Cyberspies : the secret history of surveillance, hacking, and digital espionage / Gordon Corera.
- 14 of 14 copies available at NC Cardinal.
0 current holds with 14 total copies.
|Location||Call Number / Copy Notes||Barcode||Shelving Location||Status||Due Date|
|Pack Memorial Library||327.120285 COR (Text)||0020511152363||Adult Nonfiction||Available||-|
|Reynolda Manor Branch||327.12 C (Text)||0112520807178||Adult Nonfiction||Available||-|
|Troutman Branch Library||327.120285 COR (Text)||33114017754094||Adult Nonfiction||Available||-|
|West Regional Library||327.1202 C (Text)||31781063542698||Adult Nonfiction||Available||-|
|« Previous 10|
- ISBN: 9781681771540
- ISBN: 1681771543
- Physical Description: xi, 431 pages ; 24 cm
- Edition: First Pegasus Books hardcover edition.
- Publisher: New York : Pegasus Books, 2016.
- Copyright: ©2015
|Bibliography, etc. Note:|| Includes bibliographical references (pages -420) and index.
|Formatted Contents Note:|| Birth -- Marriage -- Into the cold -- Coming of age -- Spy-hunting -- Crypto wars -- Attack -- Enter the KGB -- Out of the cold and into cyberspace -- Titan rain -- In the wires -- Britain and the cyber spies -- Dissent -- Sabotage -- The lights go off -- Rebirth: cables -- Britain -- Exposure -- Epilogue: To infinity and beyond.
|Summary, etc.:|| The intertwining forces of computers and espionage are reshaping the entire world: what was once the preserve of a few intelligence agencies now affects us all. BBC security correspondent Gordon Corera's narrative takes us through the Cold War and the birth of the Internet to the present era of hackers and surveillance. The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Corera has gathered compelling stories from heads of state, hackers, and spies of all stripes into a groundbreaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.--Adapted from dust jacket.
Search for related items by subject
|Subject:||Computer crimes > Prevention.
Internet in espionage.
Computer networks > Security measures.