HOME > 상세정보

상세정보

The hacker and the state : cyber attacks and the new normal of geopolitics

The hacker and the state : cyber attacks and the new normal of geopolitics (2회 대출)

자료유형
단행본
개인저자
Buchanan, Ben, (Writer on cybersecurity).
서명 / 저자사항
The hacker and the state : cyber attacks and the new normal of geopolitics / Ben Buchanan.
발행사항
Cambridge, Massachusetts :   Harvard University Press,   2020.  
형태사항
412 p. ; 22 cm.
ISBN
9780674987555 (cloth)
요약
"The threat of cyberwar can feel like something out of a movie: nuclear codes hacked, powerplants melting down, immediate crisis. In reality, state-sponsored hacking looks nothing like this. It's covert, insidious, and constant. Ben Buchanan reveals the cyberwar that's already here, reshaping the global contest for geopolitical advantage"--
내용주기
Part one. Espionage: Exploiting home-field advantage -- Defeating encryption -- Building a backdoor -- Strategic espionage -- Counterintelligence -- Part two. Attack: Strategic sabotage -- Targeted disruption -- Coercion -- Testing and demonstration -- Part three. Destabilization: Election interference -- Exposure -- Theft, ransom, and manipulation -- Widespread disruption.
서지주기
Includes bibliographical references and index.
일반주제명
Cyber intelligence (Computer security). Hacking --Political aspects. Cyberterrorism. Cyberspace operations (Military science). Cyberspace --Political aspects.
000 00000cam u2200205 a 4500
001 000046048696
005 20200921163155
008 200917s2020 mau b 001 0 eng d
010 ▼a 2019033274
020 ▼a 9780674987555 (cloth)
035 ▼a (KERIS)REF000019164445
040 ▼a MH/DLC ▼b eng ▼e rda ▼c DLC ▼d 211009
050 0 0 ▼a QA76.9.A25 ▼b B823 2020
082 0 0 ▼a 005.8/7 ▼2 23
084 ▼a 005.87 ▼2 DDCK
090 ▼a 005.87 ▼b B918h
100 1 ▼a Buchanan, Ben, ▼c (Writer on cybersecurity).
245 1 4 ▼a The hacker and the state : ▼b cyber attacks and the new normal of geopolitics / ▼c Ben Buchanan.
260 ▼a Cambridge, Massachusetts : ▼b Harvard University Press, ▼c 2020.
300 ▼a 412 p. ; ▼c 22 cm.
504 ▼a Includes bibliographical references and index.
505 0 ▼a Part one. Espionage: Exploiting home-field advantage -- Defeating encryption -- Building a backdoor -- Strategic espionage -- Counterintelligence -- Part two. Attack: Strategic sabotage -- Targeted disruption -- Coercion -- Testing and demonstration -- Part three. Destabilization: Election interference -- Exposure -- Theft, ransom, and manipulation -- Widespread disruption.
520 ▼a "The threat of cyberwar can feel like something out of a movie: nuclear codes hacked, powerplants melting down, immediate crisis. In reality, state-sponsored hacking looks nothing like this. It's covert, insidious, and constant. Ben Buchanan reveals the cyberwar that's already here, reshaping the global contest for geopolitical advantage"-- ▼c Provided by publisher.
650 0 ▼a Cyber intelligence (Computer security).
650 0 ▼a Hacking ▼x Political aspects.
650 0 ▼a Cyberterrorism.
650 0 ▼a Cyberspace operations (Military science).
650 0 ▼a Cyberspace ▼x Political aspects.
945 ▼a KLPA

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 중앙도서관/서고6층/ 청구기호 005.87 B918h 등록번호 111833634 도서상태 대출가능 반납예정일 예약 서비스 B M

관련분야 신착자료