Hacker and the state cyber attacks and the new normal of geopolitics
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- 9780674987555
- 005.87 23 BU-H
![](/opac-tmpl/bootstrap/itemtypeimg/bridge/book.png)
Item type | Home library | Collection | Shelving location | Call number | Materials specified | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
OPJGU Sonepat- Campus | General Books | Main Library | 005.87 BU-H (Browse shelf(Opens below)) | Available | 144120 |
Includes bibliographical references and index.
Part one. Espionage: Exploiting home-field advantage -- Defeating encryption -- Building a backdoor -- Strategic espionage -- Counterintelligence -- Part two. Attack: Strategic sabotage -- Targeted disruption -- Coercion -- Testing and demonstration -- Part three. Destabilization: Election interference -- Exposure -- Theft, ransom, and manipulation -- Widespread disruption.
"The threat of cyberwar can feel like something out of a movie: nuclear codes hacked, powerplants melting down, immediate crisis. In reality, state-sponsored hacking looks nothing like this. It's covert, insidious, and constant. Ben Buchanan reveals the cyberwar that's already here, reshaping the global contest for geopolitical advantage"--
There are no comments on this title.