Sabtu, 27 Juli 2013

[K320.Ebook] Download Ebook Quantitative Analysis for Management, by Barry Render, Ralph M. Stair

Download Ebook Quantitative Analysis for Management, by Barry Render, Ralph M. Stair

When you are rushed of task due date and also have no idea to get inspiration, Quantitative Analysis For Management, By Barry Render, Ralph M. Stair book is one of your options to take. Schedule Quantitative Analysis For Management, By Barry Render, Ralph M. Stair will certainly provide you the right source and thing to obtain motivations. It is not just concerning the tasks for politic business, administration, economics, and also various other. Some ordered jobs making some fiction jobs also require inspirations to overcome the task. As just what you require, this Quantitative Analysis For Management, By Barry Render, Ralph M. Stair will possibly be your choice.

Quantitative Analysis for Management, by Barry Render, Ralph M. Stair

Quantitative Analysis for Management, by Barry Render, Ralph M. Stair



Quantitative Analysis for Management, by Barry Render, Ralph M. Stair

Download Ebook Quantitative Analysis for Management, by Barry Render, Ralph M. Stair

Quantitative Analysis For Management, By Barry Render, Ralph M. Stair. In what instance do you like reviewing a lot? Exactly what concerning the kind of the publication Quantitative Analysis For Management, By Barry Render, Ralph M. Stair The should read? Well, everyone has their very own reason why ought to review some publications Quantitative Analysis For Management, By Barry Render, Ralph M. Stair Primarily, it will certainly connect to their need to obtain understanding from the e-book Quantitative Analysis For Management, By Barry Render, Ralph M. Stair and wish to read merely to obtain amusement. Stories, story e-book, and also various other enjoyable e-books become so prominent now. Besides, the scientific e-books will likewise be the finest need to choose, specifically for the pupils, instructors, medical professionals, business owner, and also various other careers which enjoy reading.

Reading Quantitative Analysis For Management, By Barry Render, Ralph M. Stair is a very helpful passion as well as doing that could be gone through any time. It implies that reading a publication will certainly not restrict your activity, will certainly not force the time to invest over, as well as won't invest much money. It is a quite cost effective and obtainable thing to purchase Quantitative Analysis For Management, By Barry Render, Ralph M. Stair But, with that said quite affordable point, you can get something brand-new, Quantitative Analysis For Management, By Barry Render, Ralph M. Stair something that you never ever do as well as get in your life.

A new experience can be acquired by checking out a book Quantitative Analysis For Management, By Barry Render, Ralph M. Stair Even that is this Quantitative Analysis For Management, By Barry Render, Ralph M. Stair or other book compilations. We provide this book considering that you can find a lot more points to encourage your skill and understanding that will make you much better in your life. It will certainly be likewise helpful for the people around you. We suggest this soft documents of the book right here. To know how you can obtain this publication Quantitative Analysis For Management, By Barry Render, Ralph M. Stair, find out more right here.

You can find the web link that we offer in website to download Quantitative Analysis For Management, By Barry Render, Ralph M. Stair By purchasing the budget-friendly price as well as obtain completed downloading and install, you have actually finished to the initial stage to obtain this Quantitative Analysis For Management, By Barry Render, Ralph M. Stair It will certainly be absolutely nothing when having actually purchased this book and also not do anything. Review it as well as reveal it! Invest your couple of time to just check out some sheets of web page of this book Quantitative Analysis For Management, By Barry Render, Ralph M. Stair to check out. It is soft data and very easy to read anywhere you are. Appreciate your new routine.

Quantitative Analysis for Management, by Barry Render, Ralph M. Stair

For undergraduate/graduate level courses in Management Science, Quantitative Analysis, and Decision Models. This best-selling text has long been considered one of the most student accessible texts for the management science course. The new edition retains and updates the traditional, comprehensive coverage of past editions but now adds spreadsheet-based problem solutions to most chapters of the text. In addition, the text is now packaged with free software.

  • Published on: 1986-06
  • Original language: English
  • Number of items: 1
  • Binding: Paperback
  • 750 pages

From the Publisher
This easy-to-use text provides students with the skills to apply the techniques of quantitative analysis in all kinds of organizational decision-making situations. Designed for optimum teaching flexibility, it covers every major topic in the quantitative analysis/management science field, showing how each technique works, discussing the assumptions and limitations of the models, and illustrating the real-world usefulness of each technique with many applications in both profit-making and nonprofit organizations. Dramatically revised, the Sixth Edition now offers a completely new look and feel to make teaching more efficient and enhance students' learning experience.

From the Back Cover
Fully integrated with the personal computer, this easy-to-use book provides readers with the skills to necessary to apply the techniques of quantitative analysis in all kinds of organizational decision-making situations. It covers every major topic in the quantitative analysis/management science field, showing how each technique works, discussing the assumptions and limitations of the models, and illustrating the real-world usefulness of each technique with many applications and case studies in both profit-making and nonprofit organizations. A FREE CD-ROM readers can use to solve the examples presented in the book is conveniently packaged with the book providing Excel QM, Crystal Ball, TreePlan, QM for Windows and data files for examples. Probability Concepts and Applications, Decision Theory, Decision Trees with Utility Theory, Forecasting, Inventory Control Models, Linear Programming Models, Linear Programming: The Simplex Method. Transportation and Assignment Models, Integer Programming, Goal Programming, Non Linear Programming, and Branch and Bound Models, Analytic Hierarchy Process, Network Models, Project Management, Waiting Lines and Queuing Theory Models, Simulation Modeling, Markov Analysis, Using QM for Windows, Using Excel OM. Appropriate for business managers and analysts.

About the Author

Barry Render is the Charles Harwood Distinguished Professor of Management Science at the Roy E. Crummer Graduate School of Business at Rollins College in Winter Park, Florida. He received his M.S. in Operations Research and his Ph.D. in Quantitative Analysis at the University of Cincinnati. He previously taught at George Washington University, the University of New Orleans, Boston University, and George Mason University, where he held the GM Foundation Professorship in Decision Sciences and was Chair of the Decision Science Department. Dr. Render has also worked in the aerospace industry for General Electric, McDonnell Douglas, and NASA.

Professor Render has co-authored ten textbooks with Prentice-Hall, including Managerial Decision Modeling with Spreadsheets, Operations Management, Principles of Operations Management, Service Management, Introduction to Management Science, and Cases and Readings in Management Science. His more than one hundred articles on a variety of management topics have appeared in Decision Sciences, Production and Operations Management, Interfaces, Information and Management, the Journal of Management Information Systems, Socio-Economic Planning Sciences, and Operations Management Review, among others.

Dr. Render has also been honored as an AACSB Fellow and named as a Senior Fulbright Scholar in 1982 and again in 1993. He was twice vice-president of the Decision Science Institute Southeast Region and served as Software Review Editor for Decision Line from 1989 to 1995. He has also served as Editor of the New York Times Operations Management special issues from 1996 to 2001. Finally, Professor Render has been actively involved in consulting for government agencies and for many corporations, including NASA; the FBI; the U.S. Navy; Fairfax County, Virginia; and C8zP Telephone.

He teaches operations management courses in Rollins College's MBA and Executive MBA programs. In 1995 he was named as that school's Professor of the Year, and in 1996 was selected by Roosevelt University to receive the St. Claire Drake Award for Outstanding Scholarship.

Ralph Stair has been Professor of Management Science at Florida State University for twenty years and is now entering its phased retirement program. He received a B.S. in Chemical Engineering from Purdue University and an MBA from Tulane University. Under the guidance of Ken Ramsing and Alan Eliason, he received his Ph.D. in operations management from the University of Oregon.

He has taught at the University of Oregon, the University of Washington, the University of New Orleans, and Florida State University. He has twice taught in Florida State University's Study Abroad Program in London. Over the years, his teaching has been concentrated in the areas of information systems, operations research, and operations management.

Dr. Stair is a member of several academic organizations, including the Decision Sciences Institute and INFORMS, and he regularly participates at national meetings. He has published numerous articles and books, including Managerial Decision Modeling with Spreadsheets, Introduction to Management Science, Cases and Readings in Management Science, Production and Operations Management: A Self-Correction Approach, Fundamentals of Information Systems, Principles of Information Systems, Introduction to Information Systems, Computers in Today's World, Principles of Data Processing, Learning to Live with Computers, Programming in BASIC, Essentials of BASIC Programming, Essentials of FORTRAN Programming, and Essentials of COBOL Programming.

Dr. Stair divides his time between Florida and Colorado. He enjoys skiing, biking, kayaking, and other outdoor activities.

Michael E. Hanna is Professor of Decision Sciences at the University of Houston-Clear Lake (UHCL).

Most helpful customer reviews

12 of 12 people found the following review helpful.
REQUIRED FOR MGMT 524 MANAGEMENT SCIENCE
By D. Comer
This book is required for the MGMT 524 Management Science course at Embtry-Riddle Aeronautical University. It does not come with a CD, but the programs associated with it are available for free at the companion website.

20 of 22 people found the following review helpful.
Software Corrected for the 11th Edition-- ignore old reviews!
By Let's Compare Options Preptorial
I've taught both MBA and Master's in Management classes online and physically at MIT, Harvard (GE Crotonville) and Phoenix State University. There are a group of about 3-5 texts that are now the most popular for graduate Quantitative Analysis (QA). These include the Swift text (most popular in Europe) at from $40 to $80 US (Quantitative Methods: For Business, Management and Finance), the Render Quantitative Analysis for Management text (Quantitative Analysis for Management (11th Edition)), $175 for the 11th edition, and the very thorough but NOT for self study Anderson text (Quantitative Methods for Business (with Printed Access Card)) for $250.

