Atjaunināt sīkdatņu piekrišanu

E-grāmata: Hacker and the State: Cyber Attacks and the New Normal of Geopolitics

4.21/5 (1471 ratings by Goodreads)
  • Formāts: EPUB+DRM
  • Izdošanas datums: 25-Feb-2020
  • Izdevniecība: Harvard University Press
  • Valoda: eng
  • ISBN-13: 9780674245983
  • Formāts - EPUB+DRM
  • Cena: 23,67 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Izdošanas datums: 25-Feb-2020
  • Izdevniecība: Harvard University Press
  • Valoda: eng
  • ISBN-13: 9780674245983

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The threat of cyberwar can feel very Hollywood: nuclear codes hacked, power plants melting down, cities burning. In reality, state-sponsored hacking is covert, insidious, and constant. It is also much harder to prevent. Ben Buchanan reveals the cyberwar that’s already here, reshaping the global contest for geopolitical advantage.

“One of the finest books on information security published so far in this century—easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive.”
—Thomas Rid, author of Active Measures

“The best examination I have read of how increasingly dramatic developments in cyberspace are defining the ‘new normal’ of geopolitics in the digital age. Buchanan…captures the dynamics of all of this truly brilliantly.”
—General David Petraeus, former Director of the CIA and Commander of Coalition Forces in Iraq and Afghanistan

Few national-security threats are as potent—or as nebulous—as cyber attacks. Ben Buchanan reveals how hackers are transforming spycraft and statecraft, catching us all in the crossfire, whether we know it or not.

Ever since WarGames, we have been bracing for the cyberwar to come, conjuring images of exploding power plants and mass panic. But while cyber attacks are now disturbingly common, they don’t look anything like we thought they would.

Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. His analysis moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to billion-dollar heists and election interference.

Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. He explains why cyber attacks are far less destructive than we anticipated, far more pervasive, and much harder to prevent. With little fanfare and far less scrutiny, they impact our banks, our tech and health systems, our democracy, and every aspect of our lives. Quietly, insidiously, they have reshaped our national-security priorities and transformed spycraft and statecraft. The contest for geopolitical advantage has moved into cyberspace. The United States and its allies can no longer dominate the way they once did. The nation that hacks best will triumph.

