The hacker and the state: cyber attacks and the new normal of geopolitics
Part one. Espionage: Exploiting home-field advantage -- Defeating encryption -- Building a backdoor -- Strategic espionage -- Counterintelligence -- Part two. Attack: Strategic sabotage -- Targeted disruption -- Coercion -- Testing and demonstration -- Part three. Destabilization: Election interfere...
Autor principal: | |
---|---|
Tipo de documento: | Print Libro |
Lenguaje: | Inglés |
Publicado: |
Cambridge, Massachusetts London, England
Harvard University Press
2020
|
En: | Año: 2020 |
Acceso en línea: |
Table of Contents (Aggregator) |
Verificar disponibilidad: | HBZ Gateway |
Servicio de pedido Subito: | Pedir ahora. |
Palabras clave: |