QA is a really tough course for people with less math background such as liberal arts, nursing, etc. students going for an MBA, and a bit easier for math and engineering majors in undergrad, because it involves modeling, using a lot of fairly advanced math. Typical QA courses include linear programming (not really linear, and not really programming-- it is about objectives and constraints stated algebraically to find "optimal" graphic or corner solutions to problems such as mixing, profit maximization, or cost minimization); queueing problems; statement analysis; Decision analysis; Project Management; Forecasting; Inventory Control; Logistics; Markov Analysis; Stats; Integer/ nonlinear/ goal programming; regression modeling; simulation; probability, and possibly some econometrics. Most grad (MBA) courses don't go as far as differential equation modeling (frequent models in physics, biosciences, ecology, etc).

The Swift and Render texts are the most popular, and the Anderson text a distant third according to publisher's (QA!) data on course use and sales. Both Swift and Render are frequently zinged in reviews for broken or less useful software and models, but this is an unfair criticism. Swift gives numerous (although London oriented) model examples, and Render has their own internet models available. The reason both of these criticisms are unfair is that there are numerous plug ins for Excel that do all the analysis, statistics, programming solutions, etc. you will need regardless of which text you use. The Library Picks team chose Render as the top pick, but due to expense, if you're doing self study, Swift is also a good bet.

If the included websites, plug ins, templates and downloads aren't working for you from a software/ modeling viewpoint, here is a brief list of outstanding Excel options that will do the same thing, many for free:

-- Statistical Analysis: Microsoft Excel 2010
-- Business Analysis: Microsoft Excel 2010 (MrExcel Library)
-- Predictive Analytics: Microsoft Excel
-- Microsoft Excel 2010: Data Analysis and Business Modeling
-- Charts and Graphs: Microsoft Excel 2010 (MrExcel Library)

These will take care of the problems metioned by some reviewers that it is hard to stay up to date on models. In particular, Microsoft has now migrated their SQL server business analysis package to a new language called DAX in the FREE Excel plug in PowerPivot. These plug ins, many free on the web, will work perfectly with the examples in Swift and Render so you don't have to sweat the included QA software if it crashes.

One caveat: many reviews complain about QA software with "bugs" when in fact it is the reviewer's computer at fault. To run modern QA programs with lots of modeling, you need a modern dual core processor with at LEAST 8 gig of ram, preferably 12 or 16. The reason for this is that with pipelining, the old "math coprocessor" hardware has given way to sharing between CPU and GPU for floating point, and recent software-- even SPSS -- will crash older machines or appear to be buggy. Excel with a plug in also is a great answer to this, because you can get away with much less power if your machine is already doing well with Excel. PowerPivot is intensive, but only if you have huge amounts of data. The typical mixing problem is no problem even with a computer that's say, post 2009.

0 of 0 people found the following review helpful.
The contents of the textbook I received were great. However the actual book was in horrible condition
By Amazon Customer
The contents of the textbook I received were great. However the actual book was in horrible condition. When I opened the box, the back portion of the book fell out, it wasn't even attached. I was not impressed. I have always used Amazon for textbooks but this particular book was in horrible condition.

See all 99 customer reviews...

Quantitative Analysis for Management, by Barry Render, Ralph M. Stair PDF
Quantitative Analysis for Management, by Barry Render, Ralph M. Stair EPub
Quantitative Analysis for Management, by Barry Render, Ralph M. Stair Doc
Quantitative Analysis for Management, by Barry Render, Ralph M. Stair iBooks
Quantitative Analysis for Management, by Barry Render, Ralph M. Stair rtf
Quantitative Analysis for Management, by Barry Render, Ralph M. Stair Mobipocket
Quantitative Analysis for Management, by Barry Render, Ralph M. Stair Kindle

[K320.Ebook] Download Ebook Quantitative Analysis for Management, by Barry Render, Ralph M. Stair Doc

[K320.Ebook] Download Ebook Quantitative Analysis for Management, by Barry Render, Ralph M. Stair Doc

[K320.Ebook] Download Ebook Quantitative Analysis for Management, by Barry Render, Ralph M. Stair Doc
[K320.Ebook] Download Ebook Quantitative Analysis for Management, by Barry Render, Ralph M. Stair Doc

[L663.Ebook] Ebook SPELLING WORKOUT LEVEL D PUPIL EDITION, by MODERN CURRICULUM PRESS

Ebook SPELLING WORKOUT LEVEL D PUPIL EDITION, by MODERN CURRICULUM PRESS

Is SPELLING WORKOUT LEVEL D PUPIL EDITION, By MODERN CURRICULUM PRESS book your favourite reading? Is fictions? How's about record? Or is the very best vendor novel your selection to fulfil your leisure? And even the politic or spiritual publications are you looking for now? Right here we go we provide SPELLING WORKOUT LEVEL D PUPIL EDITION, By MODERN CURRICULUM PRESS book collections that you require. Bunches of varieties of books from many industries are offered. From fictions to science and spiritual can be searched and learnt right here. You may not worry not to locate your referred book to check out. This SPELLING WORKOUT LEVEL D PUPIL EDITION, By MODERN CURRICULUM PRESS is among them.

SPELLING WORKOUT LEVEL D PUPIL EDITION, by MODERN CURRICULUM PRESS

SPELLING WORKOUT LEVEL D PUPIL EDITION, by MODERN CURRICULUM PRESS



SPELLING WORKOUT LEVEL D PUPIL EDITION, by MODERN CURRICULUM PRESS

Ebook SPELLING WORKOUT LEVEL D PUPIL EDITION, by MODERN CURRICULUM PRESS

SPELLING WORKOUT LEVEL D PUPIL EDITION, By MODERN CURRICULUM PRESS. Modification your routine to put up or squander the time to just talk with your buddies. It is done by your everyday, do not you feel tired? Currently, we will certainly show you the new habit that, actually it's a very old behavior to do that can make your life a lot more certified. When really feeling burnt out of consistently talking with your buddies all downtime, you could locate guide qualify SPELLING WORKOUT LEVEL D PUPIL EDITION, By MODERN CURRICULUM PRESS and afterwards review it.

How can? Do you believe that you do not need sufficient time to go with shopping publication SPELLING WORKOUT LEVEL D PUPIL EDITION, By MODERN CURRICULUM PRESS Never mind! Just sit on your seat. Open your gizmo or computer system and be on-line. You can open up or check out the link download that we supplied to obtain this SPELLING WORKOUT LEVEL D PUPIL EDITION, By MODERN CURRICULUM PRESS By this method, you can obtain the on the internet e-book SPELLING WORKOUT LEVEL D PUPIL EDITION, By MODERN CURRICULUM PRESS Checking out the publication SPELLING WORKOUT LEVEL D PUPIL EDITION, By MODERN CURRICULUM PRESS by on-line could be truly done quickly by saving it in your computer and device. So, you could continue every single time you have spare time.

Checking out the publication SPELLING WORKOUT LEVEL D PUPIL EDITION, By MODERN CURRICULUM PRESS by on-line can be likewise done conveniently every where you are. It seems that hesitating the bus on the shelter, waiting the list for line up, or various other areas possible. This SPELLING WORKOUT LEVEL D PUPIL EDITION, By MODERN CURRICULUM PRESS could accompany you in that time. It will not make you really feel weary. Besides, this way will certainly additionally improve your life quality.

So, merely be here, locate guide SPELLING WORKOUT LEVEL D PUPIL EDITION, By MODERN CURRICULUM PRESS now and also read that quickly. Be the first to review this publication SPELLING WORKOUT LEVEL D PUPIL EDITION, By MODERN CURRICULUM PRESS by downloading in the link. We have a few other publications to review in this web site. So, you can discover them also quickly. Well, now we have done to provide you the ideal publication to check out today, this SPELLING WORKOUT LEVEL D PUPIL EDITION, By MODERN CURRICULUM PRESS is really proper for you. Never ever ignore that you need this book SPELLING WORKOUT LEVEL D PUPIL EDITION, By MODERN CURRICULUM PRESS to make far better life. On-line book SPELLING WORKOUT LEVEL D PUPIL EDITION, By MODERN CURRICULUM PRESS will actually offer easy of every little thing to read and take the advantages.

SPELLING WORKOUT LEVEL D PUPIL EDITION, by MODERN CURRICULUM PRESS

Learning to spell is a complex process, but the curriculum you choose can help. The Modern Curriculum Press (MCP) Spelling Workout: Grade 4 homeschool program is designed to make Spelling education easier on both you and your child. The curriculum features a step-by-step process that takes the guesswork out of education, an element you're sure to love.

MCP Spelling Workout: Grade 4 takes a dynamic and hands-on approach to Spelling, giving your child plenty of puzzles and riddles to tackle. Each of these activities are designed to improve your child's understanding of how the English language is constructed, so he or she will become a skilled speller. This process begins with Grade 1 and moves through Grade 8. The Grade 4 content solidifies basic spelling knowledge, helping your child recognize symbols and their meaning.

MCP Spelling Workout was designed to function independently or alongside MCP Plaid Phonics. This second curriculum for homeschooling focuses on the phonics side of Spelling education, making it the perfect companion for MCP Spelling Workout. Of course, even without it, your child will gain a solid understanding of Spelling.

You'll love MCP Spelling Workout: Grade 4's adaptable format and your child will enjoy learning using hands-on activities. With cross-curricular reading selections and interesting writing assignments, your child will easily integrate Spelling into his or her knowledge base.

These engaging assignments come complete with the Student Edition. You'll also have access to the Teacher Edition and Parent Guide. For more information on the specific materials included in MCP Spelling Workout: Grade 4, visit the Features and Benefits page.

