Hacker and the state cyber attacks and the new normal of geopolitics
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- 9780674987555
- 005.87 23 BU-H
![](/opac-tmpl/bootstrap/itemtypeimg/bridge/book.png)
Item type | Home library | Collection | Shelving location | Call number | Materials specified | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
OPJGU Sonepat- Campus | General Books | Main Library | 005.87 BU-H (Browse shelf(Opens below)) | Available | 144120 |
Browsing OPJGU Sonepat- Campus shelves, Collection: General Books Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.8 VE-C Cybersecurity analytics | 005.803 ME-C The cybersecurity to English dictionary / | 005.8076 CH-I (ISC)2 CISSP certified information systems security professional : official study guide / | 005.87 BU-H Hacker and the state cyber attacks and the new normal of geopolitics | 006.3 AL-G Google analytics breakthrough from zero to business impact | 006.3 AR- Artificial intelligence and network security | 006.3 DE- Deep learning / |
Includes bibliographical references and index.
Part one. Espionage: Exploiting home-field advantage -- Defeating encryption -- Building a backdoor -- Strategic espionage -- Counterintelligence -- Part two. Attack: Strategic sabotage -- Targeted disruption -- Coercion -- Testing and demonstration -- Part three. Destabilization: Election interference -- Exposure -- Theft, ransom, and manipulation -- Widespread disruption.
"The threat of cyberwar can feel like something out of a movie: nuclear codes hacked, powerplants melting down, immediate crisis. In reality, state-sponsored hacking looks nothing like this. It's covert, insidious, and constant. Ben Buchanan reveals the cyberwar that's already here, reshaping the global contest for geopolitical advantage"--
There are no comments on this title.