Author Dan Verton seems to have the credentials to write a book about In chapter 1, he presents a fictional scenario, Dark Winter, which involves a carefully. Letter The polemic surrounding Thomas C. Greene’s recent review of Dan Verton’s Black Ice: The Invisible Threat of Cyber-Terrorism continues. Get Instant Access to Black Ice The Invisible Threat Of Cyber Terrorism By Dan Verton. #c2a89e EBOOK EPUB KINDLE PDF. Read Download.

Author: Taujar Shakataxe
Country: Chile
Language: English (Spanish)
Genre: Marketing
Published (Last): 18 May 2018
Pages: 492
PDF File Size: 18.1 Mb
ePub File Size: 12.48 Mb
ISBN: 522-9-15100-970-9
Downloads: 7428
Price: Free* [*Free Regsitration Required]
Uploader: Shaktijas

Hackers have gotten smarter and more creative and are using more powerful computer and IT tools to hack into systems. He points out how the US government would be overwhelmed by the attack, unable to react quickly enough to stave off its massive effects.

This item ic belong on this page. Another subject covered extensively in the book is whether al-Qaeda is really going in the direction of cyberterror. Page 1 of 1 Start over Page 1 of 1.

What is scary is that so many Corporate Execs and government officials are probably still ‘naysaying’ and ‘poo-pooing’ the idea of any cyber criminals wanting to get into their little bowls of rice.

Or simply because this kind of hype sells books? Cyber-terrorism is a real threat, but this book takes too spectacular an approach; could this be in part to incite readers to purchase other books, such as the Hacking Exposed series, sold by the same publisher and featured in a full-page advertisement at the end of the book?

Only 2 left in stock – order soon. I have read this book and the reviews on Amazon. October 20, Cybersecurity and U. Dan Verton is a veteran technology journalist with 20 years of experience covering the federal government. Trusting such security to private companies – which goes along with the current administration’s desire for less government – can be risky, since “the free market is driven by the bottom line, not security.


The item may be a factory second or a new, unused item with defects or irregularities.

No ratings or reviews yet. You may also like. Text will be unmarked and pages crisp.

Follow the Author

Department of Homeland Security. High to Low Avg. The first thing to do to improve overall security is to address the ubiquity and inherent danger of entrusting so many essential systems to such a shoddy and insecure operating system.

Available for download now. Verton talked about cyber-terrorism, which he defined as the intentional use of computer systems for targeting banking,… read more.

His areas of infosec expertise include intrusion detection, UNIX security, forensics, honeypots, etc. The “shock” value of this material is high, but he took no shortcuts in making his case. Learn more about Amazon Prime. Get to Know Us. Learn more about Amazon Prime.

Explore the Home Gift Guide. In Search of Bin Laden’s Hackers 6: People won’t die if vlack have to use candles for a couple of days.

Black ice :the invisible threat of cyber-terrorism /Dan Verton. – National Library

Each of us has the ability and the responsibility to make our environment a bit more resistant to attack. Sure, turning off the world for a week would be costly, but much less so than suffering the damage any cyber-attack would inflict. Verton is one of these people who couldn’t live for an hour without his computer, and doesn’t seem to envisage such a solution.


Author Dan Verton seems to have the credentials to write a book about cyber-terrorism.

Review of Black Ice

It’s hard to believe that society would become Planet of the Apes if people couldn’t use their cell phones or ATMs for a week. The lowest-priced item in gerton and unworn condition with absolutely no signs of wear. Dan Simmons Hardcover Signed Books. Read more Read less. Satisfaction is guaranteed with every order. The first book to define the clear and present danger posed by a cyber-terrorist attack on the U.

PDD at a Glance C: He argued that, although no major cyber-terrorism attacks had yet occurred, the vulnerability of critical systems had been proven and the U. As for the conclusion, one of the main points I realized after reading the book is that everything is modern society is so a interdependent and b dependent upon computers that a push applied in ic certain place from within the “cyber-world” does stand a chance of wrecking something in a “real world”.

Amazon Drive Cloud storage from Amazon. Show More Show Less. English Choose a language for shopping.

Undoubtfully, the book is written by a journalist, thus it sometimes feels sensationalistic, “newspaperish” and fluffy. Remarks on Cyber-Terrorism D: