Kim Zetter is an award-winning journalist who covers cybercrime, civil liberties, privacy, and security for Wired. She was among the first journalists to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. She has also broken numerous stories over the years about WikiLeaks and Bradley Manning, NSA surveillance, and the hacker underground.
“An authoritative account of Stuxnet’s spread and discovery . . .
[delivers] a sobering message about the vulnerability of the
systems—train lines, water-treatment plants, electricity grids—that
make modern life possible.”—Economist
“Exhaustively researched . . . Zetter gives a full account of this
‘hack of the century,’ as the operation has been called, [but] the
book goes well beyond its ostensible subject to offer a
hair-raising introduction to the age of cyber
warfare.”—The Wall Street Journal
“Part detective story, part scary-brilliant treatise on the future
of warfare . . . an ambitious, comprehensive, and engrossing book
that should be required reading for anyone who cares about the
threats that America—and the world—are sure to be facing over the
coming years.”—Kevin Mitnick, New York Times bestselling author of
Ghost in the Wires and The Art of Intrusion
“Unpacks this complex issue with the panache of a spy thriller . .
. even readers who can’t tell a PLC from an iPad will learn much
from Zetter’s accessible, expertly crafted account.”—Publishers
Weekly (starred review)
“A true techno-whodunit [that] offers a sharp account of past
mischief and a glimpse of things to come . . . Zetter writes
lucidly about mind-numbingly technical matters, reveling in the
geekery of malware and espionage, and she takes the narrative down
some dark electronic corridors. . . . Governments, hackers and
parties unknown are launching ticking computer time bombs every
day, all coming to a laptop near you.”—Kirkus Reviews
“An exciting and readable story of the world's first cyberweapon.
Zetter not only explains the weapon and chronicles its discovery,
but explains the motives and mechanics behind the attack—and makes
a powerful argument why this story matters.”—Bruce Schneier, author
of Secrets and Lies and Schneier on Security
Ask a Question About this Product More... |