Countdown to Zero Day : Stuxnet and the launch of the world's first digital weapon
(Book)
Author
Status
General Shelving - 3rd Floor
UG593 .Z48 2014
1 available
UG593 .Z48 2014
1 available
Description
Loading Description...
Also in this Series
Checking series information...
Copies
Location | Call Number | Status |
---|---|---|
General Shelving - 3rd Floor | UG593 .Z48 2014 | On Shelf |
Subjects
LC Subjects
Case studies.
Computer crimes -- Investigation -- Iran -- Case studies.
Cyberspace operations (Military science) -- United States.
Iran -- Foreign relations -- United States.
Network-centric operations (Military science) -- Israel.
Network-centric operations (Military science) -- United States.
Nuclear arms control -- Iran.
Nuclear nonproliferation -- Iran.
Rootkits (Computer software)
Sabotage -- Iran.
United States -- Foreign relations -- Iran.
United States. -- Armed Forces -- Information technology.
Uranium enrichment -- Equipment and supplies.
Computer crimes -- Investigation -- Iran -- Case studies.
Cyberspace operations (Military science) -- United States.
Iran -- Foreign relations -- United States.
Network-centric operations (Military science) -- Israel.
Network-centric operations (Military science) -- United States.
Nuclear arms control -- Iran.
Nuclear nonproliferation -- Iran.
Rootkits (Computer software)
Sabotage -- Iran.
United States -- Foreign relations -- Iran.
United States. -- Armed Forces -- Information technology.
Uranium enrichment -- Equipment and supplies.
Bisac Subjects
OCLC Fast Subjects
Armed Forces (United States)
Case studies
Computer crimes -- Investigation
Cyberspace operations (Military science)
Diplomatic relations
Information technology
Iran -- https://id.oclc.org/worldcat/entity/E39PBJtrYvcVTwChrDqytBvJXd
Israel -- https://id.oclc.org/worldcat/entity/E39PBJdgWx83Xb7cjjrMXBJYyd
Network-centric operations (Military science)
Nuclear arms control
Nuclear nonproliferation
Rootkits (Computer software)
Sabotage
United States -- https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq
Case studies
Computer crimes -- Investigation
Cyberspace operations (Military science)
Diplomatic relations
Information technology
Iran -- https://id.oclc.org/worldcat/entity/E39PBJtrYvcVTwChrDqytBvJXd
Israel -- https://id.oclc.org/worldcat/entity/E39PBJdgWx83Xb7cjjrMXBJYyd
Network-centric operations (Military science)
Nuclear arms control
Nuclear nonproliferation
Rootkits (Computer software)
Sabotage
United States -- https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq
Other Subjects
Armes nucléaires -- Contrôle -- Iran.
Computer crimes -- Investigation -- Iran -- Case studies.
Criminalité informatique -- Enquêtes -- Iran -- Études de cas.
Cyberguerre (Science militaire) -- États-Unis.
Cyberspace operations (Military science) -- United States.
Diplomatiska förbindelser.
Förenta staterna.
Guerre en réseau -- Israël.
Guerre en réseau -- États-Unis.
Information warfare
Internationale Politik
Iran -- Foreign relations -- United States.
Iran.
Israel.
IT-forensisk verksamhet.
Militärtechnik
Narrative non-fiction.
Network-centric operations (Military science) -- Israel.
Network-centric operations (Military science) -- United States.
Non-prolifération nucléaire -- Iran.
Nuclear arms control -- Iran.
Nuclear nonproliferation -- Iran.
Rootkits (Computer software)
Sabotage -- Iran.
Sabotage -- Iran.
Sabotage.
Trousses administrateur pirate.
United States -- Foreign relations -- Iran.
United States. -- Armed Forces -- Information technology.
Uranium enrichment -- Equipment and supplies.
Väpnade styrkor.
Études de cas.
Computer crimes -- Investigation -- Iran -- Case studies.
Criminalité informatique -- Enquêtes -- Iran -- Études de cas.
Cyberguerre (Science militaire) -- États-Unis.
Cyberspace operations (Military science) -- United States.
Diplomatiska förbindelser.
Förenta staterna.
Guerre en réseau -- Israël.
Guerre en réseau -- États-Unis.
Information warfare
Internationale Politik
Iran -- Foreign relations -- United States.
Iran.
Israel.
IT-forensisk verksamhet.
Militärtechnik
Narrative non-fiction.
Network-centric operations (Military science) -- Israel.
Network-centric operations (Military science) -- United States.
Non-prolifération nucléaire -- Iran.
Nuclear arms control -- Iran.
Nuclear nonproliferation -- Iran.
Rootkits (Computer software)
Sabotage -- Iran.
Sabotage -- Iran.
Sabotage.
Trousses administrateur pirate.
United States -- Foreign relations -- Iran.
United States. -- Armed Forces -- Information technology.
Uranium enrichment -- Equipment and supplies.
Väpnade styrkor.
Études de cas.
More Details
Format
Book
Physical Desc
433 pages ; 25 cm
Language
English
Notes
Bibliography
Includes bibliographical references and index.
Description
"Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran's nuclear efforts and shows how its existence has ushered in a new age of warfare--one in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery--apparently as much to the technicians replacing the centrifuges as to the inspectors observing them. Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly. At first, the firm's programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity. They had, they soon learned, stumbled upon the world's first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet's planning, execution, and discovery, covering its genesis in the corridors of Bush's White House and its unleashing on systems in Iran--and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making. But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today's flourishing zero-day "grey markets," in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike--and shows us just what might happen should our infrastructure be targeted by such an attack. Propelled by Zetter's unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war."--,Provided by publisher.
Description
"This story of the virus that destroyed Iran's nuclear centrifuges, by top cybersecurity journalist Kim Zetter, shows that the door has been opened on a new age of warfare--one in which a digital attack can have the same destructive capability as a megaton bomb dropped from an airplane"--,Provided by publisher.
Local note
SACFinal081324
Reviews from GoodReads
Loading GoodReads Reviews.
Citations
APA Citation, 7th Edition (style guide)
Zetter, K. (2014). Countdown to Zero Day: Stuxnet and the launch of the world's first digital weapon (First edition.). Crown Publishers.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Zetter, Kim. 2014. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. New York: Crown Publishers.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Zetter, Kim. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon New York: Crown Publishers, 2014.
Harvard Citation (style guide)Zetter, K. (2014). Countdown to zero day: stuxnet and the launch of the world's first digital weapon. First edn. New York: Crown Publishers.
MLA Citation, 9th Edition (style guide)Zetter, Kim. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon First edition., Crown Publishers, 2014.
Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.
Staff View
Loading Staff View.