소장자료
LDR | 04478nam a2200457 a 4500 | ||
001 | 0093134941▲ | ||
003 | DLC▲ | ||
005 | 20180519072306▲ | ||
008 | 140911s2014 nyu b 001 0 eng c▲ | ||
010 | ▼a2014016640▲ | ||
020 | ▼a9780770436179 (hardback)▲ | ||
020 | ▼a9780770436193 (paperback)▲ | ||
020 | ▼z9780770436186 (e-book)▲ | ||
040 | ▼aDLC▼beng▼cDLC▲ | ||
042 | ▼apcc▲ | ||
043 | ▼an-us---▼aa-is---▼aa-ir---▲ | ||
050 | 0 | 0 | ▼aUG593▼b.Z48 2014▲ |
082 | 0 | 0 | ▼a355.4▼223▲ |
084 | ▼aPOL036000▼aCOM053000▼aCOM000000▼2bisacsh▲ | ||
090 | ▼a355.4▼bZ61c▲ | ||
100 | 1 | ▼aZetter, Kim.▲ | |
245 | 1 | 0 | ▼aCountdown to Zero Day :▼bStuxnet and the launch of the world's first digital weapon /▼cKim Zetter.▲ |
260 | ▼aNew York :▼bCrown Publishers,▼c2014.▲ | ||
300 | ▼a433 p. ;▼c25 cm.▲ | ||
504 | ▼aIncludes bibliographical references and index.▲ | ||
520 | ▼a"Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran's nuclear efforts and shows how its existence has ushered in a new age of warfare--one in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery--apparently as much to the technicians replacing the centrifuges as to the inspectors observing them. Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly. At first, the firm's programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity. They had, they soon learned, stumbled upon the world's first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet's planning, execution, and discovery, covering its genesis in the corridors of Bush's White House and its unleashing on systems in Iran--and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making. But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today's flourishing zero-day "grey markets," in which intelligence agencies and militaries pay huge▲ | ||
520 | ▼a"This story of the virus that destroyed Iran's nuclear centrifuges, by top cybersecurity journalist Kim Zetter, shows that the door has been opened on a new age of warfare--one in which a digital attack can have the same destructive capability as a megaton bomb dropped from an airplane"--▼cProvided by publisher.▲ | ||
520 | ▼asums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike--and shows us just what might happen should our infrastructure be targeted by such an attack. Propelled by Zetter's unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war. "--▼cProvided by publisher.▲ | ||
610 | 1 | 0 | ▼aUnited States.▼tArmed Forces▼xInformation technology.▲ |
650 | 0 | ▼aCyberspace operations (Military science)▼zUnited States.▲ | |
650 | 0 | ▼aNetwork-centric operations (Military science)▼zUnited States.▲ | |
650 | 0 | ▼aNetwork-centric operations (Military science)▼zIsrael.▲ | |
650 | 0 | ▼aComputer crimes▼xInvestigation▼zIran▼vCase studies.▲ | |
650 | 0 | ▼aRootkits (Computer software)▲ | |
650 | 0 | ▼aUranium enrichment▼xEquipment and supplies.▲ | |
650 | 0 | ▼aSabotage▼zIran.▲ | |
650 | 0 | ▼aNuclear arms control▼zIran.▲ | |
650 | 0 | ▼aNuclear nonproliferation▼zIran.▲ | |
651 | 0 | ▼aUnited States▼xForeign relations▼zIran.▲ | |
651 | 0 | ▼aIran▼xForeign relations▼zUnited States.▲ | |
999 | ▼c김정이▲ |
![](https://lib.pusan.ac.kr/lawlib/wp-content/themes/pnul2022/assets/images/default/default_w_279X393.png)
Countdown to Zero Day :Stuxnet and the launch of the world's first digital weapon
자료유형
국외단행본
서명/책임사항
Countdown to Zero Day : Stuxnet and the launch of the world's first digital weapon / Kim Zetter.
개인저자
발행사항
New York : Crown Publishers , 2014.
형태사항
433 p. ; 25 cm.
서지주기
Includes bibliographical references and index.
요약주기
"Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran's nuclear efforts and shows how its existence has ushered in a new age of warfare--one in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery--apparently as much to the technicians replacing the centrifuges as to the inspectors observing them. Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly. At first, the firm's programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity. They had, they soon learned, stumbled upon the world's first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet's planning, execution, and discovery, covering its genesis in the corridors of Bush's White House and its unleashing on systems in Iran--and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making. But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today's flourishing zero-day "grey markets," in which intelligence agencies and militaries pay huge/"This story of the virus that destroyed Iran's nuclear centrifuges, by top cybersecurity journalist Kim Zetter, shows that the door has been opened on a new age of warfare--one in which a digital attack can have the same destructive capability as a megaton bomb dropped from an airplane"-- Provided by publisher./sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike--and shows us just what might happen should our infrastructure be targeted by such an attack. Propelled by Zetter's unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war. "-- Provided by publisher./
주제
United States., Armed Forces, Information technology.
Cyberspace operations (Military science), United States.
Network-centric operations (Military science), United States.
Network-centric operations (Military science), Israel.
Computer crimes, Investigation, Iran, Case studies.
Rootkits (Computer software)
Uranium enrichment, Equipment and supplies.
Sabotage, Iran.
Nuclear arms control, Iran.
Nuclear nonproliferation, Iran.
United States, Foreign relations, Iran.
Iran, Foreign relations, United States.
Cyberspace operations (Military science), United States.
Network-centric operations (Military science), United States.
Network-centric operations (Military science), Israel.
Computer crimes, Investigation, Iran, Case studies.
Rootkits (Computer software)
Uranium enrichment, Equipment and supplies.
Sabotage, Iran.
Nuclear arms control, Iran.
Nuclear nonproliferation, Iran.
United States, Foreign relations, Iran.
Iran, Foreign relations, United States.
ISBN
9780770436179 (hardback) 9780770436193 (paperback)
청구기호
355.4 Z61c
소장정보
예도서예약
서서가에없는책 신고
보보존서고신청
캠캠퍼스대출
우우선정리신청
배자료배달신청
문문자발송
출청구기호출력
학소장학술지 원문서비스
등록번호 | 청구기호 | 소장처 | 도서상태 | 반납예정일 | 서비스 |
---|
북토크
자유롭게 책을 읽고
느낀점을 적어주세요
글쓰기
느낀점을 적어주세요
청구기호 브라우징
관련 인기대출 도서