HomeHelpSearchVideo SearchAudio SearchLabel Display ReserveMy AccountLibrary Map
Description Field Ind Field Data
Leader LDR pam i 00
Control # 1 2018020918
Control # Id 3 DLC
Date 5 20191014094432.0
Fixed Data 8 180609s2018 nyu b 001 0 eng
LC Card 10    $a 2018020918
ISBN 20    $a9781541773837$q(hardcover)
Obsolete 39    $a314609$cTLC
Cat. Source 40    $aDLC$beng$erda$cDLC$dDLC$dGCG
Authen. Ctr. 42    $apcc
Geog. Area 43    $an-us---
LC Call 50 00 $aU167.5.C92$bC37 2018
Dewey Class 82 00 $a327.1273047$223
ME:Pers Name 100 $aCarlin, John P.,$d1973-$eauthor.
Title 245 14 $aThe dawn of the code war :$bAmerica's battle against Russia, China, and the rising global cyber threat /$cJohn P. Carlin with Garrett M. Graff.
Edition 250    $aFirst edition.
Tag 264 264  1 $aNew York :$bPublicAffairs,$c2018.
Phys Descrpt 300    $avii, 464 pages ;$c25 cm
Tag 336 336    $atext$btxt$2rdacontent
Tag 337 337    $aunmediated$bn$2rdamedia
Tag 338 338    $avolume$bnc$2rdacarrier
Note:Bibliog 504    $aIncludes bibliographical references and index.
Note:Content 505 $aForeword: TeaMp0isoN -- Introduction: The code war -- The rise of the hackers -- Comment Crew -- Operation Aurora -- Qassam cyber fighters -- APT1 -- Slavik -- The guardians of peace -- Black vine -- Fake news -- Epilogue: winning the code war.
Abstract 520    $a"Over the past decade, there has been a series of internet-linked attacks on American interests, including North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us. Former Assistant Attorney General John Carlin has been on the frontlines of America's ongoing cyber war with its enemies. In this dramatic book, he tells the story of his years-long secret battle to keep America safe, and warns us of the perils that await us as we embrace the latest digital novelties -- smart appliances, artificial intelligence, self-driving cars -- with little regard for how our enemies might compromise them. The potential targets for our enemies are multiplying: our electrical grid, our companies, our information sources, our satellites. As each sector of the economy goes digital, a new vulnerability is exposed. The Internet of Broken Things is not merely a cautionary tale, though. It makes the urgent case that we need to start innovating more responsibly. As a fleet of web-connected cars and pacemakers rolls off the assembly lines, the potential for danger is overwhelming. We must see and correct these flaws before our enemies exploit them."--Provided by publisher.
Subj:Topical 650  0 $aCyberspace operations (Military science)$zUnited States.
Subj:Topical 650  0 $aCyberterrorism$xHistory.
Subj:Topical 650  0 $aCyberspace$xSecurity measures$xHistory.
Subj:Topical 650  0 $aComputer security$zUnited States.
Subj:Topical 650  0 $aComputer crimes$zUnited States.
Subj:Topical 650  0 $aInformation warfare$zUnited States.
Subj:Topical 650  0 $aNational security$zUnited States.
Subj:Topical 650  0 $aCyberterrorism$xPrevention.
Subj:Topical 650  0 $aInternet in espionage.
Subj:Topical 650  0 $aEspionage$zUnited States.
AE:Pers Name 700 $aGraff, Garrett M.,$d1981-$eauthor.