Login       My Wishlist
  My Cart
$0.00 / 0 items
 
Spring Brook Audio
The Best Audio Books on the Web
 
International Access
Global Shipping Options Available
  Our Catalog   Computers & Technology   Security & Encryption

Dark Territory: The Secret History of Cyber War


Dark Territory: The Secret History of Cyber War by Blackstone Audio, Inc. at Spring Brook Audio. Hurry! Limited time offer. Offer valid only while supplies last. As cyber attacks dominate front-page news, as hackers join the list of global threats, and as top generals warn of a coming cyber war, few books are


Product Description

As cyber attacks dominate front-page news, as hackers join the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War by Slate columnist and Pulitzer Prize-winning journalist Fred Kaplan.

Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the "information warfare" squads of the military services, and the national security debates in the White House to tell this never-before-told story of the officers, policymakers, scientists, and spies who devised this new form of warfare and who have been planning - and, more often than people know, fighting - these wars for decades.

From the 1991 Gulf War to conflicts in Haiti, Serbia, Syria, the former Soviet republics, Iraq, and Iran, where cyber warfare played a significant role, Dark Territory chronicles, in fascinating detail, an unknown past that shines an unsettling light on our future.

Additional Information

Manufacturer:Blackstone Audio, Inc.
Publisher:Blackstone Audio, Inc.
Studio:Blackstone Audio, Inc.

Dark Territory: The Secret History of Cyber War by Blackstone Audio, Inc.

Buy Now:
Dark Territory: The Secret History of Cyber War

Brand: Blackstone Audio, Inc.
4.2 out of 5 stars with 185 reviews
Condition: New
Lead Time: 1 - 2 Business Days
Availability: In Stock
$14.95


Quantity:  

 


View More In Security & Encryption.

 


Have questions about this item, or would like to inquire about a custom or bulk order?


If you have any questions about this product by Blackstone Audio, Inc., contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.

First Name:
Last Last:
Email Address:
Your Message:

Related Best Sellers


The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age
By Random House Audio
In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is t...

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
By Unknown
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran's nuclear efforts and shows how its existence has ushered in a new age of warfare - one in which a digital attack can have the same destructive capability as...

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
By Unknown
Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and countermeasures for citizens and consumers in the age of Big Brother and Big Data. Like it or not, your every move is being watched and analyzed. Consumers' identities are...

Networked Audiovisual Systems
By McGraw-Hill Education
ean: 9780071825733, isbn: 0071825738,
The industry-standard guide to networked audiovisual systems Published with InfoComm International, Networked AV Systems discusses the essential information AV and IT professionals need to know when working with network-driven equipment and processes...

Digital Television: A Practical Guide for Engineers (Signals and Communication Technology)
By Springer
ean: 9783540011552, isbn: 3540011552,
Digital Television closely examines all present-day TV transmission methods. These include MPEG, DVB, ATSC and ISDB-T. DVD is also discussed. The text covers these subjects in a practical-minded manner. Although mathematical formulations are used, th...

Digital and Document Examination (Advanced Forensic Science Series)
By Academic Press
ean: 9780128027172, isbn: 0128027177,
The Advanced Forensic Science Series grew out of the recommendations from the 2009 NAS Report: Strengthening Forensic Science: A Path Forward. This volume, Digital and Document Examination, will serve as a graduate level text for those studying and t...

Quantum Bits and Quantum Secrets: How Quantum Physics is revolutionizing Codes and Computers
By Brand: Wiley-VCH
mpn: Illustrations, ean: 9783527407101, isbn: 3527407103,
A concise, "no-frills" introduction to quantum computation and quantum cryptography for non-experts. Rather than concentrating on stories about scientists and philosophical concepts, it provides a step-by-step approach to quantum information. Startin...

Biometric Technologies and Verification Systems
By Brand: Butterworth-Heinemann
ean: 9780750679671, isbn: 0750679670,
Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication,...

Advances in Audio Watermarking Based on Singular Value Decomposition (SpringerBriefs in Speech Technology)
By Springer
mpn: 8 black & white illustrations, 18 colour, ean: 9783319147994, isbn: 3319147994,
This book introduces audio watermarking methods for copyright protection, which has drawn extensive attention for securing digital data from unauthorized copying. The book is divided into two parts. First, an audio watermarking method in discrete wav...

Information Hiding in Speech Signals for Secure Communication
By Syngress
ean: 9780128013281, isbn: 0128013281,
In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communica...



Privacy Policy / Terms of Service
© 2019 - springbrookaudio.com. All Rights Reserved.