|
|
|
|
Leader |
LDR
|
|
pam i 00 |
Control # |
1
|
|
2018020918 |
Control # Id |
3
|
|
DLC |
Date |
5
|
|
20191014094432.0 |
Fixed Data |
8
|
|
180609s2018 nyu b 001 0 eng |
LC Card |
10
|
|
$a 2018020918 |
ISBN |
20
|
|
$a9781541773837$q(hardcover) |
Obsolete |
39
|
|
$a314609$cTLC |
Cat. Source |
40
|
|
$aDLC$beng$erda$cDLC$dDLC$dGCG |
Authen. Ctr. |
42
|
|
$apcc |
Geog. Area |
43
|
|
$an-us--- |
LC Call |
50
|
00 |
$aU167.5.C92$bC37 2018 |
Dewey Class |
82
|
00 |
$a327.1273047$223 |
ME:Pers Name |
100
|
1 |
$aCarlin, John P.,$d1973-$eauthor. |
Title |
245
|
14 |
$aThe dawn of the code war :$bAmerica's battle against Russia, China, and the rising global cyber threat /$cJohn P. Carlin with Garrett M. Graff. |
Edition |
250
|
|
$aFirst edition. |
Tag 264 |
264
|
1 |
$aNew York :$bPublicAffairs,$c2018. |
Phys Descrpt |
300
|
|
$avii, 464 pages ;$c25 cm |
Tag 336 |
336
|
|
$atext$btxt$2rdacontent |
Tag 337 |
337
|
|
$aunmediated$bn$2rdamedia |
Tag 338 |
338
|
|
$avolume$bnc$2rdacarrier |
Note:Bibliog |
504
|
|
$aIncludes bibliographical references and index. |
Note:Content |
505
|
0 |
$aForeword: TeaMp0isoN -- Introduction: The code war -- The rise of the hackers -- Comment Crew -- Operation Aurora -- Qassam cyber fighters -- APT1 -- Slavik -- The guardians of peace -- Black vine -- Fake news -- Epilogue: winning the code war. |
Abstract |
520
|
|
$a"Over the past decade, there has been a series of internet-linked attacks on American interests, including North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us. Former Assistant Attorney General John Carlin has been on the frontlines of America's ongoing cyber war with its enemies. In this dramatic book, he tells the story of his years-long secret battle to keep America safe, and warns us of the perils that await us as we embrace the latest digital novelties -- smart appliances, artificial intelligence, self-driving cars -- with little regard for how our enemies might compromise them. The potential targets for our enemies are multiplying: our electrical grid, our companies, our information sources, our satellites. As each sector of the economy goes digital, a new vulnerability is exposed. The Internet of Broken Things is not merely a cautionary tale, though. It makes the urgent case that we need to start innovating more responsibly. As a fleet of web-connected cars and pacemakers rolls off the assembly lines, the potential for danger is overwhelming. We must see and correct these flaws before our enemies exploit them."--Provided by publisher. |
Subj:Topical |
650
|
0 |
$aCyberspace operations (Military science)$zUnited States. |
Subj:Topical |
650
|
0 |
$aCyberterrorism$xHistory. |
Subj:Topical |
650
|
0 |
$aCyberspace$xSecurity measures$xHistory. |
Subj:Topical |
650
|
0 |
$aComputer security$zUnited States. |
Subj:Topical |
650
|
0 |
$aComputer crimes$zUnited States. |
Subj:Topical |
650
|
0 |
$aInformation warfare$zUnited States. |
Subj:Topical |
650
|
0 |
$aNational security$zUnited States. |
Subj:Topical |
650
|
0 |
$aCyberterrorism$xPrevention. |
Subj:Topical |
650
|
0 |
$aInternet in espionage. |
Subj:Topical |
650
|
0 |
$aEspionage$zUnited States. |
AE:Pers Name |
700
|
1 |
$aGraff, Garrett M.,$d1981-$eauthor. |