  • Sales Rank: #45116 in Books
  • Brand: MODERN CURRICULUM PRESS
  • Published on: 2001-07-27
  • Original language: English
  • Number of items: 1
  • Dimensions: 10.85" h x .35" w x 8.20" l, .70 pounds
  • Binding: Paperback
  • 192 pages
Features
  • Used Book in Good Condition

Most helpful customer reviews

30 of 30 people found the following review helpful.
Amazing Spelling Program
By M. Massey
I homeschool and have been through many spelling programs that don't give much practice. This program is a wonderful find that incorporates a reading section with spelling words, practice activities, a written passage to correct (with proofreading marks taught along the way), and a writing prompt. I currently use this for my 3rd grader who is a bit advanced in spelling. She never complains about spelling lessons, and gets 100% on all 20 words each week. I can't praise this series enough!

0 of 0 people found the following review helpful.
Five Stars
By shawn arend
Kids love doing it, fun book, great educational and fun spelling!!!

18 of 19 people found the following review helpful.
Love it - a welcome change from Sequential Spelling for our family
By FloridaMum
We've been using Sequential Spelling with a (mildly) dyslexic child for about a year now. While I *do* think that's a good program, it is very repetitive (in a tiresome way) for both the parent and child, and my own experience is that it didn't foster any independent learning. Additionally, SS required a full 30 minutes for each lesson and with four children that would clearly be a prohibitive program.

I read recommendations for this on the Well-Trained Mind forums, and absolutely love it. There are a range of activities to complete each week, and those vary so that the work doesn't become boring. My two children who will be using this program next year were excited upon reviewing the pages as there are crossword puzzles and other things that are appealing to a child. I did also purchase the Instructor's Guides and found them worthwhile, particularly with the scheduling and philosophy behind the program.

See all 24 customer reviews...

SPELLING WORKOUT LEVEL D PUPIL EDITION, by MODERN CURRICULUM PRESS PDF
SPELLING WORKOUT LEVEL D PUPIL EDITION, by MODERN CURRICULUM PRESS EPub
SPELLING WORKOUT LEVEL D PUPIL EDITION, by MODERN CURRICULUM PRESS Doc
SPELLING WORKOUT LEVEL D PUPIL EDITION, by MODERN CURRICULUM PRESS iBooks
SPELLING WORKOUT LEVEL D PUPIL EDITION, by MODERN CURRICULUM PRESS rtf
SPELLING WORKOUT LEVEL D PUPIL EDITION, by MODERN CURRICULUM PRESS Mobipocket
SPELLING WORKOUT LEVEL D PUPIL EDITION, by MODERN CURRICULUM PRESS Kindle

[L663.Ebook] Ebook SPELLING WORKOUT LEVEL D PUPIL EDITION, by MODERN CURRICULUM PRESS Doc

[L663.Ebook] Ebook SPELLING WORKOUT LEVEL D PUPIL EDITION, by MODERN CURRICULUM PRESS Doc

[L663.Ebook] Ebook SPELLING WORKOUT LEVEL D PUPIL EDITION, by MODERN CURRICULUM PRESS Doc
[L663.Ebook] Ebook SPELLING WORKOUT LEVEL D PUPIL EDITION, by MODERN CURRICULUM PRESS Doc

Kamis, 18 Juli 2013

[N939.Ebook] Ebook Free The Shakespeare Riots: Revenge, Drama, and Death in Nineteenth-Century America, by Nigel Cliff

Ebook Free The Shakespeare Riots: Revenge, Drama, and Death in Nineteenth-Century America, by Nigel Cliff

The Shakespeare Riots: Revenge, Drama, And Death In Nineteenth-Century America, By Nigel Cliff. Reviewing makes you much better. Which states? Lots of sensible words say that by reading, your life will certainly be much better. Do you believe it? Yeah, show it. If you need the book The Shakespeare Riots: Revenge, Drama, And Death In Nineteenth-Century America, By Nigel Cliff to check out to show the smart words, you could see this page completely. This is the website that will certainly supply all guides that most likely you need. Are the book's compilations that will make you feel interested to read? One of them below is the The Shakespeare Riots: Revenge, Drama, And Death In Nineteenth-Century America, By Nigel Cliff that we will certainly recommend.

The Shakespeare Riots: Revenge, Drama, and Death in Nineteenth-Century America, by Nigel Cliff

The Shakespeare Riots: Revenge, Drama, and Death in Nineteenth-Century America, by Nigel Cliff



The Shakespeare Riots: Revenge, Drama, and Death in Nineteenth-Century America, by Nigel Cliff

Ebook Free The Shakespeare Riots: Revenge, Drama, and Death in Nineteenth-Century America, by Nigel Cliff

The Shakespeare Riots: Revenge, Drama, And Death In Nineteenth-Century America, By Nigel Cliff. Learning to have reading routine resembles discovering how to attempt for eating something that you actually don't really want. It will need even more times to assist. Additionally, it will certainly likewise little make to serve the food to your mouth and also ingest it. Well, as reading a publication The Shakespeare Riots: Revenge, Drama, And Death In Nineteenth-Century America, By Nigel Cliff, often, if you must review something for your new tasks, you will feel so woozy of it. Even it is a book like The Shakespeare Riots: Revenge, Drama, And Death In Nineteenth-Century America, By Nigel Cliff; it will certainly make you really feel so bad.

The factor of why you could receive and get this The Shakespeare Riots: Revenge, Drama, And Death In Nineteenth-Century America, By Nigel Cliff earlier is that this is the book in soft data type. You could check out guides The Shakespeare Riots: Revenge, Drama, And Death In Nineteenth-Century America, By Nigel Cliff wherever you want also you remain in the bus, workplace, house, and also other areas. But, you could not need to relocate or bring the book The Shakespeare Riots: Revenge, Drama, And Death In Nineteenth-Century America, By Nigel Cliff print anywhere you go. So, you will not have heavier bag to carry. This is why your choice to make better idea of reading The Shakespeare Riots: Revenge, Drama, And Death In Nineteenth-Century America, By Nigel Cliff is truly helpful from this situation.

Knowing the way ways to get this book The Shakespeare Riots: Revenge, Drama, And Death In Nineteenth-Century America, By Nigel Cliff is also valuable. You have actually remained in appropriate website to start getting this info. Get the The Shakespeare Riots: Revenge, Drama, And Death In Nineteenth-Century America, By Nigel Cliff link that we supply right here as well as see the web link. You can order the book The Shakespeare Riots: Revenge, Drama, And Death In Nineteenth-Century America, By Nigel Cliff or get it when possible. You could quickly download this The Shakespeare Riots: Revenge, Drama, And Death In Nineteenth-Century America, By Nigel Cliff after getting deal. So, when you need guide rapidly, you could straight receive it. It's so simple and so fats, right? You need to like to in this manner.

Just attach your device computer or device to the web connecting. Get the modern technology to make your downloading and install The Shakespeare Riots: Revenge, Drama, And Death In Nineteenth-Century America, By Nigel Cliff finished. Even you do not wish to read, you can straight close the book soft data and also open The Shakespeare Riots: Revenge, Drama, And Death In Nineteenth-Century America, By Nigel Cliff it later. You could additionally conveniently obtain the book everywhere, considering that The Shakespeare Riots: Revenge, Drama, And Death In Nineteenth-Century America, By Nigel Cliff it is in your gadget. Or when being in the office, this The Shakespeare Riots: Revenge, Drama, And Death In Nineteenth-Century America, By Nigel Cliff is also recommended to check out in your computer system gadget.

The Shakespeare Riots: Revenge, Drama, and Death in Nineteenth-Century America, by Nigel Cliff

One of the bloodiest incidents in New York’s history, the so-called Astor Place Riot of May 10, 1849, was ignited by a long-simmering grudge match between the two leading Shakespearean actors of the age. Despite its unlikely origins, though, there was nothing remotely quaint about this pivotal moment in history–the unprecedented shooting by American soldiers of dozens of their fellow citizens, leading directly to the arming of American police forces.

The Shakespeare Riots recounts the story of this momentous night, its two larger-than-life protagonists, and the myriad political and cultural currents that fueled the violence. In an engrossing narrative that moves at a breakneck pace from the American frontier to the Mississippi River, to the posh theaters of London, to the hangouts of the most notorious street gangs of the day, Nigel Cliff weaves a spellbinding saga of soaring passions, huge egos, and venal corruption.

Cliff charts the course of this tragedy from its beginnings as a somewhat comical contretemps between Englishman William Charles Macready, the haughty lion of the London stage, and Edwin Forrest, the first great American star and a popular hero to millions. Equally celebrated, and equally self-centered, the two were once friends, then adversaries. Exploiting this rivalry, “nativist” agitators organized mobs of bullyboys to flex their muscle by striking a blow against the foppish Macready and the Old World’s cultural hegemony that he represented.

The moment Macready took the stage in New York, his adversaries sprang into action, first by throwing insults, then rotten eggs, then chairs. When he dared show his face again, an estimated twenty thousand packed the streets around the theater. As cobblestones from outside rained down on the audience, National Guard troops were called in to quell the riot. Finding themselves outmatched, the Guardsmen discharged their weapons at the crowd, with horrific results. When the smoke cleared, as many as thirty people lay dead, with scores more wounded.

The Shakespeare Riots is social and cultural history of the highest order. In this wondrous saga Nigel Cliff immerses readers in the bustle of mid-nineteenth-century New York, re-creating the celebrity demimonde of the day and capturing all the high drama of a violent night that robbed a nation of its innocence.

