000 | 02715cam a2200373 i 4500 | ||
---|---|---|---|
001 | 2017944412 | ||
003 | DLC | ||
005 | 20190524125240.0 | ||
008 | 170601s2017 xxk b 001 0 eng d | ||
010 | _a 2017944412 | ||
020 |
_a9780300227444 _q(hardcover : alk. paper) |
||
020 |
_a0300227442 _q(hardcover) |
||
035 | _a(OCoLC)ocn982652181 | ||
042 | _alccopycat | ||
040 |
_aBTCTA _beng _erda _cBTCTA _dBDX _dYDX _dDKC _dCNEDM _dVP@ _dGL4 _dHTM _dOCLCF _dA7U _dUCW _dIOJ _dTFW _dOCLCA _dJBG _dPAU _dRIU _dOCP _dGZM _dMCW _dK6U _dUPM _dLSH _dUMC _dNZAUC _dWTU _dCSAIL _dNDD _dIUL _dXFF _dMLY _dBCD _dINO _dCOD _dZLM _dDLC |
||
050 | 0 | 0 |
_aK3264.C65 _bL36 2017 |
082 | 0 | 4 |
_a364.16/8 _223 |
100 | 1 | _aLandau, Susan Eva, | |
245 | 1 | 0 |
_aListening in : _bcybersecurity in an insecure age / _cSusan Landau. |
264 | 1 |
_aNew Haven : _bYale University Press, _c[2017] |
|
300 |
_axiv, 221 pages ; _c22 cm |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
504 | _aIncludes bibliographical references (pages 173-207) and index. | ||
505 | 0 | _aRacing into the digital revolution -- We're all connected now -- Dangers lurking within -- How do we protect ourselves? -- Investigations in the age of encryption -- There's no turning back. | |
520 | _a"New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country's electricity--and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age."--Inside dust jacket. | ||
650 | 0 |
_aData encryption (Computer science) _xLaw and legislation. |
|
650 | 0 |
_aComputer networks _xSecurity measures _xGovernment policy. |
|
650 | 0 | _aComputer security. | |
650 | 7 |
_aComputer networks _xSecurity measures _xGovernment policy. _2fast _0(OCoLC)fst00872344 |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
650 | 7 |
_aData encryption (Computer science) _xLaw and legislation. _2fast _0(OCoLC)fst00887937 |
|
999 |
_c233175 _d233175 |