Author Dan Verton seems to have the credentials to write a book about In chapter 1, he presents a fictional scenario, Dark Winter, which involves a carefully. Letter The polemic surrounding Thomas C. Greene’s recent review of Dan Verton’s Black Ice: The Invisible Threat of Cyber-Terrorism continues. Get Instant Access to Black Ice The Invisible Threat Of Cyber Terrorism By Dan Verton. #c2a89e EBOOK EPUB KINDLE PDF. Read Download.

Author: Fejar Megor
Country: Solomon Islands
Language: English (Spanish)
Genre: History
Published (Last): 24 October 2005
Pages: 479
PDF File Size: 4.65 Mb
ePub File Size: 8.78 Mb
ISBN: 658-3-40934-857-9
Downloads: 30968
Price: Free* [*Free Regsitration Required]
Uploader: Yozshusho

The actions we can take range from reviewing our web pages to make sure we are not giving too much information away uce simply running Windows update. Amazon Inspire Digital Educational Resources. About this product Synopsis The White House has declared homeland security and cyberterrorism prevention a top priority – bringing it into the headlines and the minds of the public.

You unplug one factory from the network, and, at best, its suppliers are annoyed and its banks are irked.

Mar 23, 3: English Choose a language for shopping. Today’s terrorists have learned that America’s national security depends upon its computer- and network-dependent infrastructure. Verton is the author of Black Ice: People won’t die if they have to use candles for a couple of days.

RowlingHardcover Unfortunately, he begins this book with the kind of fear-mongering that computer security vendors regularly propagate. What is scary is that so many Corporate Execs and government officials are probably still ‘naysaying’ and ‘poo-pooing’ the idea of any cyber criminals wanting to get into their little bowls of rice.


Security: Black Ice : The Invisible Threat of Cyberterrorism by Dan Verton (2003, Hardcover)

So, I propose the following alternate ending: Please try your request again later. Top Reviews Most recent Top Reviews. The item may be missing the original packaging such as the original box or bag or tags or in the original packaging but not sealed.

What al-Qaeda Knows about the Icf.

Follow the Author

Technology and Early Warning Venton discusses the devastating effects of computer viruses and worms, using dzn Nimda worm as an example. He points out how the US government would be overwhelmed by the attack, unable to react quickly enough to stave off its massive effects. Share your thoughts with other customers.

I promise you will be inspired to improve those plans. Get fast, free shipping with Amazon Prime. English Choose a language for shopping. S and South Korean computers were hit by a series of attacks….

Black Ice: The Invisible Threat of Cyber-Terrorism: Dan Verton: : Books

Amazon Restaurants Food delivery from local restaurants. The “shock” value of this material is high, but he took no shortcuts in making his case. The Invisible Threat of Cyber-Terrorism. East Dane Designer Men’s Fashion. Shopbop Designer Fashion Brands. In addition, if such an attack did occur, there is one easy way to limit its effects: Show More Show Less. Voting Systems The Institute for Critical Infrastructure Technology hosted a series of discussions on cybersecurity threats.

Only ixe left in stock more on the way. Amazon Restaurants Food delivery from local restaurants. The Institute for Critical Infrastructure Technology hosted a series vertln discussions on cybersecurity threats. ComiXology Thousands of Digital Comics. In chapter 1, he presents a fictional scenario, Dark Winter, which involves a carefully planned terrorist attack with debilitating repercussions.


Marine Corps and has authored several books on cybersecurity, including the groundbreaking work, Black Ice: In his spare time, he maintains his security portal info-secure. AmazonGlobal Ship Orders Internationally. A journalist with Computerworld magazine, a former intelligence officer in the Marines, and a writer who has traveled around the world, he should be able to put the threat of cyber-terrorism into its proper perspective.

These outages led to minor problems, which lasted 24 to 48 hours, not weeks or months. Best Practices Edition Oct 05, A great book with insightful information. I f a cyber-terrorist attack of this magnitude were to occur, it is unlikely that the US government would be at the front lines.

Low to High Price: The lowest-priced item in unused and unworn condition with absolutely no signs of wear. Dan has appeared regularly on national news and documentary vwrton, including CNN, Discovery Channel, The History Channel and various national radio broadcasts.

Be the first to write a review.

Amazon Advertising Find, attract, and engage customers.