT CONSTITUTES AN ACT OF WAR?; HOW DOES LAW ENFORCEMENT DEAL WITH INTERNATIONAL BOUNDARIES?; WHAT ARE EXISTING INTERNATIONAL ORGANIZATIONS CURRENTLY DOING?; WHAT INTERNATIONAL TREATIES ARE IN PLACE?; WHY DON'T THE CLASSIC MODELS OF MILITARY DETERRENCE WORK FOR CYBERSPACE?; WHAT ARE THE OBSTACLES TO INTERNATIONAL COOPERATION TO RESOLVE CYBERSECURITY ISSUES?; 7.THE PATH FORWARD TO A MORE SECURE CYBERSPACE; IT SOUNDS LIKE EVERY ASPECT OF MODERN LIFE IS VULNERABLE. ARE THINGS REALLY THAT BAD?; WHY CAN'T WE JUST RE-BUILT THE TECHNOLOGY TO PREVENT BAD BEHAVIOR?; CAN WE IMPOSE ACCOUNTABILITY THROUGH NATIONAL CONTROL OF CYBERSPACE?; HOW CAN PRIVATE FIRMS BE INCENTIVIZED TO INTERNALIZE THEIR RISK?; IF A COMPANY OR GOVERNMENT AGENCY WAS WILLING TO INVEST IN CYBER SECURITY DEFENSES, WHAT WOULD STAND IN THEIR WAY?; CAN INTERNET SERVICE PROVIDERS DO MORE TO IDENTITY AND STOP BAD BEHAVIOR?; HOW CAN WE MAKE IT HARDER FOR BAD ACTORS TO PROFIT FROM SUCCESSFUL ATTACKS; WHAT CAN I DO TO PROTECT MYSELF?