Includes bibliographical references (pages 203-238) and index.
Contents:
Root kit -- Buffer overflow: the space and time of cyberwar -- Injection attack: writing and the information catastrophe -- Distributed denial of service: cybernetic sovereignty -- Spear phishing: nodal subjects -- Firmware vulnerabilities.
This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.