Kindle Price: $5.99

Save $0.60 (9%)

You've subscribed to ! We will preorder your items within 24 hours of when they become available. When new books are released, we'll charge your default payment method for the lowest price available during the pre-order period.
Update your device or payment method, cancel individual pre-orders or your subscription at
Your Memberships & Subscriptions
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the authors

Something went wrong. Please try your request again later.

Cybersecurity and Cyberwar: What Everyone Needs to Know® 1st Edition, Kindle Edition


A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money off of them; lawyers and ethicists building new frameworks for right and wrong. Most of all, cybersecurity issues affect us as individuals. We face new questions in everything from our rights and responsibilities as citizens of both the online and real world to simply how to protect ourselves and our families from a new type of danger. And yet, there is perhaps no issue that has grown so important, so quickly, and that touches so many, that remains so poorly understood.

In
Cybersecurity and CyberWar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyber expert Allan Friedman team up to provide the kind of easy-to-read, yet deeply informative resource book that has been missing on this crucial issue of 21st century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters, and what can we do? Along the way, they take readers on a tour of the important (and entertaining) issues and characters of cybersecurity, from the "Anonymous" hacker group and the Stuxnet computer virus to the new cyber units of the Chinese and U.S. militaries. Cybersecurity and CyberWar: What Everyone Needs to Know® is the definitive account on the subject for us all, which comes not a moment too soon.

What Everyone Needs to Know® is a registered trademark of Oxford University Press.

Customer reviews

4.4 out of 5 stars
720 global ratings

Customers say

Customers find the book very informative, with an excellent overview of cybersecurity, cyber threats, and current trends. They also describe the writing quality as good and a good read for basic level cyber security material. Readers appreciate that the book is written in the most simplistic terms possible for such a subject.

AI-generated from the text of customer reviews

73 customers mention "Content"73 positive0 negative

Customers find the book very informative, with excellent examples. They also appreciate the useful overview of cybersecurity, laying out many ideas on individual responsibilities. Readers describe the work as high-level intelligence, enlivened by anecdotes and stories. They mention that the book is not technical or computer focused.

"...This book clearly educates the reader about cybersecurity issues, and then expands upon this discussion to enable the reader to conceptualize the..." Read more

"...The book rips along at a good pace, enlivened by many anecdotes and stories and interesting asides without ever straying too far from their main..." Read more

"...cyber security and cyber war issues should find this book an informative read...." Read more

"...As all three books are very well written and researched, personal preference and your particular area of interest will likely be the largest factor..." Read more

58 customers mention "Writing quality"52 positive6 negative

Customers find the writing quality of the book good, brilliant, and fair. They also say it's well worth the time and money.

"...Short History of the Internet, which is a clear and concise and enjoyable read by itself...." Read more

"...Throughout the book, the authors craft their responses in an enjoyable and easy to understand writing style...." Read more

"...Still, if you are interested in this topic, this is probably the fairest and most exhaustive book out there that is most accessible to the public." Read more

"...writer, and I don't like lengthy reviews, yet I will say that the content is great, just the context doesn't work for me...." Read more

47 customers mention "Complexity level"39 positive8 negative

Customers find the book written in the most simplistic terms possible, clear, concise, and enjoyable. They also say it provides some of the best and most comprehensive descriptions of cybersecurity concepts and cyber.

"...example of this is their Short History of the Internet, which is a clear and concise and enjoyable read by itself...." Read more

"...Singer and Friedmann are very patient and thorough at explaining terms and concepts as they introduce them, so I never felt condescended to, or left..." Read more

"...the authors craft their responses in an enjoyable and easy to understand writing style...." Read more

"...In that way it is also a very accessible book for people as you don't need to read the whole book, but rather find the topic(s) you don't quite..." Read more

Top reviews from the United States

Reviewed in the United States on June 10, 2014
Dr. Singer's books are always engaging, and this book, co-authored Allan Friedman, continues that tradition.

This book is written to be consumed by any thoughtful reader -- it is not a deep dive in UNIX system administration challenges, it not full of computer acronyms, it does not require an advanced degree in computer science.

This book clearly educates the reader about cybersecurity issues, and then expands upon this discussion to enable the reader to conceptualize the challenges of the subject. A good example of this is their Short History of the Internet, which is a clear and concise and enjoyable read by itself. This history includes, in layman's terms, evolution, funding agencies, control entities, architecture, Al Gore, governance, cryptographic keys, and more. With this foundation the authors then expand into many cybersecurity challenges, like WikiLeaks and a variety of security threats.

I particularly liked the discussions on attribution, cybercrimes, and cyber terrorism -- these are not simple issues, and the authors articulate some of the complexities of attribution that make cybersecurity so difficult.

The authors wrap up the book by defining the Five Key Trends that Affect the Future of Cybersecurity – Cloud Computing, Big Data, Mobile, Cyberspace Demographics, and Internet-of-Things (IoT). These trends all increase the problem space of cybersecurity, and the authors define how these trends will drive an even higher demand for security in our future systems.

