It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 03311cam 2200469Ma 4500
001 ocn812073160
003 OCoLC
005 20220802080333.0
008 120925r20132011nyua b 000 0 eng d
040 $aUKMGB$beng$cUKMGB$dOCLCO$dOCLCF$dYDXCP$dOCLCQ$dAUNTL$dOCLCA$dOCLCO
015 $aGBB299876$2bnb
016 7 $a016182497$2Uk
020 $a9781611855845$q(pbk.)
020 $a1611855845$q(pbk.)
035 $a(OCoLC)812073160
082 04 $a005.84$223
100 1 $aBowden, Mark,$d1951-
245 10 $aWorm :$bthe first digital world war /$cMark Bowden.
260 $aNew York :$bGrove ;$aLondon :$bAtlantic [distributor],$c2013.
300 $apages cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
500 $aOriginally published: New York: Atlantic Monthly, 2011.
504 $aIncludes bibliographical references.
505 0 $aPrincipal characters -- Zero -- MS08-067 -- Remote thread injection -- An ocean of suckers -- The X-men -- Digital detectives -- A note from the trenches -- Another huge win -- Mr. Joffe goes to Washington -- Cybarmageddon -- April fools.
520 $aWorm: The First Digital World War tells the story of the Conficker worm, a potentially devastating piece of malware that has baffled experts and infected more than twelve million computers worldwide. When Conficker was unleashed in November 2008, cybersecurity experts did not know what to make of it. Exploiting security flaws in Microsoft Windows, it grew at an astonishingly rapid rate, infecting millions of computers around the world within weeks. Once the worm infiltrated one system it was able to link it with others to form a single network under illicit outside control known as a ?botnet.? This botnet was soon capable of overpowering any of the vital computer networks that control banking, telephones, energy flow, air traffic, health-care information ? even the Internet itself. Was it a platform for criminal profit or a weapon controlled by a foreign power or dissident organization? Surprisingly, the U.S. government was only vaguely aware of the threat that Conficker posed, and the task of mounting resistance to the worm fell to a disparate but gifted group of geeks, Internet entrepreneurs, and computer programmers. But when Conficker's controllers became aware that their creation was encountering resistance, they began refining the worm's code to make it more difficult to trace and more powerful, testing the Cabal lock's unity and resolve. Will the Cabal lock down the worm before it is too late? Game on.
650 0 $aMalware (Computer software)
650 0 $aComputer security.
650 0 $aComputer security equipment industry.
650 2 $aComputer Security
650 6 $aLogiciels malveillants.
650 6 $aSécurité informatique.
650 6 $aSécurité informatique$xAppareils et matériel$xIndustrie.
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 7 $aComputer security equipment industry.$2fast$0(OCoLC)fst00872497
650 7 $aMalware (Computer software)$2fast$0(OCoLC)fst01748230
938 $aYBP Library Services$bYANK$n9457842
029 1 $aNZ1$b14745993
029 1 $aUNITY$b128020679
994 $aZ0$bIME
948 $hNO HOLDINGS IN IME - 10 OTHER HOLDINGS