ISBN |
9780674987555 hardcover |
|
0674987551 hardcover |
Standard number |
40029762133 |
Note |
Includes bibliographical references and index |
Contents |
Part one. Espionage: Exploiting home-field advantage -- Defeating encryption -- Building a backdoor -- Strategic espionage -- Counterintelligence -- Part two. Attack: Strategic sabotage -- Targeted disruption -- Coercion -- Testing and demonstration -- Part three. Destabilization: Election interference -- Exposure -- Theft, ransom, and manipulation -- Widespread disruption |
Note |
"The threat of cyberwar can feel like something out of a movie: nuclear codes hacked, powerplants melting down, immediate crisis. In reality, state-sponsored hacking looks nothing like this. It's covert, insidious, and constant. Ben Buchanan reveals the cyberwar that's already here, reshaping the global contest for geopolitical advantage"-- Provided by publisher |
Subject |
küberluure
|
|
küberterrorism
|
|
kübersõda
|
|
poliitilised aspektid
|
More terms |
Cyber intelligence (Computer security) |
|
Hacking -- Political aspects |
|
Cyberterrorism |
|
Cyberspace operations (Military science) |
|
Cyberspace -- Political aspects |
|