000 | 03511cam a2200517 i 4500 | ||
---|---|---|---|
001 | 20536320 | ||
003 | KPN | ||
005 | 20220131101415.0 | ||
008 | 180609s2018 nyu b 001 0 eng | ||
010 | _a 2018020918 | ||
020 | _a9781541773837 (hardcover) | ||
020 | _z9781541773813 (ebook) | ||
040 |
_aDLC _beng _cDLC _erda _dDLC |
||
042 | _apcc | ||
043 | _an-us--- | ||
050 | 0 | 0 |
_aU167.5.C92 _bC37 2018 |
082 | 0 | 0 |
_a327.1273047 _223 |
100 | 1 |
_aCarlin, John P., _d1973- _eauthor. |
|
245 | 1 | 0 |
_aDawn of the code war : _bAmerica's battle against Russia, China, and the rising global cyber threat / _cJohn P. Carlin with Garrett M. Graff. |
246 | 3 | 0 | _aAmerica's battle against Russia, China, and the rising global cyber threat |
250 | _aFirst edition. | ||
264 | 1 |
_aNew York : _bPublicAffairs, _c2018. |
|
300 |
_avii, 464 pages ; _c25 cm |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aForeword: TeaMp0isoN -- Introduction: The Code War -- The rise of the hackers -- Comment Crew -- Operation Aurora -- Qassam cyber fighters -- APT1 -- Slavik -- The guardians of peace -- Black vine -- Fake news -- Epilogue: winning the Code War. | |
520 | _a"Over the past decade, there have been a series of internet-linked attacks on American interests, including North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us. Former Assistant Attorney General John Carlin has been on the frontlines of America's ongoing cyber war with its enemies. In this dramatic book, he tells the story of his years-long secret battle to keep America safe, and warns us of the perils that await us as we embrace the latest digital novelties -- smart appliances, artificial intelligence, self-driving cars -- with little regard for how our enemies might compromise them. The potential targets for our enemies are multiplying: our electrical grid, our companies, our information sources, our satellites. As each sector of the economy goes digital, a new vulnerability is exposed. The Internet of Broken Things is not merely a cautionary tale, though. It makes the urgent case that we need to start innovating more responsibly. As a fleet of web-connected cars and pacemakers rolls off the assembly lines, the potential for danger is overwhelming. We must see and correct these flaws before our enemies exploit them."--Procisws by publisher. | ||
546 | _ain english | ||
650 | 0 |
_aCyberspace operations (Military science) _zUnited States. |
|
650 | 0 |
_aCyberterrorism _xHistory. |
|
650 | 0 |
_aCyberspace _xSecurity measures _xHistory. |
|
650 | 0 |
_aComputer security _zUnited States. |
|
650 | 0 |
_aComputer crimes _zUnited States. |
|
650 | 0 |
_aInformation warfare _zUnited States. |
|
650 | 0 |
_aNational security _zUnited States. |
|
650 | 0 |
_aCyberterrorism _xPrevention. |
|
650 | 0 | _aInternet in espionage. | |
650 | 0 |
_aEspionage _zUnited States. |
|
700 | 1 |
_aGraff, Garrett M., _d1981- _eauthor. |
|
776 | 0 | 8 |
_iOnline version: _aCarlin, John P., 1973- author. _tDawn of the code war _bFirst edition. _dNew York : PublicAffairs, 2018 _z9781541773813 _w(DLC) 2018028431 |
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
942 |
_2ddc _c1 _n0 |
||
999 |
_c589 _d589 |