Battlefield cyber

how China and Russia are undermining our democracy and national security
Michael G McLaughlin and William J Holstein
Book - 2023

"The United States is being bombarded with cyber-attacks. From the surge in ransomware groups targeting critical infrastructure to nation states compromising the software supply chain and corporate email servers, malicious cyber activities have reached an all-time high. Russia attracts the most attention, but China is vastly more sophisticated. They have a common interest in exploiting the openness of the Internet and social media-and our democracy-to erode confidence in our institutions and to exacerbate our societal rifts to prevent us from mounting an effective response. Halting this digital aggression will require Americans to undertake sweeping changes in how we educate, organize and protect ourselves and to ask difficult questions about how vulnerable our largest technology giants are"--

Saved in:

Holdings -

Central

Barcode Status Material Type CallNumber Availability
37413321882443 Available New Adult Non-Fiction 363.3251 MCLAUGH  Place a Hold
Bibliographic Details
Main Authors: McLaughlin, Michael G. (Author), Holstein, William J. (Author)
Format: Book
Language:English
Published: Lanham, MD : Prometheus Books, [2023]
Subjects:

MARC

LEADER 00000cam a2200000 i 4500
001 923464
008 230130s2023 mdu b 001 0 eng
005 20231211180258.7
010 |a  2022053668 
019 |a 1388527087  |a 1390649179  |a 1403844888 
020 |a 9781633889019  |q hardcover 
020 |a 1633889017  |q hardcover 
020 |z 9781633889026  |q electronic publication 
029 1 |a AU@  |b 000073383296 
035 |a (OCoLC)1333621103  |z (OCoLC)1388527087  |z (OCoLC)1390649179  |z (OCoLC)1403844888 
037 |a 18025300  |b ybp 
040 |a DLC  |b eng  |e rda  |c DLC  |d OCLCF  |d JCX  |d VP@  |d IH9  |d TOH  |d ZVR  |d YDX  |d ILM  |d AU@  |d OCLCO 
042 |a pcc 
043 |a n-us--- 
049 |a UAGA 
082 0 0 |a 363.325/1720973  |2 23/eng/20230808 
092 |a 363.3251 MCLAUGH 
100 1 |a McLaughlin, Michael G.,  |e author. 
245 1 0 |a Battlefield cyber :  |b how China and Russia are undermining our democracy and national security /  |c Michael G. McLaughlin and William J. Holstein. 
264 1 |a Lanham, MD :  |b Prometheus Books,  |c [2023] 
300 |a xiv, 285 pages ;  |c 24 cm 
336 |a text  |b txt  |2 rdacontent 
337 |a unmediated  |b n  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
520 |a "The United States is being bombarded with cyber-attacks. From the surge in ransomware groups targeting critical infrastructure to nation states compromising the software supply chain and corporate email servers, malicious cyber activities have reached an all-time high. Russia attracts the most attention, but China is vastly more sophisticated. They have a common interest in exploiting the openness of the Internet and social media-and our democracy-to erode confidence in our institutions and to exacerbate our societal rifts to prevent us from mounting an effective response. Halting this digital aggression will require Americans to undertake sweeping changes in how we educate, organize and protect ourselves and to ask difficult questions about how vulnerable our largest technology giants are"--  |c Provided by publisher 
505 0 |a Introduction: All hands on deck -- Part I: We are at war. Cyber warfare: The enemy inside the gates -- Water and oil: Weaponized ransomware, digital proxies, and the threat to critical infrastructure -- Chinese cyber espionage: The greatest transfer of wealth in history -- The new oil: Data and China's digital silk road strategy -- Stoking the flames: How malign influence exacerbates America's political divides and ethnic tensions -- Software meltdown: The problem with trust -- Someone else's server: The vulnerabilities of cloud computing -- Stealing the war: Cyber threats to America's defense supply chain -- Part II: The response: What must be done. Retreat from globalization: Easing corporate America's addiction to China -- Social disorder: Reining in social media and big tech -- Re-architecting security: What the private sector must do -- Government action: What the public sector must do -- Collective defense: How the public and private sectors must work together -- Conclusion: The metaverse, education, and restoring the political "center". 
650 0 |a Cyberterrorism  |z United States. 
650 0 |a Cyberterrorism  |x Government policy  |z United States. 
650 0 |a Information warfare  |z United States. 
650 0 |a Computer networks  |x Security measures  |z United States. 
700 1 |a Holstein, William J.,  |e author. 
776 0 8 |i Online version:  |a McLaughlin, Michael G.  |t Battlefield cyber.  |d Lanham : Prometheus Books, [2023]  |z 9781633889026  |w (DLC) 2022053669 
938 |a Brodart  |b BROD  |n 132814188 
938 |a YBP Library Services  |b YANK  |n 18025300 
994 |a C0  |b UAG 
999 f f |s a224e0fe-782c-4c2d-8ce1-d0cb0556af0e  |i 8ca55fa2-7fd5-4c91-a2a5-f701c447ce71  |t 0 
952 f f |p Standard Circulation  |a City of Spokane  |b Spokane Public Library  |c Branches  |d Central  |t 0  |e 363.3251 MCLAUGH  |i New Adult Non-Fiction  |m 37413321882443