|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
JSTOR_on1141930618 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
200227t20202020mau ob 001 0 eng d |
040 |
|
|
|a YDX
|b eng
|e rda
|e pn
|c YDX
|d OCLCO
|d N$T
|d EBLCP
|d TEFOD
|d UKAHL
|d TOH
|d DEGRU
|d IBI
|d OCLCO
|d TFW
|d OCLCO
|d JSTOR
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1142099190
|a 1158201743
|a 1162146202
|a 1176558763
|a 1191072740
|
020 |
|
|
|a 9780674246010
|q (electronic bk.)
|
020 |
|
|
|a 0674246012
|q (electronic bk.)
|
020 |
|
|
|a 9780674245983
|q (electronic bk.)
|
020 |
|
|
|a 0674245989
|q (electronic bk.)
|
020 |
|
|
|a 9780674245990
|q (electronic bk.)
|
020 |
|
|
|a 0674245997
|q (electronic bk.)
|
020 |
|
|
|z 9780674987555
|q (hardcover)
|
020 |
|
|
|z 0674987551
|q (hardcover)
|
029 |
1 |
|
|a AU@
|b 000067253719
|
029 |
1 |
|
|a AU@
|b 000066860199
|
035 |
|
|
|a (OCoLC)1141930618
|z (OCoLC)1142099190
|z (OCoLC)1158201743
|z (OCoLC)1162146202
|z (OCoLC)1176558763
|z (OCoLC)1191072740
|
037 |
|
|
|a EAE62516-D364-4666-A8B5-58CB87A01EAC
|b OverDrive, Inc.
|n http://www.overdrive.com
|
037 |
|
|
|a 22573/ctv33z8rgf
|b JSTOR
|
050 |
|
4 |
|a QA76.9.A25
|b B823 2020eb
|
072 |
|
7 |
|a POL
|x 036000
|2 bisacsh
|
072 |
|
7 |
|a POL
|x 012000
|2 bisacsh
|
072 |
|
7 |
|a POL
|x 066000
|2 bisacsh
|
072 |
|
7 |
|a HIS
|x 027060
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8/7
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Buchanan, Ben
|c (Writer on cybersecurity),
|e author.
|
245 |
1 |
4 |
|a The hacker and the state :
|b cyber attacks and the new normal of geopolitics /
|c Ben Buchanan.
|
264 |
|
1 |
|a Cambridge, Massachusetts :
|b Harvard University Press,
|c 2020.
|
264 |
|
4 |
|c Ã2020
|
300 |
|
|
|a 1 online resource (412 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Part one. Espionage: Exploiting home-field advantage -- Defeating encryption -- Building a backdoor -- Strategic espionage -- Counterintelligence -- Part two. Attack: Strategic sabotage -- Targeted disruption -- Coercion -- Testing and demonstration -- Part three. Destabilization: Election interference -- Exposure -- Theft, ransom, and manipulation -- Widespread disruption.
|
520 |
|
|
|a Ever since WarGames, we have been bracing for the cyberwar to come, conjuring images of exploding power plants and mass panic. But while cyber attacks are now disturbingly common, they don't look anything like we thought they would. Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. His analysis moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to billion-dollar heists and election interference. Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. He explains why cyber attacks are far less destructive than we anticipated, far more pervasive, and much harder to prevent. With little fanfare and far less scrutiny, they impact our banks, our tech and health systems, our democracy, and every aspect of our lives. Quietly, insidiously, they have reshaped our national-security priorities and transformed spycraft and statecraft. The contest for geopolitical advantage has moved into cyberspace. The United States and its allies can no longer dominate the way they once did. The nation that hacks best will triumph.
|
588 |
|
|
|a Description based on print version record.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
650 |
|
0 |
|a Cyber intelligence (Computer security)
|
650 |
|
0 |
|a Hacking
|x Political aspects.
|
650 |
|
0 |
|a Cyberterrorism.
|
650 |
|
0 |
|a Cyberspace operations (Military science)
|
650 |
|
0 |
|a Cyberspace
|x Political aspects.
|
650 |
|
6 |
|a Surveillance des menaces informatiques.
|
650 |
|
6 |
|a Piratage informatique
|x Aspect politique.
|
650 |
|
6 |
|a Cyberterrorisme.
|
650 |
|
6 |
|a Cyberguerre (Science militaire)
|
650 |
|
6 |
|a Cyberespace
|x Aspect politique.
|
650 |
|
7 |
|a POLITICAL SCIENCE / Intelligence & Espionage.
|2 bisacsh
|
650 |
|
7 |
|a Cyber intelligence (Computer security)
|2 fast
|
650 |
|
7 |
|a Cyberspace operations (Military science)
|2 fast
|
650 |
|
7 |
|a Cyberspace
|x Political aspects
|2 fast
|
650 |
|
7 |
|a Cyberterrorism
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Buchanan, Ben (Writer on cybersecurity).
|t Hacker and the state.
|d Cambridge, Massachusetts : Harvard University Press, 2020
|z 9780674987555
|w (DLC) 2019033274
|w (OCoLC)1112264305
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctv3405w2m
|z Texto completo
|
938 |
|
|
|a De Gruyter
|b DEGR
|n 9780674246010
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37294106
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 301119732
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6119381
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2378565
|
994 |
|
|
|a 92
|b IZTAP
|