The Locator -- [(subject = "Internet in espionage")]

20 records matched your query       


Record 11 | Previous Record | Long Display | Next Record
02993aam a2200421Ii 4500
001 44033922F50B11E7A6193F6E97128E48
003 SILO
005 20180109010327
008 170829t20172015nyu      b    001 0 eng d
010    $a 2016498084
020    $a 9781681774596
020    $a 1681774593
035    $a (OCoLC)1002128514
040    $a WSL $b eng $c WSL $d YDX $d BDX $d OCLCF $d OCLCQ $d OCLCA $d CDX $d JIM $d SILO
050 04 $a HV6773 $b .C66 2017
082 04 $a 327.120285/4678 $2 23
100 1  $a Corera, Gordon, $e author.
245 10 $a Cyber spies : $b the secret history of surveillance, hacking, and digital espionage / $c Gordon Corera.
246 18 $a Cyberspies
250    $a First Pegasus books paperback edition.
264  1 $a New York : $b Pegasus Books, $c 2017.
300    $a xi, 431 pages ; $c 21 cm
520    $a The history of espionage and its use of and dependency on technology, beginning with the Second World War and continuing through the Cold War and into the present Internet age where hackers and surveillance are commonplace.
520    $a The intertwining forces of computers and espionage are reshaping the entire world: what was once the preserve of a few intelligence agencies now affects us all. BBC security correspondent Gordon Corera's narrative takes us through the Cold War and the birth of the Internet to the present era of hackers and surveillance. The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Corera has gathered compelling stories from heads of state, hackers, and spies of all stripes into a groundbreaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.--Adapted from cover.
505 0  $a Birth -- Marriage -- Into the cold -- Coming of age -- Spy-hunting -- Crypto wars -- Attack -- Enter the KGB -- Out of the cold and into cyberspace -- Titan rain -- In the wires -- Britain and the cyber spies -- Dissent -- Sabotage -- The lights go off -- Rebirth: cables -- Britain -- Exposure -- Epilogue: To infinity and beyond.
504    $a Includes bibliographical references (pages 393-420) and index.
650  0 $a Computer crimes $x Prevention.
650  0 $a Internet in espionage.
650  0 $a Data protection.
650  0 $a Computer networks $x Security measures.
650  7 $a Computer crimes $x Prevention. $2 fast $0 (OCoLC)fst00872068
650  7 $a Computer networks $x Security measures. $2 fast $0 (OCoLC)fst00872341
650  7 $a Data protection. $2 fast $0 (OCoLC)fst00887958
650  7 $a Internet in espionage. $2 fast $0 (OCoLC)fst01739358
941    $a 1
952    $l GOPG641 $d 20240409030711.0
956    $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=44033922F50B11E7A6193F6E97128E48
994    $a C0 $b JIM

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.