  • Sales Rank: #72734 in Books
  • Published on: 2007-04-17
  • Released on: 2007-04-17
  • Format: Deckle Edge
  • Original language: English
  • Number of items: 1
  • Dimensions: 9.57" h x 1.12" w x 6.60" l, 1.30 pounds
  • Binding: Hardcover
  • 312 pages

From Publishers Weekly
A dispute over Shakespeare resulted in a deadly riot on May 10, 1849, at New York City's Astor Place Theatre, where armed militiamen clashed with theatergoers, gangsters and bystanders. In the melee, some 50 soldiers and 50 civilians were wounded and more than 20 civilians killed. Cliff, a former theater and film critic for the London Times, sees the riot as symbolic of a young America trying to find its cultural voice and resentful of what some saw as British cultural imperialism. The fatal dispute was between two Shakespearean actors, the intellectual Englishman William Charles Macready and American working-class hero Edwin Forrest and began when Forrest hissed at Macready's performance of Hamlet in Edinburgh. This book ranges widely, from the 1809 riots at a Macbeth performance at London's Covent Garden to Shakespeare's popularity on the American frontier, where his plays helped pioneers wrestle with fundamental questions about human nature, and America's old and new money classes as immigrants flooded into the country. Nicely illustrated with contemporary photos and cartoons, Cliff's informative, engrossing if somewhat scattered debut recreates a time when the Bard inflamed passions in lower classes and gentry alike, and when America's theaters "were a crossroads of a whole society." (Apr. 17)
Copyright © Reed Business Information, a division of Reed Elsevier Inc. All rights reserved.

From Booklist
During the evening of May 10, 1849, a massive riot broke out in Astor Place in New York City, involving at least 20,000rioters, causing scores of fatalities, and leading to the use of the military in quelling the violence. But this was no typical street quarrel between ethnic gangs, and it certainly wasn't a case of have-nots driven to rage by their poverty. Rather, the rival gangs were fighting on behalf of two unlikely antagonists, both of them prominent Shakespearean actors. William Macready was an aristocratic, foppish actor acclaimed by elites in New York and London; Edwin Forrest was the darling of working-class theater fans. Cliff, the former film and theater critic for The Times of London, tells their story and the story of their followers with considerable verve and a consistent sense of irony. He supplies a wonderful portrait of mid-nineteenth-century New York as an emerging metropolis, and the tale set there is an enjoyable but unsettling mixture of farce and tragedy. Both general readers and those with a special interest in the period will find much to enjoy here. Jay Freeman
Copyright © American Library Association. All rights reserved

About the Author
Nigel Cliff was educated at Oxford University, where he was awarded a double First in English and the Beddington Prize for English literature. He is a former theater and film critic for the London Times and a contributor to The Economist. This is his first book.

Most helpful customer reviews

0 of 0 people found the following review helpful.
Drama in the New World
By Christian Schlect
While I think the author spent too much time fleshing out the varied and obscure disputes between the two actors featured in his book, it is still quite good. It is strongest when describing the significant social changes occurring as America evolved in the mid-19th century. The early theatre provides a nice platform for the talented Mr. Cliff to describe in lively terms such things as the movement West, the striking influx of immigrants to New York City, the emerging divisions between the upper and lower urban classes, and the rise of an American way of looking at Shakespeare.

With this successful effort at understanding early America, I suggest this friend of our country from England, Nigel Cliff, now turn his attention and skills to writing a book on the influence of William Shakespeare on our greatest president, Abraham Lincoln.

13 of 14 people found the following review helpful.
Acting Rivalries on an International Stage
By Rob Hardy
Not long ago we had movies of Shakespeare's _Hamlet_ starring Mel Gibson in the first and Kenneth Branaugh in the second. Imagine that Hollywood blundered and released both at the same time for premieres in New York City to compete with each other. Now imagine that this made fans of Gibson and fans of Branaugh so furious that there was a clash between thousands of them, throwing stones and lighting fires, and that when the police and militia were called in, more than twenty people died. If your imagination can't pull all that off, you can stop trying. It all really happened, only it happened in 1849, in New York City outside the Astor Place Opera House, where respective fans of an American Shakespearean actor and an English Shakespearean actor caused what is known as the Astor Place Riot. If it still seems improbable, the precedents for the battle are comprehensively set up in _The Shakespeare Riots: Revenge, Drama, and Death in Nineteenth-Century America_ (Random House) by Nigel Cliff. This brilliant and entertaining book looks back at early nineteenth century acting traditions, the importance of Shakespeare to Americans, the culture wars between England and Britain, and the class conflicts within New York City, so that the riot itself occupies only the last quarter of the book. The riot may still seem an implausible historical episode, but Cliff has so thoroughly plumbed its many roots that in the book's final chapters, the riot seems like a sad inevitability.

For us, Shakespeare represents a lofty realm of academic reverence, but it is surprising that frontiersmen wanted not melodrama or farce, but the Bard. Shakespeare's plays were fully a quarter of all the plays put on in America, and on the frontier there was no more popular playwright. And so when America produced its first theatrical star, it was Shakespeare that was his platform. Edwin Forrest was "a poster child for Jacksonian America," and his working-class or frontier audiences responded to his down-home brawny presence. The leading actor in England at the time was William Charles Macready, who was a quieter performer than Forrest, and audiences in both America and England got to sample the performances of both men. The two of them were able, initially, to enjoy each other's work, and were friends, with a friendly rivalry. There were tensions at the time that brought America and England as close to war as they had been since their battles of 1812, so that part of being pro-America at the time was being anti-British. It might have been inevitable, but the friendly rivalry between him and Forrest became unfriendly, and then bitter.

The clash between countries manifested in New York City, where the new Astor Place Opera House had been built as a temple to propriety to be frequented by the upper classes, but which was located close enough to annoy their inferiors. "The theatres had always been the great democratic gathering places," Cliff writes, "the only arenas where the people's voice was louder than the elite's, where the poor could sit in judgment on the wealthy folk below." That the Astor wanted to police itself of the Irish and any other gangs by instituting a strict dress code was bad enough, but that it booked Macready to play his brand of British-style _Macbeth_ made the crowds angry. On the night of the riot, Macready was able to get through the play with only some catcalls, but outside, a mob of 15,000 people surrounded the building, bombarding it with paving stones, and eventually enduring the rifle fire from the militia. Macready was able to elude the mob; it was his last American performance. Cliff points out that this was "the first time that two classes of Americans had failed to resolve their conflicting rights without resorting to muskets and brickbats," and it was the worst of riots until those protesting the draft in 1863. The riot also lead to police being issued their first lethal weapons, heavy clubs to be used, of course, in self defense. It was one reason that Americans changed the way they enjoyed Shakespeare; the riot promoted segregation of classes and depopularized the Bard, with scholastic veneration taking place of popular enthusiasm. An astonishing story full of period detail, _The Shakespeare Riots_ is a grand history of a forgotten episode that was surprisingly influential in American theater, class structure, and nationalism.

5 of 6 people found the following review helpful.
The original culture wars - a wonderful read
By James S
In his impressive debut, Nigel Cliff takes an unlikely but fascinating episode in New York history - a few days when the city was under martial law, troops were marching through the streets and thirty people were shot dead, all over whether an American or English actor was better at doing Shakespeare - and uses it to paint a captivating picture of nineteenth century America and beyond.

Moving between decadent London, the Mississppi frontier and New York gang hideouts, Cliff brings to life the hero worship of the first American star Edwin Forrest. All muscles and fire, Forrest promised to rid America of England's cultural hold on its old colony - amazingly, decades after independence the entire entertainment business was still a British affair. He soon became enmeshed in a first comic but increasingly bitter feud with his arch rival, Englishman William Macready. At first friends, the two chased each other around America and England, and such was the celebrity of star actors that they came to stand in for their countries. It all ended with America's first class war, between an elite that supported the refined Macready and nativists who hated the old world and everything it stood for. It seems extraordinary that Shakespeare was at the heart of all this - but clearly he was: a figure so omnipresent figure in the young republic that towns, mountains, mines, even drugs were named after him and America was determined to adopt him, thinking that his heart would have lain here rather than with degenerate England.

What made this book especially enjoyable to read was the wonderfully visual writing, which takes you straight into the middle of events. Despite the research behind it, it reads almost like a novel, and the author has an engaginly conversational style and dry humor. Recommended for anyone interested in Shakespeare, social and cultural history, or just a good tale skillfully told.

See all 12 customer reviews...

The Shakespeare Riots: Revenge, Drama, and Death in Nineteenth-Century America, by Nigel Cliff PDF
The Shakespeare Riots: Revenge, Drama, and Death in Nineteenth-Century America, by Nigel Cliff EPub
The Shakespeare Riots: Revenge, Drama, and Death in Nineteenth-Century America, by Nigel Cliff Doc
The Shakespeare Riots: Revenge, Drama, and Death in Nineteenth-Century America, by Nigel Cliff iBooks
The Shakespeare Riots: Revenge, Drama, and Death in Nineteenth-Century America, by Nigel Cliff rtf
The Shakespeare Riots: Revenge, Drama, and Death in Nineteenth-Century America, by Nigel Cliff Mobipocket
The Shakespeare Riots: Revenge, Drama, and Death in Nineteenth-Century America, by Nigel Cliff Kindle

[N939.Ebook] Ebook Free The Shakespeare Riots: Revenge, Drama, and Death in Nineteenth-Century America, by Nigel Cliff Doc

[N939.Ebook] Ebook Free The Shakespeare Riots: Revenge, Drama, and Death in Nineteenth-Century America, by Nigel Cliff Doc

[N939.Ebook] Ebook Free The Shakespeare Riots: Revenge, Drama, and Death in Nineteenth-Century America, by Nigel Cliff Doc
[N939.Ebook] Ebook Free The Shakespeare Riots: Revenge, Drama, and Death in Nineteenth-Century America, by Nigel Cliff Doc

Kamis, 04 Juli 2013

[V579.Ebook] Free PDF Nuclear Cardiac Imaging: Principles and ApplicationsFrom Oxford University Press

Free PDF Nuclear Cardiac Imaging: Principles and ApplicationsFrom Oxford University Press

Yeah, checking out an e-book Nuclear Cardiac Imaging: Principles And ApplicationsFrom Oxford University Press could add your good friends listings. This is among the formulas for you to be successful. As understood, success does not suggest that you have terrific points. Recognizing as well as recognizing greater than various other will certainly give each success. Next to, the notification and also impression of this Nuclear Cardiac Imaging: Principles And ApplicationsFrom Oxford University Press can be taken and also selected to act.

