Cargando…

The hacker and the state : cyber attacks and the new normal of geopolitics /

Ever since WarGames, we have been bracing for the cyberwar to come, conjuring images of exploding power plants and mass panic. But while cyber attacks are now disturbingly common, they don't look anything like we thought they would. Packed with insider information based on interviews, declassif...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Buchanan, Ben (Writer on cybersecurity) (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cambridge, Massachusetts : Harvard University Press, 2020.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 JSTOR_on1141930618
003 OCoLC
005 20231005004200.0
006 m o d
007 cr |n|||||||||
008 200227t20202020mau ob 001 0 eng d
040 |a YDX  |b eng  |e rda  |e pn  |c YDX  |d OCLCO  |d N$T  |d EBLCP  |d TEFOD  |d UKAHL  |d TOH  |d DEGRU  |d IBI  |d OCLCO  |d TFW  |d OCLCO  |d JSTOR  |d OCLCQ  |d OCLCO 
019 |a 1142099190  |a 1158201743  |a 1162146202  |a 1176558763  |a 1191072740 
020 |a 9780674246010  |q (electronic bk.) 
020 |a 0674246012  |q (electronic bk.) 
020 |a 9780674245983  |q (electronic bk.) 
020 |a 0674245989  |q (electronic bk.) 
020 |a 9780674245990  |q (electronic bk.) 
020 |a 0674245997  |q (electronic bk.) 
020 |z 9780674987555  |q (hardcover) 
020 |z 0674987551  |q (hardcover) 
029 1 |a AU@  |b 000067253719 
029 1 |a AU@  |b 000066860199 
035 |a (OCoLC)1141930618  |z (OCoLC)1142099190  |z (OCoLC)1158201743  |z (OCoLC)1162146202  |z (OCoLC)1176558763  |z (OCoLC)1191072740 
037 |a EAE62516-D364-4666-A8B5-58CB87A01EAC  |b OverDrive, Inc.  |n http://www.overdrive.com 
037 |a 22573/ctv33z8rgf  |b JSTOR 
050 4 |a QA76.9.A25  |b B823 2020eb 
072 7 |a POL  |x 036000  |2 bisacsh 
072 7 |a POL  |x 012000  |2 bisacsh 
072 7 |a POL  |x 066000  |2 bisacsh 
072 7 |a HIS  |x 027060  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8/7  |2 23 
049 |a UAMI 
100 1 |a Buchanan, Ben  |c (Writer on cybersecurity),  |e author. 
245 1 4 |a The hacker and the state :  |b cyber attacks and the new normal of geopolitics /  |c Ben Buchanan. 
264 1 |a Cambridge, Massachusetts :  |b Harvard University Press,  |c 2020. 
264 4 |c Ã2020 
300 |a 1 online resource (412 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |2 rdamedia 
338 |a online resource  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Part one. Espionage: Exploiting home-field advantage -- Defeating encryption -- Building a backdoor -- Strategic espionage -- Counterintelligence -- Part two. Attack: Strategic sabotage -- Targeted disruption -- Coercion -- Testing and demonstration -- Part three. Destabilization: Election interference -- Exposure -- Theft, ransom, and manipulation -- Widespread disruption. 
520 |a Ever since WarGames, we have been bracing for the cyberwar to come, conjuring images of exploding power plants and mass panic. But while cyber attacks are now disturbingly common, they don't look anything like we thought they would. Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. His analysis moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to billion-dollar heists and election interference. Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. He explains why cyber attacks are far less destructive than we anticipated, far more pervasive, and much harder to prevent. With little fanfare and far less scrutiny, they impact our banks, our tech and health systems, our democracy, and every aspect of our lives. Quietly, insidiously, they have reshaped our national-security priorities and transformed spycraft and statecraft. The contest for geopolitical advantage has moved into cyberspace. The United States and its allies can no longer dominate the way they once did. The nation that hacks best will triumph. 
588 |a Description based on print version record. 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a JSTOR  |b Books at JSTOR All Purchased 
650 0 |a Cyber intelligence (Computer security) 
650 0 |a Hacking  |x Political aspects. 
650 0 |a Cyberterrorism. 
650 0 |a Cyberspace operations (Military science) 
650 0 |a Cyberspace  |x Political aspects. 
650 6 |a Surveillance des menaces informatiques. 
650 6 |a Piratage informatique  |x Aspect politique. 
650 6 |a Cyberterrorisme. 
650 6 |a Cyberguerre (Science militaire) 
650 6 |a Cyberespace  |x Aspect politique. 
650 7 |a POLITICAL SCIENCE / Intelligence & Espionage.  |2 bisacsh 
650 7 |a Cyber intelligence (Computer security)  |2 fast 
650 7 |a Cyberspace operations (Military science)  |2 fast 
650 7 |a Cyberspace  |x Political aspects  |2 fast 
650 7 |a Cyberterrorism  |2 fast 
776 0 8 |i Print version:  |a Buchanan, Ben (Writer on cybersecurity).  |t Hacker and the state.  |d Cambridge, Massachusetts : Harvard University Press, 2020  |z 9780674987555  |w (DLC) 2019033274  |w (OCoLC)1112264305 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctv3405w2m  |z Texto completo 
938 |a De Gruyter  |b DEGR  |n 9780674246010 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37294106 
938 |a YBP Library Services  |b YANK  |n 301119732 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6119381 
938 |a EBSCOhost  |b EBSC  |n 2378565 
994 |a 92  |b IZTAP