".aimed at a military audience, this book offers concepts and examples largely from the U.S. Military."-- Security Management, January 2013, page 60 "This book of around 300 pages and some 15 chapters, with a ''cyber timeline'' appendix, provides an adequate coverage of the topics given that the whole area is subject to rapid change in both technical and policy terms. The foreword to the book again sets the scene. It asks the question ''just what should teaching on this vital subject involve and how should it be done?''. It then sets out the aim of the book as, to quote, ''to cover the strategic, operational, and tactical aspects of the conflicts in cyberspace today.
'' This ambitious aim is partially met but mainly from an intensely USA perspective even though some reviews are done of international policy settings as of the date of writing."-- Computers & Security "The book is also crammed with details that keep it from being too dry a treatise -- right from the foreword, where the president of security experts The SANS Institute confesses to being fooled into friending a fake Facebook persona (luckily for him, set up by a security researcher). The short final section of perspectives from a range of security experts is thought-provoking, but mostly this is a rigorous analysis of every aspect of cyber-war and defences against it. At the end of Cyber Warfare you won''t have a definitive answer on whether a true cyber-war is imminent. What you will have is a far better idea of the complexity of the situation, and a clear view of where to start evaluating threats to your infrastructure and how to protect against them."-- ZDNet UK "Regardless of where the definition of cyber warfare finally settles, be it simply a war waged over the Internet, a technological cold war, network-based hostilities or simply another theater of war, there are without doubt activities that transpire over the wire that require much closer scrutiny not only by the security community but also by governments, businesses and the general public. The authors accurately and adeptly take the reader from the headlines to the front lines with frequent stops in underground communities, legislative halls and anywhere hackers (ethical or otherwise) are in high demand. This book serves as a report on the current cyber state of affairs on a global scale, as a career guide to those looking to enter this burgeoning field, and, most importantly, as a reference on protecting assets that are unmistakably in the field of battle.
whether intended or not."-- Donald C. Donzal, Editor-In-Chief, The Ethical Hacker Network "A fifth domain of war has been added to land, air, sea and space: cyber. Malware capable of taking a nuclear program offline was science fiction 5 years ago: Stuxnet demonstrates that information security is now a matter of national security. This timely and necessary book provides an assessment of the current state of cyber warfare, and more importantly, where the conflict is heading. Highly recommended for information security professionals."-- Eric Conrad, Lead Author, CISSP Study Guide, President, Backshore Communications "Now another view on cyber security comes from Steve Winterfeld, co-author of the recently published book on the subject, Cyber Warfare, Techniques, Tactics and tools for Security Practitioners, who believes the answer lies in punishing the hackers. ''Somewhere along the line we are going to have to change the cost/benefit equation,'' said Winterfeld, "arresting and going after the individual, that''s how we change the costs.
" But on state sponsored cyber warfare Winterfeld admits that is very difficult, and says he covers it thoroughly in chapter 14 of his book. Both Winterfeld and Oates spoke by phone on the ScienceNews Radio Network program, the Promise of Tomorrow with Colonel Mason."-- News Examiner " Cyber Warfare explores the battlefields, participants and the tools and techniques used during today''s digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and no-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the threats every time."-- The Journal (of Law Enforcement).