Nuclear Cardiac Imaging: Principles and ApplicationsFrom Oxford University Press

Nuclear Cardiac Imaging: Principles and ApplicationsFrom Oxford University Press



Nuclear Cardiac Imaging: Principles and ApplicationsFrom Oxford University Press

Free PDF Nuclear Cardiac Imaging: Principles and ApplicationsFrom Oxford University Press

Nuclear Cardiac Imaging: Principles And ApplicationsFrom Oxford University Press. In what instance do you like reading so considerably? What about the sort of the e-book Nuclear Cardiac Imaging: Principles And ApplicationsFrom Oxford University Press The should read? Well, everyone has their own reason why ought to read some books Nuclear Cardiac Imaging: Principles And ApplicationsFrom Oxford University Press Primarily, it will associate with their necessity to get expertise from guide Nuclear Cardiac Imaging: Principles And ApplicationsFrom Oxford University Press and desire to read just to get entertainment. Books, story book, and also various other enjoyable books become so popular this day. Besides, the clinical books will certainly also be the most effective need to choose, specifically for the students, teachers, physicians, businessman, and other professions that love reading.

When getting this publication Nuclear Cardiac Imaging: Principles And ApplicationsFrom Oxford University Press as recommendation to read, you could gain not just motivation but also new expertise and also sessions. It has even more compared to typical benefits to take. What type of book that you review it will work for you? So, why ought to get this e-book qualified Nuclear Cardiac Imaging: Principles And ApplicationsFrom Oxford University Press in this short article? As in web link download, you could get guide Nuclear Cardiac Imaging: Principles And ApplicationsFrom Oxford University Press by online.

When obtaining guide Nuclear Cardiac Imaging: Principles And ApplicationsFrom Oxford University Press by online, you can review them anywhere you are. Yeah, even you remain in the train, bus, waiting list, or various other locations, on the internet e-book Nuclear Cardiac Imaging: Principles And ApplicationsFrom Oxford University Press could be your great friend. Every time is a great time to review. It will improve your understanding, enjoyable, enjoyable, driving lesson, and encounter without investing more money. This is why on-line publication Nuclear Cardiac Imaging: Principles And ApplicationsFrom Oxford University Press comes to be most wanted.

Be the initial which are reading this Nuclear Cardiac Imaging: Principles And ApplicationsFrom Oxford University Press Based upon some factors, reading this publication will certainly offer even more perks. Even you should read it detailed, web page by page, you can finish it whenever as well as wherever you have time. Once much more, this on the internet publication Nuclear Cardiac Imaging: Principles And ApplicationsFrom Oxford University Press will certainly give you easy of reviewing time as well as activity. It additionally offers the experience that is economical to reach and also get considerably for better life.

Nuclear Cardiac Imaging: Principles and ApplicationsFrom Oxford University Press

Nuclear cardiac imaging refers to cardiac radiological diagnostic techniques performed with the aid of radiopharmaceuticals, which are perfused into the myocardium as markers. These imaging studies provide a wide range of information about the heart, including the contractility of the heart, the amount of blood supply to the heart and whether parts of the heart muscle are alive or dead. This is essential information for cardiologists, and nuclear imaging has become an increasingly important part of the cardiologist's armamentarium. Chapters in Nuclear Cardiac Imaging cover historical, technical and physiological considerations, diagnosis and prognosis, conditions other than Coronary Artery Disease (CAD), advanced cardiac imaging, and challenges and opportunities. New to the fifth edition are key point summaries at the start of each chapter, clinical cases with videos, and a question and answer chapter on practical issues. This volume is ideal for nuclear cardiologists in training and nuclear clinicians alike who are searching for quick answers to important clinical and technical questions.

  • Sales Rank: #178047 in Books
  • Published on: 2015-11-26
  • Original language: English
  • Number of items: 1
  • Dimensions: 8.80" h x 1.50" w x 11.30" l, .0 pounds
  • Binding: Hardcover
  • 768 pages

Review

Featured in- Annals of Nuclear Cardiology


About the Author

Ami E. Iskandrian is a Distinguished Professor of Medicine and Radiology in the Division of Cardiovascular Disease at the University of Alabama at Birmingham. Ernest V. Garcia is an Endowed Professor in Cardiac Imaging in the Department of Radiology and Imaging Sciences at Emory University's School of Medicine in Atlanta, Georgia.

Most helpful customer reviews

See all customer reviews...

Nuclear Cardiac Imaging: Principles and ApplicationsFrom Oxford University Press PDF
Nuclear Cardiac Imaging: Principles and ApplicationsFrom Oxford University Press EPub
Nuclear Cardiac Imaging: Principles and ApplicationsFrom Oxford University Press Doc
Nuclear Cardiac Imaging: Principles and ApplicationsFrom Oxford University Press iBooks
Nuclear Cardiac Imaging: Principles and ApplicationsFrom Oxford University Press rtf
Nuclear Cardiac Imaging: Principles and ApplicationsFrom Oxford University Press Mobipocket
Nuclear Cardiac Imaging: Principles and ApplicationsFrom Oxford University Press Kindle

[V579.Ebook] Free PDF Nuclear Cardiac Imaging: Principles and ApplicationsFrom Oxford University Press Doc

[V579.Ebook] Free PDF Nuclear Cardiac Imaging: Principles and ApplicationsFrom Oxford University Press Doc

[V579.Ebook] Free PDF Nuclear Cardiac Imaging: Principles and ApplicationsFrom Oxford University Press Doc
[V579.Ebook] Free PDF Nuclear Cardiac Imaging: Principles and ApplicationsFrom Oxford University Press Doc

Rabu, 03 Juli 2013

[D156.Ebook] Free PDF Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, by Kim Zetter

Free PDF Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, by Kim Zetter

This is additionally among the factors by getting the soft documents of this Countdown To Zero Day: Stuxnet And The Launch Of The World's First Digital Weapon, By Kim Zetter by online. You may not need even more times to invest to go to guide store and also search for them. Often, you likewise don't locate guide Countdown To Zero Day: Stuxnet And The Launch Of The World's First Digital Weapon, By Kim Zetter that you are searching for. It will certainly throw away the moment. But below, when you visit this page, it will certainly be so simple to obtain as well as download the publication Countdown To Zero Day: Stuxnet And The Launch Of The World's First Digital Weapon, By Kim Zetter It will certainly not take sometimes as we specify previously. You could do it while doing something else in the house and even in your workplace. So very easy! So, are you question? Merely practice exactly what we supply here and read Countdown To Zero Day: Stuxnet And The Launch Of The World's First Digital Weapon, By Kim Zetter just what you like to check out!

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, by Kim Zetter

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, by Kim Zetter



Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, by Kim Zetter

Free PDF Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, by Kim Zetter

Countdown To Zero Day: Stuxnet And The Launch Of The World's First Digital Weapon, By Kim Zetter. Join with us to be member here. This is the website that will offer you alleviate of looking book Countdown To Zero Day: Stuxnet And The Launch Of The World's First Digital Weapon, By Kim Zetter to review. This is not as the various other site; guides will remain in the forms of soft file. What benefits of you to be member of this website? Get hundred compilations of book connect to download as well as get always updated book every day. As one of the books we will offer to you currently is the Countdown To Zero Day: Stuxnet And The Launch Of The World's First Digital Weapon, By Kim Zetter that includes an extremely satisfied idea.

Why must be Countdown To Zero Day: Stuxnet And The Launch Of The World's First Digital Weapon, By Kim Zetter in this site? Get much more earnings as just what we have actually informed you. You can locate the various other eases besides the previous one. Alleviate of getting guide Countdown To Zero Day: Stuxnet And The Launch Of The World's First Digital Weapon, By Kim Zetter as just what you desire is additionally offered. Why? We provide you several sort of guides that will certainly not make you feel bored. You could download them in the link that we provide. By downloading Countdown To Zero Day: Stuxnet And The Launch Of The World's First Digital Weapon, By Kim Zetter, you have taken properly to pick the ease one, compared with the headache one.

The Countdown To Zero Day: Stuxnet And The Launch Of The World's First Digital Weapon, By Kim Zetter has the tendency to be great reading book that is easy to understand. This is why this book Countdown To Zero Day: Stuxnet And The Launch Of The World's First Digital Weapon, By Kim Zetter comes to be a favorite book to check out. Why don't you desire become one of them? You can enjoy reviewing Countdown To Zero Day: Stuxnet And The Launch Of The World's First Digital Weapon, By Kim Zetter while doing other activities. The presence of the soft file of this book Countdown To Zero Day: Stuxnet And The Launch Of The World's First Digital Weapon, By Kim Zetter is kind of getting encounter conveniently. It includes just how you should conserve the book Countdown To Zero Day: Stuxnet And The Launch Of The World's First Digital Weapon, By Kim Zetter, not in shelves of course. You might save it in your computer system tool as well as device.

