|
|
|
|
LEADER |
00000cam a22000003i 4500 |
001 |
EBOOKCENTRAL_ocn879371655 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
140508s2014 xx o 000 0 eng d |
040 |
|
|
|a VALIL
|b eng
|e rda
|e pn
|c VALIL
|d TEF
|d OCLCO
|d TEF
|d EBLCP
|d YDXCP
|d N$T
|d TEFOD
|d AGLDB
|d MERUC
|d OCLCA
|d OCLCF
|d OCLCQ
|d VTS
|d OCLCQ
|d OCLCO
|d STF
|d M8D
|d UKAHL
|d OCLCQ
|d AJS
|d INARC
|d OCLCO
|d OCL
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 881415762
|a 900218896
|a 927103667
|
020 |
|
|
|a 9781937584818
|q (electronic bk.)
|
020 |
|
|
|a 193758481X
|q (electronic bk.)
|
020 |
|
|
|z 9781937584801
|
020 |
|
|
|z 1937584801
|q (print)
|
029 |
1 |
|
|a AU@
|b 000055975151
|
035 |
|
|
|a (OCoLC)879371655
|z (OCoLC)881415762
|z (OCoLC)900218896
|z (OCoLC)927103667
|
037 |
|
|
|a 6A249386-5EBA-4F81-B8D6-80346777DD87
|b OverDrive, Inc.
|n http://www.overdrive.com
|
043 |
|
|
|a n-us---
|
050 |
|
4 |
|a UA23
|b .B586 2014
|
072 |
|
7 |
|a SOC
|x 000000
|2 bisacsh
|
082 |
0 |
4 |
|a 303.625
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Blunden, Bill.
|
245 |
1 |
0 |
|a Behold a Pale Farce :
|b Cyberwar, Threat Inflation, & the Malware Industrial Complex.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Trine Day,
|c 2014.
|
300 |
|
|
|a 1 online resource (456 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a This book presents a data-driven message that exposes the cyberwar media campaign being directed by the Pentagon and its patronage networks. By demonstrating that the American public is being coerced by a threat that has been blown out of proportion--much like the run-up to the Gulf War or the global war on terror--this book discusses how the notion of cyberwar instills a crisis mentality that discourages formal risk assessment, making the public anxious and hence susceptible to ill-conceived solutions. With content that challenges conventional notions regarding cyber security, Behold a Pale Farce covers topics--including cybercrime; modern espionage; mass-surveillance systems; and the threats facing infrastructure targets such as the Federal Reserve, the stock exchange, and telecommunications--in a way that provides objective analysis rather than advocacy. This book is a must-read for anyone concerned with the recent emergence of Orwellian tools of mass interception that have developed under the guise of national security.
|
505 |
0 |
|
|a CoverImage; Title Page; Copyright page; Dedication; Epigraph; Table of Contents; Media Massage; Firsthand Experience; The Public Relations Industry; Behold a Pale Farce; Organization; Acknowledgments; The Wonder of it All; Part I -- Rampant Hyperbole; A Backdrop of Metaphors; Never Mind: False Alarm; The Madness of Crowds; An Electronic Pearl Harbor; A Cyber-Katrina; The Hiroshima of Cyberwar; A Cyber 9/11; Dissenting Voices; The Executive Responds; Stuxnet; Plan X; Presidential Policy Directive 20; Hacking Foreign Targets for Years; Oz the Great and Powerful; Our Frenemy in Asia.
|
505 |
8 |
|
|a A Plurality of ActorsRule of Law Breaks Down; The Internet's Frontier Town; Opposing Models for Reform; The Extent of China's Capabilities; Joined at the Hip; Both Sides Keep the Other in Business; The #1 Threat to Economic Security?; Cyberwar as a Misdiagnosis; Dialing 911; Looking Ahead; Part II -- A Series of Unfortunate Events; Cybercrime; The Ecosystem; A Snapshot of Cybercrime; The TJX Hack; The Heartland Payment Systems Breach; The DarkMarket Sting; The RBS WorldPay Attack; The Return of the Analyzer; The Ballad of Max Butler; Sony under Siege; The FIS Breach; The Big Picture.
|
505 |
8 |
|
|a The Punch LineEspionage; Moonlight Maze; Titan Rain; Operation Byzantine Hades; GhostNet; Joint Strike Fighter Breach; Operation Aurora; Shadows in the Cloud; Night Dragon; RSA and SecurID; Operation Shady RAT; The Nitro Attacks; Targeting Certificate Authorities; Operation Red October; Patterns Emerge; The Scope of U.S. Espionage; The Malware-Industrial Complex; Independent Operators; Spies Abound ... ; But Some Groups Spy More Than Others; The Infrastructure; The Financial System; The Power Grid; The Telecoms; Aerospace; The Internet: Denial of Service Attacks; McAfee.
|
505 |
8 |
|
|a The Internet: Manipulating TrafficThreat Inflation; Conflicts of Interest; Part III -- The Futility of Offensive Solutions; The Quandary of Attribution; Achieving Anonymity Online; The Origins of Tor; The Folly of Attribution; Deterrence; Arms Control Treaties; Shades of Orwell; The Golden Age of Surveillance; The NSA's MUSCULAR project; Opting Into Surveillance; The DHS Monitors Social Media; Corporate Compliance; The Hemisphere Project; A Global Panopticon; Coda: Extorting Privacy; Part IV -- The Road to Cyber-Security; The Origins of Cyber-Insecurity; A Layered Perspective; Exciting Causes.
|
505 |
8 |
|
|a The Software DepressionPredisposing Causes; Remote Causes; Security for The 1%; Cyber-Security for The 99 Percent; Building Resilient Software; Echoes of Ken Thompson; International Cooperation; Managing Externalities; Catch-22; Strength in Numbers; The Hazards of a Misdiagnosis; Securitization In-Depth; Threat Inflation; The Folly of Deterrence; In Search of Enemies; American Hypocrisy; Subverting Attribution; Turning to Big Brother; Root Causes of Cyber-Insecurity; Cyber-Security for the 1%; Cyber-Security for the 99%; Index.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Information warfare.
|
650 |
|
0 |
|a Information warfare
|x Psychological aspects.
|
650 |
|
0 |
|a Computer security
|z United States.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|z United States.
|
650 |
|
0 |
|a Cyberspace
|x Security measures
|z United States.
|
650 |
|
0 |
|a Security, International.
|
650 |
|
6 |
|a Guerre de l'information.
|
650 |
|
6 |
|a Guerre de l'information
|x Aspect psychologique.
|
650 |
|
6 |
|a Sécurité informatique
|z États-Unis.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|z États-Unis.
|
650 |
|
7 |
|a SOCIAL SCIENCE
|x Conspiracy Theories.
|2 bisacsh
|
650 |
|
7 |
|a SOCIAL SCIENCE
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Cyberspace
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Information warfare
|2 fast
|
650 |
|
7 |
|a Security, International
|2 fast
|
651 |
|
7 |
|a United States
|2 fast
|1 https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq
|
758 |
|
|
|i has work:
|a Behold a pale farce (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGpfHbkbDvJqGvDdY8WRrq
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Blunden, Bill.
|t Behold a Pale Farce : Cyberwar, Threat Inflation, & the Malware Industrial Complex.
|d Chicago : Trine Day, ©2014
|z 9781937584801
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1681796
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26356365
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1681796
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1066256
|
938 |
|
|
|a Internet Archive
|b INAR
|n beholdpalefarcec0000blun
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11868849
|
994 |
|
|
|a 92
|b IZTAP
|