Recenzijas

The Hacker and the State is one of the finest books on information security published so far in this centuryeasily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive. -- Thomas Rid, author of Active Measures This is a great book and the best examination I have read of how increasingly dramatic developments in cyberspace are defining the new normal of geopolitics in the digital age. No book I've read does a better job of describing what has transpired in recent years as state and non-state actors have developed ever more diabolically powerful and clever cyber capabilities. Ben Buchanan makes it clear that the future lies not just in Asia, but also in cyberspace, and he captures the dynamics of all of this truly brilliantly. -- General David Petraeus, former Director of the CIA and Commander of Coalition Forces in Iraq and Afghanistan A helpful reminderof the sheer diligence and seriousness of purpose exhibited by the Russians in their missionInformation warfare is designed to bamboozle, but its digital variant can be especially baffling to the nonspecialist. -- Jonathan Freedland * New York Review of Books * A substantial and measured history of cyberattacks in recent decadesDespite the growing ubiquity of cyberattacks, Buchanan also highlights their limits as a means of coercion or as a way of sending a message. -- Lawrence D. Freedman * Foreign Affairs * Demonstrates how this field has evolved from espionage operations and a field dominated by the United States to cyber-attacks that have broader implications for economies and societiesAn excellent primer for understanding how cyber operations have become an indelible part of global relations and ably demonstrates how hacking has earned its place in the playbook of statecraft. -- Angus Parker * Geographical * With an academics eye, Buchanan compares and contrasts the emerging tactics [ of digital competition] with the traditional ways of military conflict, nuclear competition, and espionage to make some sense of the new age. The book dissects how governments use cyberattacks to fundamentally change the state of play. -- Patrick Howell O'Neill * MIT Technology Review * Probes deep into cyber security, the truths and myths about cyber security, and how society, corporations, and individuals pay particularly close attention to it in todays everchanging worldAllows the reader to understand the real geopolitical competition of the digital age as it applies to business and government agencies. -- Kevin Cassidy * Criminal Law and Criminal Justice Books * If you believe that cyber attacks are now critical to understand todays International Relations, stop doing everything you are doing and start reading Ben Buchanans new bookMakes clear how we need to pay attention to the distinctiveness of cyber attacks and the strategic logics behind themAn incredibly informed examination of the cyber attacks that have taken place in recent decades. -- Antonio Calcara * E-International Relations * Buchanan is well-placed to detail the history and evolution of this new and oft-misunderstood form of warfareThis book argues that states must learn to read the signaling implied by a cyber-attack, in the same way that they would a military exercise along their border. -- Lewis Tallon * Encyclopedia Geopolitica * Provides a reliable summary and deep analysis of a novel force bound to shape world affairs. -- Walter Clemens * New York Journal of Books * This is a must-read book. Factual and perceptive, it reveals important truths about cyberthreats and the role they play in international relations. -- Vint Cerf, Internet pioneer This is a gripping book about todays cyber threat landscape. Through riveting stories of move and counter-move among global adversaries, Buchanan explains why we are in a constant state of cyber conflictwhere the stakes couldnt be higher. From Chinas attacks on our companies to Russias attacks on our elections, The Hacker and the State is indispensable reading for anyone who cares about our security, our prosperity, and our democracy. -- Lisa Monaco, former White House Homeland Security and Counterterrorism Advisor and Deputy National Security Advisor More than any other book, The Hacker and the State shows how and why governments hack one another. Having lived and worked in this shadowy world for many years, I came to appreciate its fascinating nuances, fierce competition, and strategic significance. If you read this book, you will, too. Buchanan shares digital spy stories and distills geopolitical insights that you just wont find anywhere else. Remarkably, he has made his detailed insight accessible to a non-technical audience without any loss of fidelity in the underlying narrative. -- Former senior intelligence officer, UK government The Hacker and the State fundamentally changes the way we think about cyber operations from war to something of significant import that is not warwhat Buchanan refers to as real geopolitical competition. He writes in a highly accessible manner, with in-depth stories that will engage the non-specialist. -- Richard Harknett, former Scholar-in-Residence at United States Cyber Command A great read, packed with insider information and great stories. But the book also makes an important argument about how cyberattacks are transforming the geopolitical playing field, changing our defense priorities and forcing us to rewrite our national security policies. -- Bruce Schneier, author of Click Here to Kill Everybody: Security and Survival in a Hyper-connected World Highly intelligent, important, and timely. Buchanans chronology of cases, from early espionage to devastating operations like NotPetya, makes for a great read. -- Joseph Nye, author of Do Morals Matter?

Introduction 1(12)
PART ONE ESPIONAGE
1 Exploiting Home-Field Advantage
13(27)
2 Defeating Encryption
40(22)
3 Building a Backdoor
62(24)
4 Strategic Espionage
86(22)
5 Counterintelligence
108(21)
PART TWO ATTACK
6 Strategic Sabotage
129(19)
7 Targeted Disruption
148(19)
8 Coercion
167(20)
9 Testing and Demonstration
187(24)
PART THREE DESTABILIZATION
10 Election Interference
211(29)
11 Exposure
240(28)
12 Theft, Ransom, and Manipulation
268(20)
13 Widespread Disruption
288(18)
Conclusion 306(15)
Notes 321(70)
Acknowledgments 391(4)
Index 395
Ben Buchanan teaches at Georgetown Universitys School of Foreign Service, where he is a Senior Faculty Fellow at the Center for Security and Emerging Technology. He is the author of The Cybersecurity Dilemma and a regular contributor to the websites Lawfare and War on the Rocks. He was previously a fellow at Harvard Universitys Belfer Center for Science and International Affairs.