With this history, description of threats, frameworks, and trends, the authors truly accomplish their goal of delivering a primer of what one needs to know about cybersecurity and cyberwar.
19 people found this helpful
Report
Reviewed in the United States on October 14, 2014
There were two types of book I was trying to avoid when looking for a book on cybersecurity: an overly technical IT-based approach that would lose me after the introduction and so leave me lost and bewildered; or, equally unhelpfully, a book so worthy but dull that it taught me nothing of value and left me none the wiser about the significance and importance of the subject.

What Singer and Friedmann have managed to do with great style is to write a book that steers a middle way between these two possible pitfalls.

The book rips along at a good pace, enlivened by many anecdotes and stories and interesting asides without ever straying too far from their main theme. For example, I had no idea that the days of the dominance of the Internet by cute cat videos may be nearing its end as, "Google researchers have noticed an explosion of cute goat and cute Panda bear videos that have risen in parallel with the greater number of users coming online in sub-Saharan Africa and China."

On the face of it this is merely a whimsical aside but the authors have a serious point to make that up until now the Internet has been dominated by Western, principally US-based, users. This dominance is changing quickly, and the demographic of Internet users will change everything about the way cyberspace works, and particularly it will have huge implications for cybersecurity.

Singer and Friedmann are very patient and thorough at explaining terms and concepts as they introduce them, so I never felt condescended to, or left behind in a welter of jargon. Given the amount of specialist vocabulary this was a notable achievement.

I did find Part III: What Can We Do? to be hard going. The approaches and discussions are very relevant and entirely to the point, but that doesn't make the material easy to assimilate.

The authors managed to make a potentially dull subject accessible and interesting. They also managed to provide a calm and lucid commentary on a subject that is all too often filled with hyperbole and a deliberate over-inflation of fears and threats. I felt at the end of the book that I was much better informed and, I hope, a little wiser about cybersecurity than I was at the start.
7 people found this helpful
Report
Reviewed in the United States on May 31, 2014
Anyone interested in seriously large-scale cyber security and cyber war issues should find this book an informative read. Through a series of provocative questions and answers, the authors cover a wide range of topics from defining cyberspace, cyber security, how terrorists use the web, cyber counter terrorism, to the final discussions of where cyber security is headed next. Throughout the book, the authors craft their responses in an enjoyable and easy to understand writing style. They say the book is not just written for experts, but of course as you would expect from the title, there are tons of highly specialized technical terms used throughout the book. So in my opinion, the "non-expert" reader should at least possess some level of expertise beyond that of an armchair novice. That is, if you expect to fully understand the material. Both authors have a high level of professional involvement and sophisticated understanding of national and international cyber security and cyber war. After all, one is the Director of the Center for 21st Century Security and Intelligence at the Brookings Institute and the other is Research Director of the Center for Technology Innovation at the Brookings Institute. I have no problem with giving this book a five star rating.

Top reviews from other countries

Fernando Robledo
4.0 out of 5 stars HARD TO READ
Reviewed in Spain on July 1, 2022
HARD TO READ
Cedric Hernández
5.0 out of 5 stars Buen producto, en tiempo récord.
Reviewed in Mexico on June 16, 2019
Es un gran producto, llegó en perfectas condiciones en un tiempo récord.

Sin duda es lo que esperaba.
Customer image
Cedric Hernández
5.0 out of 5 stars Buen producto, en tiempo récord.
Reviewed in Mexico on June 16, 2019
Es un gran producto, llegó en perfectas condiciones en un tiempo récord.

Sin duda es lo que esperaba.
Images in this review
Customer image Customer image
Customer imageCustomer image
Andrew and his Cats
5.0 out of 5 stars Fantastic Insight - a real gem of a book.
Reviewed in the United Kingdom on July 17, 2017
Fantastic insight into the Cybersecurity and Cyberwar. I think the authors whilst highly respected have clearly edged back a bit after the Part I or one third of the book. As a subject matter expert i would struggle on the second and third parts - as its a trickly topic [educating the mitigations and techniques to nail those doing this is not a bright idea]. If you are a in business, concerned or a guru that aspires to become an ethical hacker this is a real gem of a book.
One person found this helpful
Report
Amadori E.
5.0 out of 5 stars libro per lavoro
Reviewed in Italy on June 6, 2017
Utilissimo per il mio lavoro,scritto in un inglese di facile comprensione.Non eccessivamente tecnico e molto scorrevole.
Lo consiglio a chi studia o lavora e vuole saperne di piu' sull'argomento
One person found this helpful
Report
やまやま
4.0 out of 5 stars 大学生の息子に頼まれて
Reviewed in Japan on December 11, 2016
息子がいろいろな本やを探し回る手間を考えたら、アマゾンならプライム会員でもなくても、2、3日で届く。有難い。