The hacker and the state : (Record no. 90564)

MARC details
000 -LEADER
fixed length control field 03572cam a2200409 i 4500
001 - CONTROL NUMBER
control field on1141930618
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240726105139.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200227t20202020mau ob 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency YDX
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency YDX
Modifying agency OCLCO
-- NT
-- EBLCP
-- TEFOD
-- UKAHL
-- TOH
-- DEGRU
-- IBI
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780674246010
Qualifying information
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780674245983
Qualifying information
050 04 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76
Item number .H335 2020
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Buchanan, Ben
Titles and words associated with a name (Writer on cybersecurity),
Relator term Author
245 10 - TITLE STATEMENT
Title The hacker and the state :
Remainder of title cyber attacks and the new normal of geopolitics /
Statement of responsibility, etc. Ben Buchanan.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Cambridge, Massachusetts :
Name of publisher, distributor, etc. Harvard University Press,
Date of publication, distribution, etc. (c)2020.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (412 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type data file
Source rda
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographies and index.
505 00 - FORMATTED CONTENTS NOTE
Formatted contents note Part one. Espionage: Exploiting home-field advantage --
Title Defeating encryption --
-- Building a backdoor --
-- Strategic espionage --
-- Counterintelligence --
-- Part two. Attack: Strategic sabotage --
-- Targeted disruption --
-- Coercion --
-- Testing and demonstration --
-- Part three. Destabilization: Election interference --
-- Exposure --
-- Theft, ransom, and manipulation --
-- Widespread disruption.
520 0# - SUMMARY, ETC.
Summary, etc. Ever since WarGames, we have been bracing for the cyberwar to come, conjuring images of exploding power plants and mass panic. But while cyber attacks are now disturbingly common, they don't look anything like we thought they would. Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. His analysis moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to billion-dollar heists and election interference. Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. He explains why cyber attacks are far less destructive than we anticipated, far more pervasive, and much harder to prevent. With little fanfare and far less scrutiny, they impact our banks, our tech and health systems, our democracy, and every aspect of our lives. Quietly, insidiously, they have reshaped our national-security priorities and transformed spycraft and statecraft. The contest for geopolitical advantage has moved into cyberspace. The United States and its allies can no longer dominate the way they once did. The nation that hacks best will triumph.
530 ## - COPYRIGHT INFORMATION:
COPYRIGHT INFORMATION COPYRIGHT NOT covered - Click this link to request copyright permission:
Uniform Resource Identifier <a href="b">b</a>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyber intelligence (Computer security)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hacking
General subdivision Political aspects.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberterrorism.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberspace operations (Military science)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberspace
General subdivision Political aspects.
655 #1 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic Books.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2378565&site=eds-live&custid=s3260518">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2378565&site=eds-live&custid=s3260518</a>
-- Click to access digital title | log in using your CIU ID number and my.ciu.edu password
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)
DONATED BY:
VENDOR EBSCO
Classification part QA..
PUBLICATION YEAR 2020
LOCATION ONLINE
REQUESTED BY:
--
-- NFIC
Source of classification or shelving scheme
994 ## -
-- 92
-- NT
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN)
a 1
b Cynthia Snell
c 1
d Cynthia Snell
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Uniform Resource Identifier Price effective from Koha item type
        Non-fiction G. Allen Fleece Library G. Allen Fleece Library ONLINE 07/07/2023 EBSCO   QA76.9.25 on1141930618 07/07/2023 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2378565&site=eds-live&custid=s3260518 07/07/2023 Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)