It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 03318cam 2200673Ii 4500
001 ocn837144787
003 OCoLC
005 20220927202401.0
008 130407s2013 nyu b 001 0 eng d
040 $aBTCTA$beng$erda$cBTCTA$dCLE$dYDXCP$dBDX$dVP@$dVIA$dOCLCF$dOCLCO$dOCLCA$dNRC$dOCLCQ$dOCLCO
019 $a837178884
020 $a9780143122111
020 $a0143122118
035 $a(OCoLC)837144787$z(OCoLC)837178884
043 $an-us---
050 4 $aHV6773.2$b.B74 2013
082 04 $a364.168 BRENN
100 1 $aBrenner, Joel,$eauthor.
240 10 $aAmerica the vulnerable
245 10 $aGlass houses :$bprivacy, secrecy, and cyber insecurity in a transparent world /$cJoel Brenner.
250 $aPaperback edition.
264 1 $aNew York, New York :$bPenguin Books,$c2013.
300 $axii, 308 pages ;$c22 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
500 $aPreviously published as: America the vulnerable.
500 $aWith a new preface.
504 $aIncludes bibliographical references (pages 291-292) and index.
505 0 $aPreface to the paperback edition -- Introduction -- Electronically undressed -- A primer on cyber crime -- Bleeding wealth -- Degrading defense -- Dancing in the dark -- Between war and peace -- June 2017 -- Spies in a glass house -- Thinking about intelligence -- Managing the mess.
520 $aA former top-level national Security Agency insider evaluates pressing threats in digital security, revealing how operatives from hostile nations have infiltrated power, banking, and military systems to steal information and sabotage defense mechanisms.
650 0 $aComputer crimes$zUnited States$xPrevention.
650 0 $aInternet in espionage$zUnited States.
650 0 $aNational security$zUnited States.
650 0 $aData protection$zUnited States.
650 0 $aComputer networks$xSecurity measures$zUnited States.
650 0 $aInformation warfare$zUnited States$xPrevention.
650 0 $aCyberterrorism$zUnited States$xPrevention.
650 0 $aCyberspace$xGovernment policy$zUnited States.
650 6 $aInternet dans l'espionnage$zÉtats-Unis.
650 6 $aProtection de l'information (Informatique)$zÉtats-Unis.
650 6 $aRéseaux d'ordinateurs$xSécurité$xMesures$zÉtats-Unis.
650 6 $aCyberespace$xPolitique gouvernementale$zÉtats-Unis.
650 7 $aComputer crimes$xPrevention.$2fast$0(OCoLC)fst00872068
650 7 $aComputer networks$xSecurity measures.$2fast$0(OCoLC)fst00872341
650 7 $aCyberspace$xGovernment policy.$2fast$0(OCoLC)fst00885796
650 7 $aCyberterrorism$xPrevention.$2fast$0(OCoLC)fst01905567
650 7 $aData protection.$2fast$0(OCoLC)fst00887958
650 7 $aInformation warfare$xPrevention.$2fast$0(OCoLC)fst00973188
650 7 $aInternet in espionage.$2fast$0(OCoLC)fst01739358
650 7 $aNational security.$2fast$0(OCoLC)fst01033711
651 7 $aUnited States.$2fast$0(OCoLC)fst01204155
938 $aBrodart$bBROD$n104545887
938 $aBaker and Taylor$bBTCP$nBK0013131391
938 $aYBP Library Services$bYANK$n10410605
029 1 $aAU@$b000051891527
029 1 $aAU@$b000052174148
994 $aZ0$bGTX
948 $hNO HOLDINGS IN GTX - 117 OTHER HOLDINGS