LEADER 01671oam 2200469 450 001 9910158647903321 005 20190911103516.0 010 $a1-5081-7317-6 035 $a(OCoLC)967983822 035 $a(MiFhGG)GVRL08AU 035 $a(EXLCZ)993710000001010006 100 $a20160603h20172017 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber attacks, counterattacks, and espionage /$fDaniel E. Harmon 205 $aFirst edition. 210 1$aNew York :$cRosen Publishing,$d2017. 210 4$d?2017 215 $a1 online resource (64 pages) $ccolor illustrations 225 1 $aCryptography : code making and code breaking 311 $a1-5081-7316-8 320 $aIncludes bibliographical references and index. 327 $aIntroduction -- A new variation of cryptography -- Attackers have the advantage -- What do cyber criminals want? -- The nations respond. 330 $aIn this book, readers will learn about some of the approaches used by cyber attackers, what they are looking for, and how the experts work to protect sensitive information. 410 0$aCryptography: code making and code breaking. 606 $aCyberterrorism 606 $aComputer crimes 606 $aEspionage 615 0$aCyberterrorism. 615 0$aComputer crimes. 615 0$aEspionage. 676 $a364.16/8 700 $aHarmon$b Daniel E.$01247128 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910158647903321 996 $aCyber attacks, counterattacks, and espionage$92891354 997 $aUNINA