Review: Terminal Compromise

5 Star, Asymmetric, Cyber, Hacking, Odd War, Information Operations
0Shares
Amazon Page
Amazon Page
5.0 out of 5 stars The ORIGINAL Information Warfare Book of Books
October 16, 2007
Winn Schwartau
I am so very glad this book has been reprinted and is now available again from Amazon. I have known the author ever since I ran into him in the 1990's lecturing on America's vulnerability to an electronic Pearl Harbor. This book started as non-fiction and scared the lawyers so badly that they insisted he write it as a non-fiction novel.

This is one of the most compelling plots, and is the perfect starter book for anyone who wants to begin understanding cyberwar, cyber espionage, and homeland vulnerability. Then read everything else Winn has published.

He is the ORIGINAL, the “real deal,” and one of the talents I most admire in the Information Operations arena.

See also:
Information Warfare: Second Edition
Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption
Internet & Computer Ethics for Kids: (and Parents & Teachers Who Haven't Got a Clue.)
Spies Among Us: How to Stop Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day
Zen and the Art of Information SecurityCorporate Espionage: What It Is, Why It's Happening in Your Company, What You Must Do About It
Information Operations: All Information, All Languages, All the Time

Vote on Review
Vote on Review

Financial Liberty at Risk-728x90




liberty-risk-dark