Cyberspies : the secret history of surveillance, hacking, and digital espionage / Gordon Corera.
- 4 of 5 copies available at Evergreen Indiana.
0 current holds with 5 total copies.
|Location||Call Number / Copy Notes||Barcode||Shelving Location||Status||Due Date|
|Greenwood Public Library - Greenwood||327.12 COR (Text)||36626103763025||New Adult Nonfiction||Available||-|
|Hussey-Mayfield Memorial Branch||327.12 CORERA (Text)||33946003118390||New Books . 2nd Floor||Checked out||10/27/2016|
|Lebanon Public Library - Lebanon||327.12 COR (Text)||34330512993388||Adult - Non-Fiction||Available||-|
|Mooresville Public Library - Mooresville||327.12 COR (Text)||37323005273134||NONFIC||Available||-|
|Peabody Public Library - Columbia City||LEASED NON-FICTION 327.12 CORERA (Text)||30403002187920||Adult - Non-Fiction Bestseller||Available||-|
- ISBN: 9781681771540
- ISBN: 1681771543
- Physical Description: xi, 431 pages ; 24 cm
- Edition: First Pegasus Books hardcover edition.
- Publisher: New York : Pegasus Books, 2016.
- Copyright: ©2015
|Bibliography, etc. Note:|| Includes bibliographical references (pages 393-420) and index.
|Formatted Contents Note:|| Birth -- Marriage -- Into the cold -- Coming of age -- Spy-hunting -- Crypto wars -- Attack -- Enter the KGB -- Out of the cold and into cyberspace -- Titan rain -- In the wires -- Britain and the cyber spies -- Dissent -- Sabotage -- The lights go off -- Rebirth: cables -- Britain -- Exposure -- Epilogue: To infinity and beyond.
|Summary, etc.:|| Reveals the history of espionage and its use of and dependency on technology, beginning with the Second World War and continuing through the Cold War and into the present Internet age where hackers and surveillance are commonplace.
The intertwining forces of computers and espionage are reshaping the entire world: what was once the preserve of a few intelligence agencies now affects us all. BBC security correspondent Gordon Corera's narrative takes us through the Cold War and the birth of the Internet to the present era of hackers and surveillance. The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Corera has gathered compelling stories from heads of state, hackers, and spies of all stripes into a groundbreaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.--Adapted from dust jacket.
Search for related items by subject
Computer crimes >
Internet in espionage.
Computer networks > Security measures.