000 | 03047cam a2200469 i 4500 | ||
---|---|---|---|
999 |
_c118038 _d118038 |
||
003 | BJBSDDR | ||
005 | 20230411090857.0 | ||
007 | ta | ||
008 | 170124s2017 nyu b 001 0 eng d | ||
020 | _a9781681771540 | ||
020 | _a1681771543 | ||
035 | _a(OCoLC)ocn923794325 | ||
040 |
_aBTCTA _beng _cBTCTA |
||
041 | _aeng | ||
042 | _alccopycat | ||
050 | 1 | 4 |
_aHV 6773 _bC797c 2017 |
082 | 0 | 0 | _a327.120285/4678 |
100 | 1 |
_aCorera, Gordon, _d1974- |
|
245 | 1 | 0 |
_aCyberspies : _bthe secret history of surveillance, hacking, and digital espionage / _cGordon Corera. |
246 | 3 | 4 | _aCyber spies |
250 | _aFirst Pegasus Books paperback edition. | ||
264 | 1 |
_aNew York : _bPegasus Books, _c2017. |
|
300 |
_axi, 431 pages ; _c23 cm |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
504 | _aIncludes bibliographical references (pages 393-420) and index. | ||
505 | 0 | _aBirth -- Marriage -- Into the cold -- Coming of age -- Spy-hunting -- Crypto wars -- Attack -- Enter the KGB -- Out of the cold and into cyberspace -- Titan rain -- In the wires -- Britain and the cyber spies -- Dissent -- Sabotage -- The lights go off -- Rebirth: cables -- Britain -- Exposure -- Epilogue: To infinity and beyond. | |
520 | _aReveals the history of espionage and its use of and dependency on technology, beginning with the Second World War and continuing through the Cold War and into the present Internet age where hackers and surveillance are commonplace. | ||
520 | _aThe intertwining forces of computers and espionage are reshaping the entire world: what was once the preserve of a few intelligence agencies now affects us all. BBC security correspondent Gordon Corera's narrative takes us through the Cold War and the birth of the Internet to the present era of hackers and surveillance. The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Corera has gathered compelling stories from heads of state, hackers, and spies of all stripes into a groundbreaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.--Adapted from dust jacket. | ||
650 | 0 |
_aComputer crimes _xPrevention. |
|
650 | 4 |
_aDelitos por computador _xPrevención _97693 |
|
650 | 0 |
_aDelitos informáticos _xPrevención _926833 |
|
650 | 0 | _aInternet in espionage. | |
650 | 0 | _aData protection. | |
650 | 4 |
_aProtección de datos _913125 |
|
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 4 |
_aRedes de computadores _xMedidas de seguridad _94986 |
|
906 |
_a7 _bcbc _ccopycat _d2 _encip _f20 _gy-gencatlg |
||
942 |
_2lcc _cBK |