Worm : the first digital world war / Mark Bowden.
By: Bowden, Mark.
Material type: TextPublisher: New York : Atlantic Monthly Press, c2011Edition: 1st ed.Bibliography: Includes bibliographical references.Description: x, 245 p. ; 24 cm.ISBN: 9780802119834; 0802119832.Subject(s): Computer viruses | Cyberterrorism | Computer crimesDDC classification: 005.84Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Two Weeks | Davenport Library Circulating Collection | Print-Circulating | 005.84 B672 2011 (Browse shelf(Opens below)) | Available | 34284003736113 |
Browsing Davenport Library shelves, Shelving location: Circulating Collection, Collection: Print-Circulating Close shelf browser (Hides shelf browser)
005.8 T849 Hardening Linux / | 005.8 V671 2009 The myths of security : what the computer security industry doesn't want you to know / | 005.8 W151 Absolute beginner's guide to security, spam, spyware and viruses / | 005.84 B672 2011 Worm : the first digital world war / | 006.3 B177 2011 Final Jeopardy : man vs. machine and the quest to know everything / | 006.3 T154 2008 Click : what millions of people are doing online and why it matters / | 006.4 B521 Biometrics : personal identification in networked society / |
Includes bibliographical references.
Zero -- MS08-067 -- Remote thread injection -- An ocean of suckers -- The X-men -- Digital detectives -- A note from the trenches -- Another huge win -- Mr. Joffe goes to Washington -- Cybarmageddon -- April fools.
Journalist Mark Bowden delivers a look at the ongoing and largely unreported war taking place literally beneath our fingertips. When the Conficker computer worm was unleashed on the world in November 2008, cybersecurity experts did not know what to make of it. Was it a platform for criminal profit, or a weapon? The worm, exploiting security flaws in Microsoft Windows, grew at an astonishing rate, infecting millions of computers around the world within weeks. Once the worm infiltrated one system it was able to link that system with others to form a single network under illicit outside control, a situation known as a "botnet," soon capable of overpowering any of the vital computer networks that today control banking, telephone service, energy flow, air traffic, health-care information, even the Internet itself. This book reports on the battle between those determined to exploit the Internet and those committed to protect it.--From publisher description.
There are no comments on this title.