Stuxnet to Sunburst,Used

Stuxnet to Sunburst,Used

In Stock
SKU: SONG1032068507
UPC: 0
Brand: Ergodebooks
Regular price$59.70
Quantity
Add to wishlist
Add to compare

Processing time: 1-3 days

US Orders Ships in: 3-5 days

International Orders Ships in: 8-12 days

Return Policy: 15-days return on defective items

Payment Option
Payment Methods

Help

If you have any questions, you are always welcome to contact us. We'll get back to you as soon as possible, withing 24 hours on weekdays.

Customer service

All questions about your order, return and delivery must be sent to our customer service team by e-mail at yourstore@yourdomain.com

Sale & Press

If you are interested in selling our products, need more information about our brand or wish to make a collaboration, please contact us at press@yourdomain.com

Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.S., to build the capability of digital eavesdropping and industrial espionage. With tens of trillions of dollars moving throughout hundreds of thousands of staff, and many contractors draining the country of intelligence and technical capability, the quest was simple and the outcome horrifying. No one in the world has connected the dots, until now.From digital eavesdropping and manipulation of the agencies to Stuxnet, this book covers how the worlds first use of digital code and digital certificates for offensive purposes against the Iranians and their nuclear power facilities, caused collateral damage. Proceeding to todays SolarWinds attack, codenamed Sunburst, the same methods of exploitation and manipulation originally used by the agencies are now being used against companies and governments with devastating effects. The SolarWinds breach has caused knockon breaches to thousands of client companies including the U.S. government and is estimated to cost more than one trillion dollars. The monster has truly been turned against its creator and due to the lack of security and defence, breaches are occurring daily at an alarming rate. The U.S. and UK governments have little to no answer. The book also contains a chapter on breaches within the COVID19 sector from research to immunisation and the devastating December 2020 breach of SolarWinds.

⚠️ WARNING (California Proposition 65):

This product may contain chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm.

For more information, please visit www.P65Warnings.ca.gov.

  • Q: How many pages does the book 'Stuxnet to Sunburst' have? A: The book has one hundred ninety-eight pages. It is a paperback edition published by CRC Press.
  • Q: What are the dimensions of 'Stuxnet to Sunburst'? A: The book measures nine point two one inches in length, six point one four inches in width, and nine point two one inches in height.
  • Q: Who is the author of 'Stuxnet to Sunburst'? A: The author is Andrew Jenkinson. He explores themes of digital exploitation and cyber warfare in the book.
  • Q: What is the main theme of 'Stuxnet to Sunburst'? A: The main theme is the evolution of digital exploitation and cyber warfare over the past twenty years. It discusses significant events from the September eleventh attacks to modern cyber incidents.
  • Q: Is 'Stuxnet to Sunburst' suitable for beginners in cybersecurity? A: Yes, it is suitable for beginners. The book provides a comprehensive overview of digital warfare and is accessible to readers new to the topic.
  • Q: Can I read 'Stuxnet to Sunburst' if I have no background in technology? A: Yes, you can read it without a technical background. The book is written in a way that explains complex topics in an understandable manner.
  • Q: How do I read 'Stuxnet to Sunburst' effectively? A: To read effectively, take notes on key events and concepts. Consider discussing the themes with others interested in cybersecurity for a deeper understanding.
  • Q: Is there a specific audience for 'Stuxnet to Sunburst'? A: Yes, it targets readers interested in cybersecurity, digital espionage, and historical events in technology. It is also suitable for professionals in the field.
  • Q: How should I store 'Stuxnet to Sunburst' to keep it in good condition? A: Store the book in a cool, dry place away from direct sunlight. Keeping it on a bookshelf helps prevent damage.
  • Q: What should I do if 'Stuxnet to Sunburst' arrives damaged? A: If it arrives damaged, contact the seller for a return or exchange. Most sellers have a return policy for damaged products.
  • Q: Is there a warranty for 'Stuxnet to Sunburst'? A: No, books typically do not come with a warranty. However, you should check the return policy when purchasing.
  • Q: What if I want to discuss the book 'Stuxnet to Sunburst' with others? A: You can join online forums or book clubs focused on cybersecurity. Engaging with others can enhance your understanding of the book's themes.
  • Q: Are there any safety concerns regarding the content in 'Stuxnet to Sunburst'? A: No specific safety concerns are noted. The book discusses historical events and analyses cybersecurity incidents.
  • Q: How does 'Stuxnet to Sunburst' compare to other cybersecurity books? A: It provides a unique perspective over two decades of cyber warfare, unlike many books that focus on a single incident or aspect of cybersecurity.
  • Q: Can I use 'Stuxnet to Sunburst' for academic research? A: Yes, it can be used for academic research. The book contains valuable insights and references relevant to cybersecurity studies.

Recently Viewed