Worm : the first digital world war / Mark Bowden.
Material type: TextPublication details: New York : Atlantic Monthly Press, c2011.Edition: 1st edDescription: x, 245 p. ; 24 cmISBN:- 9780802119834 (hardcover) :
- 0802119832 (hardcover) :
- 005.84 23
- QA76.76.C68 B69 2011
- HV6773.15.C97 B68 2011
Item type | Current library | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|
BOOK | Meaford Public Library Non-Fiction | 005 .84 Bowde (Browse shelf(Opens below)) | Available | 65133 |
Browsing Meaford Public Library shelves, Shelving location: Non-Fiction Close shelf browser (Hides shelf browser)
005 .8 Hyppo If it's smart, it's vulnerable / | 005 .8 Schne Data and Goliath : the hidden battles to collect your data and control your world / | 005 .8 Selby Cyber Survival Manual / Tools for surviving everything from identity theft to the digital apocalypse | 005 .84 Bowde Worm : the first digital world war / | 005.52 LOW Word 2007 all-in-one desk reference for dummies / | 005.75 KAU Access 2002 for dummies / | 006 .686 Oberm Photoshop Elements 2021 / |
Includes bibliographical references.
Zero -- MS08-067 -- Remote thread injection -- An ocean of suckers -- The X-men -- Digital detectives -- A note from the trenches -- Another huge win -- Mr. Joffe goes to Washington -- Cybarmageddon -- April fools.
This book is a cyber-crime story that explores the Conficker Computer "Worm," a potentially devastating computer virus that has baffled experts and infected as many as 12 million computers to date. It is about the next frontier in terrorism. When the Conficker computer worm was unleashed on the world in November 2008, cybersecurity experts did not know what to make of it. The worm, exploiting the security flaws in Microsoft Windows, grew at an astonishingly rapid rate, infecting millions of computers around the world within weeks. Once the worm infiltrated one system it was able to link that system with others to form a single network under illicit outside control, a situation known as a "botnet." This botnet was soon capable of overpowering any of the vital computer networks that today control banking, telephone service, energy flow, air traffic, health-care information, even the Internet itself. Was it a platform for criminal profit, or a weapon? Security experts do not know for sure what Conficker's purpose is, or even where it came from. This book reports this new frontier on terror. The author explores the battle of wits between expert programmers over the future of the Internet, a battle that has pitted those determined to exploit the Internet against those committed to protect it, and awakened the U.S. government to the urgent nature of the threat. The book delivers a look at the ongoing and largely unreported war taking place literally beneath our fingertips.
There are no comments on this title.