The Hacker and the State Cyber Attacks and the New Normal of Geopolitics
The threat of cyberwar can feel like something out of a movie: nuclear codes hacked, powerplants melting down, immediate crisis.
Saved in:
Main Author: | |
---|---|
Format: | Book |
Language: | English |
Published: |
London
Harvard University Press
2020
|
Edition: | Print book : English : First printing |
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam a2200000#i 4501 | ||
---|---|---|---|
001 | wils-974222 | ||
005 | 202187151120 | ||
008 | t2020 -US ag# ##001 ##eng#D | ||
020 | # | # | |a 9780674987555 |q hardback |
040 | # | # | |a OCLC |b eng |c OCLC |d UiTM |e rda |
041 | 0 | # | |a eng |
090 | 0 | 0 | |a QA76.9.A25 |b B83 2020 |
100 | 1 | # | |a Buchanan, Ben |e author |
245 | 0 | 0 | |a The Hacker and the State |b Cyber Attacks and the New Normal of Geopolitics |c Ben Buchanan |
250 | # | # | |a Print book : English : First printing |
264 | # | 1 | |a London |b Harvard University Press |c 2020 |
264 | # | 4 | |c ©2020 |
300 | # | # | |a 412 pages |c 22 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
500 | # | # | |a Includes index |
505 | 0 | # | |a Part one. Espionage: Exploiting home-field advantage -- Defeating encryption -- Building a backdoor -- Strategic espionage -- Counterintelligence -- Part two. Attack: Strategic sabotage -- Targeted disruption -- Coercion -- Testing and demonstration -- Part three. Destabilization: Election interference -- Exposure -- Theft, ransom, and manipulation -- Widespread disruption. |
520 | # | # | |a The threat of cyberwar can feel like something out of a movie: nuclear codes hacked, powerplants melting down, immediate crisis. |
526 | 0 | # | |a CS709 - Sarjana Sains Keselamatan Siber Dan Forensik Digital |b ITT795 - Legal Aspects In Cybersecurity And Digital Forensics |5 Fakulti Sains Komputer Dan Matematik |
546 | # | # | |a In English |
650 | 1 | 0 | |a Cyber intelligence (Computer security) |
650 | 2 | 0 | |a Hacking |x Political aspects |
650 | 2 | 0 | |a Cyberterrorism |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=974222 |
964 | # | # | |c BOK |d 01 |
998 | # | # | |a 00250##a006.2.2||00250##b006.2.2||00264#1a006.2.2||00264#1b006.2.2||00300##a006.2.2||00300##b006.2.2||00300##c006.2.2||00500##a006.2.2||00520##a006.2.2||00520##b006.2.2||00546##a006.2.2|| |