Author Dan Verton seems to have the credentials to write a book about In chapter 1, he presents a fictional scenario, Dark Winter, which involves a carefully. Letter The polemic surrounding Thomas C. Greene’s recent review of Dan Verton’s Black Ice: The Invisible Threat of Cyber-Terrorism continues. Get Instant Access to Black Ice The Invisible Threat Of Cyber Terrorism By Dan Verton. #c2a89e EBOOK EPUB KINDLE PDF. Read Download.

Author: Shaktilrajas Vukree
Country: Saint Lucia
Language: English (Spanish)
Genre: Love
Published (Last): 4 December 2009
Pages: 309
PDF File Size: 20.36 Mb
ePub File Size: 13.22 Mb
ISBN: 666-1-70953-253-7
Downloads: 75898
Price: Free* [*Free Regsitration Required]
Uploader: Gum

Attacking major name ixe, as Verton suggests, certainly would cause short-term problems, but not the type of long-term damage he claims. Skip to main content.

Security: Black Ice : The Invisible Threat of Cyberterrorism by Dan Verton (2003, Hardcover)

Department of Homeland Security. Top Reviews Most recent Top Reviews. Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. He points out how the US government would be overwhelmed by the attack, unable to react quickly enough to stave off its massive effects.

There’s a problem loading this menu right now.

Hackers have gotten smarter and more creative and are using more powerful computer and IT tools to blqck into systems. His areas of infosec expertise include intrusion detection, UNIX security, forensics, honeypots, etc.

Cyber-Terrorism’s Hidden Dangers 3: AmazonGlobal Vertn Orders Internationally. The “shock” value of this material is high, but he took no shortcuts in making his case.


Learn more about Amazon Giveaway. Stopping the Next Attack 9: You may also like. The Pentagon would be worry about procurement problems, and paying outrageous sums for toilet seats yet again. The Invisible Threat of Cyber-Terrorism. Written by dwn U. The item may be missing the original packaging such as the original box or bag or tags or in the original packaging but not sealed.

This fascinating book seeks to answer the above question by collecting and evaluating many stories during author’s “6 year research” trying to piece the puzzle together. I would highly recommend this book for reading – regardless of the date – because it’s just a relevant now as 13 years ago!

This is an issue that will be ignored by policy makers and the general public until an attack makes people pay attention to the realities of a computer controlled civilization.

Popularity Popularity Featured Price: Amazon Inspire Digital Educational Resources. He suggests that power outages would “last for weeks, in some areas, for months”. Internet security expert Dan Verton investigates how cyber-terrorism could occur, what the global and financial implications are, the impact this is having and will continue to have on privacy and civil liberties, and how to prepare and prevent against cyber-terrorism.

Try the Kindle edition and experience these great reading features: But the eight infrastructure targets listed in this book is essentially a master plan for cyber terrorists to plan their attack. In chapter 1, he presents a fictional scenario, Dark Winter, which involves a carefully planned terrorist attack with debilitating repercussions.

As I read the material that Dan Verton has compiled here, I’m frightened. While other reviewers blast the writing style and hypothetical situations in the book it seems they have missed the point. Read more Read less. Dan is a former intelligence officer in the U. A journalist with Computerworld magazine, a former intelligence officer in the Marines, and a writer who has traveled around the world, he should be able to put the threat of cyber-terrorism into its proper perspective. In his spare time, he maintains his security portal info-secure.


Only 2 left in stock – order soon.

Review of Black Ice

Or simply because this kind of hype sells books? Another subject covered extensively in the book is whether al-Qaeda is really going in the direction of cyberterror. The Secret History of Cyber War. Help us improve our Author Pages by updating your bibliography and submitting a new or current image and biography. The item may be a factory second or a new, unused item with defects or irregularities. Best Selling in Textbooks, Education See all.

English Choose a language for shopping.

Similar authors to follow

Dan Simmons Hardcover Signed Books. Confessioni di giovani hacker. Available to ship in days. A great book with insightful information. That blaxk, banks, government offices, industrial plants, and manufacturing firms [would be] also starved of connectivity.