By conserving Countdown To Zero Day: Stuxnet And The Launch Of The World's First Digital Weapon, By Kim Zetter in the gizmo, the way you check out will also be much less complex. Open it and also start checking out Countdown To Zero Day: Stuxnet And The Launch Of The World's First Digital Weapon, By Kim Zetter, easy. This is reason we recommend this Countdown To Zero Day: Stuxnet And The Launch Of The World's First Digital Weapon, By Kim Zetter in soft documents. It will not disturb your time to obtain guide. On top of that, the online air conditioner will certainly additionally ease you to browse Countdown To Zero Day: Stuxnet And The Launch Of The World's First Digital Weapon, By Kim Zetter it, even without going someplace. If you have connection net in your office, house, or gizmo, you could download and install Countdown To Zero Day: Stuxnet And The Launch Of The World's First Digital Weapon, By Kim Zetter it directly. You might not likewise wait to receive guide Countdown To Zero Day: Stuxnet And The Launch Of The World's First Digital Weapon, By Kim Zetter to send by the vendor in other days.

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, by Kim Zetter

Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.
 
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
 
Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
 
 At first, the firm’s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity.
 
They had, they soon learned, stumbled upon the world’s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. 
 
In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet’s planning, execution, and discovery, covering its genesis in the corridors of Bush’s White House and its unleashing on systems in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making.
 
But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today’s flourishing zero-day “grey markets,” in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike—and shows us just what might happen should our infrastructure be targeted by such an attack.
 
Propelled by Zetter’s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war.

  • Sales Rank: #182529 in Books
  • Published on: 2014-11-11
  • Released on: 2014-11-11
  • Original language: English
  • Number of items: 1
  • Dimensions: 9.61" h x 1.42" w x 6.40" l, 1.25 pounds
  • Binding: Hardcover
  • 448 pages

Review
"Immensely enjoyable...Zetter turns a complicated and technical cyber- story into an engrossing whodunit...The age of digital warfare may well have begun."
--Washington Post

"An authoritative account of Stuxnet’s spread and discovery...[delivers] a sobering message about the vulnerability of the systems—train lines, water-treatment plants, electricity grids—that make modern life possible."
--Economist

"Exhaustively researched...Zetter gives a full account of this “hack of the century,” as the operation has been called, [but] the book goes well beyond its ostensible subject to offer a hair-raising introduction to the age of cyber warfare."
--Wall Street Journal

“Part detective story, part scary-brilliant treatise on the future of warfare…an ambitious, comprehensive, and engrossing book that should be required reading for anyone who cares about the threats that America—and the world—are sure to be facing over the coming years.”
—Kevin Mitnick, New York Times bestselling author of Ghost in the Wires and The Art of Intrusion

“Unpacks this complex issue with the panache of a spy thriller…even readers who can’t tell a PLC from an iPad will learn much from Zetter’s accessible, expertly crafted account.”
—Publishers Weekly (starred)

“A true techno-whodunit [that] offers a sharp account of past mischief and a glimpse of things to come…Zetter writes lucidly about mind-numbingly technical matters, reveling in the geekery of malware and espionage, and she takes the narrative down some dark electronic corridors… Governments, hackers and parties unknown are launching ticking computer time bombs every day, all coming to a laptop near you.”
--Kirkus

"An exciting and readable story of the world's first cyberweapon. Zetter not only explains the weapon and chronicles its discovery, but explains the motives and mechanics behind the attack -- and makes a powerful argument why this story matters."
--Bruce Schneier, author of Secrets and Lies and Schneier on Security

About the Author
KIM ZETTER is an award-winning journalist who covers cybercrime, civil liberties, privacy, and security for Wired. She was among the first journalists to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. She has also broken numerous stories over the years about WikiLeaks and Bradley Manning, NSA surveillance, and the hacker underground.

Excerpt. © Reprinted by permission. All rights reserved.
CHAPTER 1

EARLY WARNING

Sergey Ulasen is not the sort of person you’d expect to find at the center of an international incident. The thirty-one-year-old Belarusian has close-cropped blond hair, a lean boyish frame, and the open face and affable demeanor of someone who goes through life attracting few enemies and even fewer controversies. One of his favorite pastimes is spending the weekend at his grandmother’s country house outside Minsk, where he decompresses from weekday stresses, far from the reach of cell phones and the internet. But in June 2010, Ulasen encountered something unusual that soon propelled him into the international spotlight and into a world of new stress.1

It was a warm Thursday afternoon, and Ulasen, who headed the antivirus division of a small computer security firm in Belarus called Virus–BlokAda, was seated with his colleague Oleg Kupreev in their lab in downtown Minsk inside a drab, Soviet-era building about a block from the Svisloch River. They were sifting methodically through suspicious computer files they had recently found on a machine in Iran when something striking leapt out at Kupreev. He sat back in his chair and called Ulasen over to take a look. Ulasen scrolled through the code once, then again, to make sure he was seeing what he thought he saw. A tiny gasp escaped his throat. The code they had been inspecting the past few days, something they had until now considered a mildly interesting but nonetheless run-of-the-mill virus, had just revealed itself to be a work of quiet and diabolical genius.

Not only was it using a skillful rootkit to cloak itself and make it invisible to antivirus engines, it was using a shrewd zero-day exploit to propagate from machine to machine--an exploit that attacked a function so fundamental to the Windows operating system, it put millions of computers at risk of infection.

Exploits are attack code that hackers use to install viruses and other malicious tools onto machines. They take advantage of security vulnerabilities in browser software like Internet Explorer or applications like Adobe PDF Reader to slip a virus or Trojan horse onto a system, like a burglar using a crowbar to pry open a window and break into a house. If a victim visits a malicious website where the exploit lurks or clicks on a malicious e‑mail attachment containing an exploit, the exploit uses the security hole in the software to drop a malicious file onto their system. When software makers learn about such holes in their products, they generally produce “patches” to close them up and seal the intruders out, while antivirus firms like Ulasen’s add signatures to their scanners to detect any exploits that try to attack the vulnerabilities.

Zero-day exploits, however, aren’t ordinary exploits but are the hacking world’s most prized possession because they attack holes that are still unknown to the software maker and to the antivirus vendors--which means there are no antivirus signatures yet to detect the exploits and no patches available to fix the holes they attack.

But zero-day exploits are rarely found in the wild. It takes time and skill for hackers to discover new holes and write workable exploits to attack them, so the vast majority of hackers simply rely on old vulnerabilities and exploits to spread their malware, counting on the fact that most computer users don’t often patch their machines or have up-to-date antivirus software installed, and that it can take vendors weeks or months to produce a patch for a known hole. Although more than 12 million viruses and other malicious files are captured each year, only about a dozen or so zero-days are found among them. Yet here the attackers were using an extremely valuable zero-day exploit, and a skillful rootkit, for a virus that, as far as Ulasen and Kupreev could tell, had only been found on machines in Iran so far. Something didn’t add up.



THE MYSTERY FILES had come to their attention a week earlier when a reseller of VirusBlokAda’s security software in Iran reported a persistent problem with a customer’s machine in that country. The computer was caught in a reboot loop, crashing and rebooting repeatedly while defying the efforts of technicians to control it.2 VirusBlokAda’s tech-support team had scanned the system remotely from Minsk to look for any malware their antivirus software might have missed, but came up with nothing. That’s when they called in Ulasen.

Ulasen had been hired by the antivirus firm while still in college. He was hired to be a programmer, but the staff at VirusBlokAda was so small, and Ulasen’s skills so keen, that within three years, at the age of twenty-six, he found himself leading the team that developed and maintained its antivirus engine. He also occasionally worked with the research team that deconstructed malicious threats. This was his favorite part of the job, though it was something he rarely got to do. So when the tech-support team asked him to weigh in on their mystery from Iran, he was happy to help.3

Ulasen assumed the problem must be a misconfiguration of software or an incompatibility between an application installed on the machine and the operating system. But then he learned it wasn’t just one machine in Iran that was crashing but multiple machines, including ones that administrators had wiped clean and rebuilt with a fresh installation of the operating system. So he suspected the culprit might be a worm lurking on the victim’s network, reinfecting scrubbed machines each time they were cleaned. He also suspected a rootkit was hiding the intruder from their antivirus engine. Ulasen had written anti-rootkit tools for his company in the past, so he was confident he’d be able to hunt this one down if it was there.

After getting permission to connect to one of the machines in Iran and remotely examine it, Ulasen and Kupreev zeroed in on six suspicious files--two modules and four other files--they thought were the source of the problem.4 Then with help from several colleagues in their lab, they spent the next several days picking at the files in fits and starts, hurling curses at times as they struggled to decipher what turned out to be surprisingly sophisticated code. As employees of a small firm that mostly developed antivirus products for government customers, they weren’t accustomed to taking on such complex challenges: they spent most of their days providing routine tech support to customers, not analyzing malicious threats. But they pressed forward nonetheless and eventually determined that one of the modules, a driver, was actually a “kernel-level” rootkit, as Ulasen had suspected.5

Rootkits come in several varieties, but the most difficult to detect are kernel-level rootkits, which burrow deep into the core of a machine to set up shop at the same privileged level where antivirus scanners work. If you think of a computer’s structure like the concentric circles of an archer’s target, the kernel is the bull’s eye, the part of the operating system that makes everything work. Most hackers write rootkits that operate at a machine’s outer layers--the user level, where applications run--because this is easier to do. But virus scanners can detect these--so a truly skilled hacker places his rootkit at the kernel level of the machine, where it can subvert the scanner. There, it serves as a kind of wingman for malicious files, running interference against scanners so the malware can do its dirty work unhindered and undetected. Kernel-level rootkits aren’t uncommon, but it takes sophisticated knowledge and a deft touch to build one that works well. And this one worked very well.6

Kupreev determined that the rootkit was designed to hide four malicious .LNK files--the four other suspicious files they’d found on the system in Iran. The malware appeared to be using an exploit composed of these malicious files to spread itself via infected USB flash drives, and the rootkit prevented the .LNK files from being seen on the flash drive. That’s when Kupreev called Ulasen over to have a look.

