Login

 


 

LEADER 00000cam  2200625Ia 4500 
001    ocn964387604 
003    OCoLC 
008    161126s2014    nyu    e b    001 0 eng   
020    9780770436193|q(pbk.) 
020    0770436196|q(pbk.) 
041    eng 
082 0  355.4|bZ61|222 
092 0  355|bengelska 
100 1  Zetter, Kim 
245 10 Countdown to Zero Day :|bStuxnet and the launch of the 
       world's first digital weapon /|cKim Zetter 
250    First edition 
264    New York :|bCrown Publishers,|c2014 
300    433 pages ;|c21 cm 
336    text|btxt|2rdacontent 
337    unmediated|bn|2rdamedia 
338    volume|bnc|2rdacarrier 
504    Includes bibliographical references and index 
520    "Top cybersecurity journalist Kim Zetter tells the story 
       behind the virus that sabotaged Iran's nuclear efforts and
       shows how its existence has ushered in a new age of 
       warfare--one in which a digital attack can have the same 
       destructive capability as a megaton bomb. In January 2010,
       inspectors with the International Atomic Energy Agency 
       noticed that centrifuges at an Iranian uranium enrichment 
       plant were failing at an unprecedented rate. The cause was
       a complete mystery--apparently as much to the technicians 
       replacing the centrifuges as to the inspectors observing 
       them. Then, five months later, a seemingly unrelated event
       occurred : A computer security firm in Belarus was called 
       in to troubleshoot some computers in Iran that were 
       crashing and rebooting repeatedly. At first, the firm's 
       programmers believed the malicious code on the machines 
       was a simple, routine piece of malware 
520    "This story of the virus that destroyed Iran's nuclear 
       centrifuges, by top cybersecurity journalist Kim Zetter, 
       shows that the door has been opened on a new age of 
       warfare--one in which a digital attack can have the same 
       destructive capability as a megaton bomb dropped from an 
       airplane"--|cProvided by publisher 
521    18- 
650  0 Cyberspace operations (Military science)|zUnited States 
650  0 Network-centric operations (Military science)|zUnited 
       States 
650  0 Network-centric operations (Military science)|zIsrael 
650  0 Computer crimes|xInvestigation|zIran|vCase studies 
650  0 Rootkits (Computer software) 
650  0 Uranium enrichment|xEquipment and supplies 
650  0 Sabotage|zIran 
650  0 Nuclear arms control|zIran 
650  0 Nuclear nonproliferation|zIran 
650  7 Computer crimes|xInvestigation.|2fast 
650  7 Cyberspace operations (Military science)|2fast 
650  7 International relations.|2fast 
650  7 Network-centric operations (Military science)|2fast 
650  7 Nuclear arms control.|2fast 
650  7 Nuclear nonproliferation.|2fast 
650  7 Rootkits (Computer software)|2fast 
650  7 Sabotage.|2fast 
651  0 United States|xForeign relations|zIran 
651  0 Iran|xForeign relations|zUnited States 
651  7 Iran 
651  7 Israel 
651  7 United States 
655  7 Case studies.|2fast 
907 00 181024 
LIBRARY / MAP CALL NUMBER STATUS MESSAGE
 Stadsbibl:Slottet vån 3 Samhällsvetenskap  355 engelska    CHECK SHELF  ---