Author Dan Verton seems to have the credentials to write a book about In chapter 1, he presents a fictional scenario, Dark Winter, which involves a carefully. Letter The polemic surrounding Thomas C. Greene’s recent review of Dan Verton’s Black Ice: The Invisible Threat of Cyber-Terrorism continues. Get Instant Access to Black Ice The Invisible Threat Of Cyber Terrorism By Dan Verton. #c2a89e EBOOK EPUB KINDLE PDF. Read Download.
|Published (Last):||27 July 2006|
|PDF File Size:||1.52 Mb|
|ePub File Size:||5.23 Mb|
|Price:||Free* [*Free Regsitration Required]|
He suggests that power outages would “last for weeks, in some areas, for months”. Popularity Popularity Featured Price: He points out how the US government would be overwhelmed by the attack, unable to react quickly enough to stave off its massive effects.
ComiXology Thousands of Digital Comics. PDD at a Glance C: The War on Terror: Set up a giveaway. English Choose a language for shopping. Would you like to tell us about a lower price?
Review of Black Ice
Cyber-Terrorism in the real world and dynamic scenario possibilities. While other reviewers blast the writing style and hypothetical situations in the book it seems they have missed the point. I promise you will be inspired to improve those plans. Learn more about Amazon Prime. The Internet as Weapon 4: It is not if a devastating cyber attack will occur, it is when.
Mar 23, 3: Only 2 left blackk stock – order soon.
MP3 audio – Standard Price: Dan Simmons Hardcover Signed Books. Amazon Drive Cloud storage from Amazon. High to Low Avg.
Best Selling in Textbooks, Education See all. Amazon Second Chance Pass it on, lback it in, give it a second life. Write a customer review. Will include dust jacket if it originally came with one.
There was an error processing your purchase. Thus “such and such ex-government guy said cyberterrorism is real” subtly mutates into “cyberterrorism is real! Verton is one of these people who couldn’t live for verron hour without his computer, and doesn’t seem to envisage such a solution.
Follow the Author
The first book to define the clear and present danger posed by a cyber-terrorist attack on the U. Don’t have a Blacj If I had a criticism of the book it would be the ending, it is a bit too much gloom and doom. Attacking major name servers, as Verton suggests, certainly would cause short-term problems, but not the type of long-term damage he claims.
East Dane Designer Men’s Fashion. Shopbop Designer Fashion Brands. At times, it feels that the author seeks to replace proving things by quoting many potentially unreliable sources talking about the thing.
December 10, Defense Perspective of Cybersecurity Deputy Secretary Gordon England talked about the cybersecurity concerns of the Department of Defense at a conference on…. Amazon Music Stream millions of songs. The examples Verton unearths are certainly spooky Are you an author?
Only 1 left veerton stock more on the way. One person found this helpful. A more balanced approach, with a blac realistic analysis of the real repercussions of such attacks, would be infinitely more useful.
Venton discusses the devastating effects of computer viruses and worms, using the Nimda worm as an example. I have read this book and the reviews on Amazon. He has written this book in such a way that it is relevant to the masses as well as the security experts. Some things such as the “doomsday” scenario from chapter 1 and “al-Qaeda certified hackers” are “lighter” than others, but all are well-written and fun to read.
Help us improve our Author Pages by updating your bibliography and submitting a new or current image and biography. Showing of 12 reviews.
Please try again later. The item may be missing the original packaging such as the original box or bag or tags or in the original packaging but not sealed.