Exploits that spread malware via USB flash drives aren’t as common as those that spread them over the internet through websites and e‑mail attachments, but they aren’t unheard of, either. All of the USB exploits the two researchers had seen before, however, used the Autorun feature of the Windows operating system, which allowed malicious programs on a USB flash drive to execute as soon as the drive was inserted in a machine. But this exploit was more clever.7

Windows .LNK files are responsible for rendering the icons for the contents of a USB flash drive or other portable media device when it’s plugged into a PC. Insert a USB flash drive into a PC, and Windows Explorer or a similar tool automatically scans it for .LNK files to display the icon for a music file, Word document, or program stored on the flash drive.8 But in this case, the attackers embedded an exploit in a specially crafted .LNK file so that as soon as Windows Explorer scanned the file, it triggered the exploit to spring into action to surreptitiously deposit the USB’s malicious cargo onto the machine, like a military transport plane dropping camouflaged paratroopers onto enemy territory.

The .LNK exploit attacked such a fundamental feature of the Windows system that Ulasen wondered why no one had thought of it before. It was much worse than Autorun exploits, because those could be easily thwarted by disabling the Autorun feature on machines--a step many network administrators take as a matter of course because of Autorun’s known security risk. But there is no way to easily disable the .LNK function without causing other problems for users.

Ulasen searched a registry of exploits for any others that had used .LNK files in the past, but came up with nothing. That was when he suspected he was looking at a zero-day.

He took a USB flash drive infected with the malicious files and plugged it into a test machine running Windows 7, the newest version of the Microsoft operating system. The machine was fully patched with all the latest security updates. If the .LNK exploit was already known to Microsoft, patches on the system would prevent it from dropping the malicious files onto the machine. But if the .LNK exploit was a zero-day, nothing would stop it. He waited a few minutes to examine the computer and, sure enough, the malicious files were there.

He couldn’t believe it. VirusBlokAda, a tiny security firm that few in the world had ever heard of, had just discovered that rarest of trophies for a virus hunter. But this wasn’t just any zero-day exploit; it was one that worked against every version of the Windows operating system released since Windows 2000: the attackers had bundled four versions of their exploit together--in four different .LNK files--to make sure their attack worked against every version of Windows it was likely to encounter.9

Ulasen tried to wrap his head around the number of machines that were at risk of infection from this. But then something equally troubling struck him. The malicious driver module, and another driver module that got dropped onto targeted machines as part of the malicious cargo, had installed themselves seamlessly on their test machine, without any warning notice popping up on-screen to indicate they were doing so. Windows 7 had a security feature that was supposed to tell users if an unsigned driver, or one signed with an untrusted certificate, was trying to install itself on their machine. But these two drivers had loaded with no problem. That was because, Ulasen realized with alarm, they were signed with what appeared to be a legitimate digital certificate from a company called RealTek Semiconductor.10

Digital certificates are trusted security documents, like digital passports, that software makers use to sign their programs to authenticate them as legitimate products of their company. Microsoft digitally signs its programs and software updates, as do antivirus firms. Computers assume that a file signed with a legitimate digital certificate is trustworthy. But if attackers steal a Microsoft certificate and the private cryptographic “key” that Microsoft uses with the certificate to sign its files, they can fool a computer into thinking their malicious code is Microsoft code.

Attackers had used digital certificates to sign malicious files before. But they had used fake, self-signed certificates masquerading as legitimate ones, or had obtained real certificates through fraudulent means, such as creating a shell company to trick a certificate authority into issuing them a certificate under the shell company’s name.11 In both scenarios, attackers ran the risk that machines would view their certificate as suspicious and reject their file. In this case, the attackers had used a valid certificate from RealTek--a trusted hardware maker in Taiwan--to fool computers into thinking the drivers were legitimate RealTek drivers.

It was a tactic Ulasen had never seen before and it raised a lot of questions about how the attackers had pulled it off. One possibility was that they had hijacked the computer of a RealTek software developer and used his machine and credentials to get their code secretly signed.12

But it was also possible the attackers had simply stolen the signing key and certificate, or cert. For security reasons, smart companies store their certs and keys on offline servers or in hardware security modules that offered extra protection. But not everyone did this, and there were possible clues to suggest that RealTek’s cert had indeed been nabbed. A timestamp on the certificates showed that both of the drivers had been signed on January 25, 2010. Although one of the drivers had been compiled a year earlier on January 1, 2009, the other one was compiled just six minutes before it was signed. The rapid signing suggested the attackers might have had the RealTek key and cert in their possession. There was something notable about the compilation date of this driver, however. When hackers ran their source code through a compiler to translate it into the binary code that a machine could read, the compiler often placed a timestamp in the binary file. Though attackers could manipulate the timestamp to throw researchers off, this one appeared to be legitimate. It indicated that the driver had been compiled on July 14, two days after VirusBlokAda had gone public with news of Stuxnet.

The implications were disturbing. The use of a legitimate digital certificate to authenticate malicious files undermined the trustworthiness of the computer world’s signing architecture and called into question the legitimacy of any file signed with digital certificates thereafter. It was only a matter of time before other attackers copied the tactic and began stealing certificates as well.13 Ulasen needed to get the word out.

Responsible disclosure dictated that researchers who find vulnerabilities in software notify the relevant vendors before going public with the news to give the vendors time to patch the holes, so Ulasen dashed off e‑mails to both RealTek and Microsoft, notifying them of what his team had found.

But after two weeks passed with no response from either company, Ulasen and Kupreev decided they couldn’t keep quiet.14 The rest of the security community needed to know about the .LNK exploit. They had already added signatures to VirusBlokAda’s antivirus engine to detect the malicious files and were seeing infections pop up on machines all over the Middle East and beyond. The worm/virus was on the run and spreading quickly. They had to go public with the news.15

1 Ulasen and his team encountered the malware the week of June 24, 2010.

2 Ulasen has never disclosed the name of the reseller, but a link on VirusBlokAda’s website for its distributor in Iran points to vba32-ir.com, a site owned by the Deep Golden Recovery Corporation, a data-recovery firm in Iran.

3 Information about VirusBlokAda’s encounter with the malware comes from interviews with Sergey Ulasen and Oleg Kupreev, as well as from an account published by Kaspersky Lab in 2011, after the Russian antivirus firm hired Ulasen away from VirusBlokAda. That interview, “The Man Who Found Stuxnet--Sergey Ulasen in the Spotlight,” was published November 2, 2011, at eugene.kaspersky.com/2011/11/02/the-man-who-found-stuxnet-sergey-ulasen-in-the-spotlight.

4 A module is a stand-alone component. It is often interchangeable and can be used with various programs.

5 Drivers are software programs that are used as interfaces between a device and a computer to make the device work with the machine. For example, a driver is required to allow a computer to communicate with a printer or digital camera that is connected to it--different drivers are available for different operating systems so that the same device will work with any computer. In this case the drivers were actually rootkits designed to install and conceal malicious files on the machine.

6 The reboot problem didn’t occur on other machines later found to be infected by the malware. So some researchers suspect the problem may have been an incompatibility between one of the malware’s drivers and VirusBlokAda’s antivirus software. The malware used the driver to install itself, and researchers at Kaspersky Lab in Russia suspected that when the driver injected the malware’s main file into the memory of the machines in Iran, this caused some machines to crash. Researchers at Kaspersky Lab later tried to reproduce the problem but got inconsistent results--sometimes a machine crashed, sometimes it didn’t. The irony is that the attackers had put a lot of effort into testing their malware against antivirus scanners from Kaspersky, Symantec, McAfee, and others, precisely to make sure their code wouldn’t be detected by the scanners or crash machines. But they apparently hadn’t tested it against VirusBlokAda’s scanning software. So if VBA’s scanner was the problem, it meant this tiny Belarusian firm had been their undoing in more ways than one.

7 Autorun is a convenience feature in Windows that allows programs on a USB flash drive, CD-ROM, or DVD, to automatically launch when the devices are inserted into a computer. It’s a known security risk, however, because any malicious program on the device will automatically launch as well.

8 If Autorun is disabled for security reasons, the malicious code on the flash drive that exploits this feature will not be able to launch automatically but will only launch if users specifically click on the file to open it.

9 The exploit worked against seven versions of Windows: Windows 2000, WinXP, Windows 2003, Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.

10 With Windows Vista and Windows 7, a driver that isn’t signed with a trusted digital certificate that Microsoft recognizes will have trouble installing on the machine. On 32-bit Windows machines that have Vista or Windows 7 installed, a warning will display, telling the user the file is not signed or is not signed with a trusted certificate, forcing the user to make a decision about whether to let it install. On 64-bit Windows machines using either operating system, a file not signed with a trusted certificate simply won’t install at all. The malware VirusBlokAda found only worked on 32-bit Windows machines.

11 Certificate authorities dole out the signing certificates that companies use to sign their code and websites. The CAs are supposed to verify that an entity requesting a certificate has the authority to do so--to prevent someone other than Microsoft from obtaining a code-signing certificate in Microsoft’s name, for example--and to ensure that if someone applies for a signing certificate for a company they claim is theirs, it’s a real company producing real code. Some certificate authorities don’t do due diligence, however, and certificates are sometimes issued to malicious actors. There are also companies that, for a fee, will use their key and certificate to sign code for others. Hackers have used these companies in the past to sign their malware.

12 In September 2012, this is exactly what happened to Adobe. The software giant, which distributes the popular Adobe Reader and Flash Player programs, announced that attackers had breached its code-signing server to sign two malicious files with an Adobe certificate. Adobe stored its private signing keys in a device called a hardware security module, which should have prevented the attackers from accessing the keys to sign their malicious files. But they compromised a build server--a server used for developing software--which had the ability to interact with the code-signing system and get it to sign their files.

