000 | 03013cam a2200457 i 4500 | ||
---|---|---|---|
001 | 19691388 | ||
003 | BJBSDDR | ||
005 | 20250609121115.0 | ||
007 | ta | ||
008 | 170601s2017 uk b 001 0 eng d | ||
010 | _a 2017944412 | ||
020 |
_a9780300227444 _q(hardcover : alk. paper) |
||
020 |
_a0300227442 _q(hardcover) |
||
035 | _a(OCoLC)ocn982652181 | ||
040 |
_aBTCTA _beng _cBTCTA _erda _dBDX _dYDX _dDKC _dCNEDM _dVP@ _dGL4 _dHTM _dOCLCF _dA7U _dUCW _dIOJ _dTFW _dOCLCA _dJBG _dPAU _dRIU _dOCP _dGZM _dMCW _dK6U _dUPM _dLSH _dUMC _dNZAUC _dWTU _dCSAIL _dNDD _dIUL _dXFF _dMLY _dBCD _dINO _dCOD _dZLM _dDLC |
||
041 | _aeng | ||
042 | _alccopycat | ||
050 | 0 | 0 |
_aK3264.C65 _bL253l 2017 |
082 | 0 | 4 |
_a364.16/8 _223 |
100 | 1 |
_aLandau, Susan Eva _eauthor. _942601 |
|
245 | 1 | 0 |
_aListening in : _bcybersecurity in an insecure age / _cSusan Landau. |
264 | 1 |
_aNew Haven : _bYale University Press, _c[2017]. |
|
300 |
_axiv, 221 pages ; _c22 cm. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
504 | _aIncludes bibliographical references (pages 173-207) and index. | ||
505 | 0 | _aRacing into the digital revolution -- We're all connected now -- Dangers lurking within -- How do we protect ourselves? -- Investigations in the age of encryption -- There's no turning back. | |
520 | _a"New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country's electricity--and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age."--Inside dust jacket. | ||
650 | 0 |
_aData encryption (Computer science) _xLaw and legislation. |
|
650 | 0 |
_aComputer networks _xSecurity measures _xGovernment policy. |
|
650 | 0 | _aComputer security. | |
650 | 7 |
_aComputer networks _xSecurity measures _xGovernment policy. _2fast _0(OCoLC)fst00872344 |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
650 | 7 |
_aData encryption (Computer science) _xLaw and legislation. _2fast _0(OCoLC)fst00887937 |
|
906 |
_a7 _bcbc _ccopycat _d2 _eepcn _f20 _gy-gencatlg |
||
942 |
_2lcc _cBK _n0 |
||
946 | _idpf | ||
999 |
_c123804 _d123804 |