13 Ironically, on July 12, 2010, the day Ulasen went public with news about the malware, a researcher with the Finnish security firm F-Secure published a conference presentation about digital certificates, stating that, as of then, malware using stolen certificates had yet to be discovered. He noted, however, that this would inevitably happen now that new versions of Windows treated unsigned drivers with suspicion, pushing hackers to steal legitimate certificates to sign their malware. (See Jarno Niemela, “It’s Signed, Therefore It’s Clean, Right?” presented at the CARO conference in Helsinki, Finland; available at f‑secure.com/weblog/archives/Jarno_Niemela_its_signed.pdf.) Indeed, not long after VirusBlokAda’s discovery of the RealTek certificate, other hackers were already attempting to use the same tactic. In September 2010, antivirus firms discovered Infostealer.Nimkey, a Trojan horse specifically designed to steal private key certificates from computers. This was followed over the next two years by a number of malicious programs signed with certificates apparently stolen from various trusted companies.

14 Ulasen contacted Microsoft through a general e‑mail address used for its security team. But Microsoft’s security response team receives more than 100,000 e‑mails a year, so it was understandable that an e‑mail sent to its general mailbox from an obscure antivirus firm in Belarus got lost in the queue.

15 The malware, researchers would later discover, was a combination of a worm and virus. The worm portion allowed it to spread autonomously without user action, but once it was on a system, other components infected files, like a virus would, and required user action to spread.

Most helpful customer reviews

51 of 54 people found the following review helpful.
Excellent, Fascinating Read
By Matt Morgan
Being in the IT field (in particular working with OS design and administration) I took an interest when Stuxnet came to light a few years back. The last time I remembered such a stir created in the media about propagating malware was when the Morris worm surfaced in the late 1980’s. I did not know too much about Stuxnet other than what was shared in news reports so I was eager to learn more. This book definitely delivers the goods.

Instead of a dry, factual presentation that just leaves the reader bored, this book reads more like a novel – except that it’s true. It starts with a fascinating account of how Stuxnet was first discovered and describes in some detail how it exploited the operating system, what mechanisms it used to replicate itself, how it targeted the systems it was designed to find and it gives a fair estimate of just how much damage it caused before it was ultimately uncovered. The book goes on from there to discuss the implications Stuxnet has had on the digital world and how it has helped to redefine modern warfare.

The main text is written very much like a novel, but it makes heavy use of footnotes. These footnotes inject interesting facts relating to the point being made but would otherwise mar the chain of thought for the reader. This was a smart editing decision as it makes taking the side tracks optional.

One thought kept coming to mind as I got deeper into the material and learned more about the birth of this malware and how it all came into being – I had absolutely no clue just how deep the rabbit hole went, both militarily and politically.

For those interested in cybersecurity, those with an interest in electronic warfare or even those who are just downright curious about what is without question the most complex and sophisticated digital weapon known to date, this book is full of interesting information and because it’s written almost like fiction it’s a fast and engrossing read.

25 of 25 people found the following review helpful.
Excellent telling of a very complex story
By Adam Caudill
I know quite a few of the researchers that were involved in reverse engineering Stuxnet and Flame - so I was able to watch the story unfold with a behind the scenes view - what's presented in here is a very accurate, and insightful view of one of the most important security discoveries in recent years.

Stuxnet, et. al. presented the security industry with a huge problem - and the implications are still being sorted out to this day. Government use of malware, and how the industry should handle it when discovered are topics that are still being debated on a daily basis. Kim does a great job on explaining the issues, and giving readers plenty to think about.

From a technical perspective, the book goes into enough detail so that those of us familiar with the topic know exactly what is being discussed and it's implications, while not going overboard and overloading non-technical users with incomprehensible details. The book has a good narrative style, while covering technical detail and including details on the sources for information. Throughout the book are footnotes that list source information, additional notes that explain context, or provide additional details that don't fit in the narrative telling - I strongly suggest that you read the footnotes, as they offer very useful information.

All in all, I strongly recommend the book, well worth it.

28 of 30 people found the following review helpful.
You won’t be able to put down this outstanding narrative about Stuxnet
By Ben Rothke
A word to describe Takedown: The Pursuit and Capture of America's Most Wanted Computer Outlaw was hyperbole. While the general storyline from the 1996 book was accurate, filler was written that created the legend of Kevin Mitnick. This in turn makes the book a near work of historical fiction.

Much has changed in nearly 20 years and Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon has certainly upped the ante for accurate computer security journalism.

The book is a fascinating read and author Kim Zetter's attention to detail and accuracy is superb. In the inside cover of the book, Kevin Mitnick describes this as an ambitious, comprehensive and engrossing book. The irony is not lost in that Mitnick was dogged by misrepresentations in Markoff’s book.

For those that want to know the basics about Stuxnet, its Wikipedia entry will suffice. For a deeper look, the book take a detailed look at how the Stuxnet worm of 2010 came to be, how it was written, discovered and deciphered, and what it means for the future.

The book provides nearly everything that can be known to date about Stuxnet. The need to create Stuxnet was the understanding that a nuclear Iran was dangerous to the world. The book notes that it just wasn’t the US and Israel that wanted a nuclear-free Iran; Egypt and Saudi Arabia were highly concerned about the dangers a nuclear Iran would bring to the region.

What is eminently clear is that Iran chronically lied about their nuclear intentions and actions (chapter 17 notes that former United Kingdom Prime Minister Gordon Brown told the international community that they had to do something over Iran’s serial deception of many years) and that the United Nations International Atomic Energy Agency (IAEA) was powerless to do anything, save for monitoring and writing reports.

While some may debate if Stuxnet was indeed the world's first digital weapon, it’s undeniable that it is the first piece of known malware that could be considered a cyber-weapon. Stuxnet was unlike any other previous malware. Rather than just hijacking targeted computers or stealing information from them, it created physical destruction on centrifuges the software controlled.

At just over 400 pages, the book is a bit wordy, but Zetter does a wonderful job of keeping the book extremely readable and the narrative enthralling. Writing about debugging virus code, descriptions about the Siemens industrial programmable logic controllers (PLCs) and Step7 software (which was what Stuxnet was attacking) could easily be mind-numbingly boring, save for Zetter’s ability to make it a compelling read.

While a good part of the book details the research Symantec, Kaspersky Lab and others did to debug Stuxnet, the book doesn’t list a single line of code, which makes it quite readable for the non-programmer. The book is technical and Zetter gets into the elementary details of how Stuxnet operated; from reverse engineering, digital certificates and certificate authorities, cryptographic hashing and much more. The non-technical reader certainly won’t be overwhelmed, but at the same time might not be able to appreciate what went into designing and making Stuxnet work.

As noted earlier, the book is extremely well researched and all significant claims are referenced. The book is heavily footnoted, which makes the book much more readable than the use of endnotes. Aside from the minor error of mistakenly calling Kurt Gödel a cryptographer (he was a logician) on page 295, Zetter’s painstaking attention to detail is to be commended.

Whoever wrote Stuxnet counted on the Iranians not having the skills to uncover or decipher the malicious attacks on their own. But as Zetter writes, they also didn’t anticipate the crowdsourced wisdom of the hive – courtesy of the global cybersecurity community that would handle the detection and analysis for them. That detection and analysis spanned continents and numerous countries.

The book concludes with chapter 19 Digital Pandora which departs from the details of Stuxnet and gets into the bigger picture of what cyber-warfare means and its intended and unintended consequences. There are no simple answers here and the stakes are huge.

The chapter quotes Marcus Ranum who is outspoken on the topic of cyber-warfare. At the 2014 MISTI Infosec World Conference, Ranum gave a talk on Cyberwar: Putting Civilian Infrastructure on the Front Lines, Again. Be it the topic or Marcus being Marcus, a third of the participants left within the first 15 minutes. They should have stayed, as Ranum, agree with him or not, provided some riveting insights on the topic.

The book leave with two unresolved questions; who did it, and how did it get into the air-gapped Nantanz enrichment facility.

It is thought the US with some assistance from Israel created Stuxnet; but Zetter also writes that Germany and Great Britain may have done the work or at least provided assistance.

It’s also unknown how Stuxnet got into the air-gapped facility. It was designed to spread via an infected USB flash drive. It’s thought that since they couldn’t get into the facility, what needed to be done was to infect computers belonging to a few outside firms that sold devices that would in turn be connected to the facility. The book identified a few of these companies, but it’s still unclear if they were the ones, or the perpetrators somehow had someone on the inside.

As to zero day in the title, what was unique about Stuxnet is that it contained 5 zero day exploits. Zero day is also relevant in that Zetter describes the black and gray markets of firms that discover zero-day vulnerabilities who in turn sell them to law enforcement and intelligence agencies.

Creating Stuxnet was a huge challenge that took scores of programmers from a nation state many months to create. Writing a highly readable and engrossing book about the obscure software vulnerabilities that it exploited was also a challenge, albeit one that few authors could do efficaciously. In Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, Kim Zetter has written one of the best computer security narratives; a book you will likely find quite hard to put down.

See all 241 customer reviews...

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, by Kim Zetter PDF
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, by Kim Zetter EPub
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, by Kim Zetter Doc
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, by Kim Zetter iBooks
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, by Kim Zetter rtf
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, by Kim Zetter Mobipocket
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, by Kim Zetter Kindle

[D156.Ebook] Free PDF Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, by Kim Zetter Doc

[D156.Ebook] Free PDF Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, by Kim Zetter Doc

[D156.Ebook] Free PDF Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, by Kim Zetter Doc
[D156.Ebook] Free PDF Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, by Kim Zetter Doc