Intercept: the secret history of computers and spies
HISTORY OF SPECIFIC SUBJECTS. INTERCEPT is the previously untold - and highly classified - story of the melding of technology and espionage. Gordon Corera's compelling narrative takes us from the Second World War through the Cold War and the birth of the internet to the present era of hackers a...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London
Weidenfeld & Nicolson
2015
|
Ausgabe: | 1. publ. in Great Britain |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | HISTORY OF SPECIFIC SUBJECTS. INTERCEPT is the previously untold - and highly classified - story of the melding of technology and espionage. Gordon Corera's compelling narrative takes us from the Second World War through the Cold War and the birth of the internet to the present era of hackers and surveillance. Rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US and China, this is the secret history of how spying drove the rise of the computer. Within the confines of Britain's Second World War code-breaking establishment at Bletchley Park, the work of men like Alan Turing led to the birth of electronic espionage and the first computer, Colossus. In the following decades, computers have transformed the business of espionage, from Cold War spy hunting to today's data-driven pursuit of terrorists and industrial-scale cyber-espionage against corporations |
Beschreibung: | 431 S. 24 cm |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042791331 | ||
003 | DE-604 | ||
005 | 20160308 | ||
007 | t| | ||
008 | 150902s2015 xx |||| 00||| eng d | ||
020 | |z 9780297871736 |c hardback |9 978-0-297-87173-6 | ||
020 | |z 0297871730 |c hardback |9 0-297-87173-0 | ||
035 | |a (OCoLC)927527238 | ||
035 | |a (DE-599)BVBBV042791331 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-210 | ||
084 | |a 8 |2 ssgn | ||
100 | 1 | |a Corera, Gordon |e Verfasser |0 (DE-588)1145073646 |4 aut | |
245 | 1 | 0 | |a Intercept |b the secret history of computers and spies |c Gordon Corera |
250 | |a 1. publ. in Great Britain | ||
264 | 1 | |a London |b Weidenfeld & Nicolson |c 2015 | |
300 | |a 431 S. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | |a HISTORY OF SPECIFIC SUBJECTS. INTERCEPT is the previously untold - and highly classified - story of the melding of technology and espionage. Gordon Corera's compelling narrative takes us from the Second World War through the Cold War and the birth of the internet to the present era of hackers and surveillance. Rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US and China, this is the secret history of how spying drove the rise of the computer. Within the confines of Britain's Second World War code-breaking establishment at Bletchley Park, the work of men like Alan Turing led to the birth of electronic espionage and the first computer, Colossus. In the following decades, computers have transformed the business of espionage, from Cold War spy hunting to today's data-driven pursuit of terrorists and industrial-scale cyber-espionage against corporations | ||
648 | 7 | |a Geschichte 1948-2010 |2 gnd |9 rswk-swf | |
648 | 7 | |a Geschichte |2 gnd |9 rswk-swf | |
650 | 4 | |a Computer crimes / History | |
650 | 4 | |a Electronic intelligence / History | |
650 | 4 | |a Internet in espionage / History | |
650 | 4 | |a Cyber intelligence (Computer security) / History | |
650 | 4 | |a Internet / Security measures / History | |
650 | 4 | |a Internet in espionage | |
650 | 7 | |a Spionage |2 gnd | |
650 | 7 | |a Information warfare |2 gnd | |
650 | 7 | |a Computerkriminalität |2 gnd | |
650 | 7 | |a Computersicherheit |2 gnd | |
650 | 4 | |a Geschichte | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Spionage |0 (DE-588)4056287-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Geheimdienst |0 (DE-588)4019737-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Ausspähen von Daten |0 (DE-588)7714184-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 3 | |a Spionage |0 (DE-588)4056287-6 |D s |
689 | 0 | 4 | |a Geschichte 1948-2010 |A z |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Ausspähen von Daten |0 (DE-588)7714184-2 |D s |
689 | 1 | 1 | |a Geheimdienst |0 (DE-588)4019737-2 |D s |
689 | 1 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 4 | |a Geschichte |A z |
689 | 1 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung BSB Muenchen - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028221140&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
942 | 1 | 1 | |c 909 |e 22/bsb |f 0904 |
942 | 1 | 1 | |c 609 |e 22/bsb |f 090511 |
942 | 1 | 1 | |c 909 |e 22/bsb |f 090511 |
942 | 1 | 1 | |c 609 |e 22/bsb |f 0904 |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028221140 |
Datensatz im Suchindex
_version_ | 1825766768556113920 |
---|---|
adam_text |
CONTENTS
Prologue i
Introduction 8
1 Birth 17
2 Marriage 38
3 Into the Cold 53
4 Coming of Age 67
5 Spy-hunting 89
6 Crypto Wars 103
7 Attack 134
8 Enter the KGB 146
9 Out of the Cold and into Cyberspace 158
10 Titan Rain 176
11 In the Wires 202
12 Britain and the Cyber Spies 225
13 Dissent 250
14 Sabotage 272
15 The Lights Go Off 289
16 Rebirth — Cables 305
17 Britain 331
18 Exposure 350
Epilogue: To Infinity and Beyond 382
Acknowledgements 392
Notes 393
Index 421 |
any_adam_object | 1 |
author | Corera, Gordon |
author_GND | (DE-588)1145073646 |
author_facet | Corera, Gordon |
author_role | aut |
author_sort | Corera, Gordon |
author_variant | g c gc |
building | Verbundindex |
bvnumber | BV042791331 |
ctrlnum | (OCoLC)927527238 (DE-599)BVBBV042791331 |
edition | 1. publ. in Great Britain |
era | Geschichte 1948-2010 gnd Geschichte gnd |
era_facet | Geschichte 1948-2010 Geschichte |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV042791331</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160308</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">150902s2015 xx |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780297871736</subfield><subfield code="c">hardback</subfield><subfield code="9">978-0-297-87173-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0297871730</subfield><subfield code="c">hardback</subfield><subfield code="9">0-297-87173-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)927527238</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042791331</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-210</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">8</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Corera, Gordon</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1145073646</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intercept</subfield><subfield code="b">the secret history of computers and spies</subfield><subfield code="c">Gordon Corera</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. publ. in Great Britain</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Weidenfeld & Nicolson</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">431 S.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">HISTORY OF SPECIFIC SUBJECTS. INTERCEPT is the previously untold - and highly classified - story of the melding of technology and espionage. Gordon Corera's compelling narrative takes us from the Second World War through the Cold War and the birth of the internet to the present era of hackers and surveillance. Rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US and China, this is the secret history of how spying drove the rise of the computer. Within the confines of Britain's Second World War code-breaking establishment at Bletchley Park, the work of men like Alan Turing led to the birth of electronic espionage and the first computer, Colossus. In the following decades, computers have transformed the business of espionage, from Cold War spy hunting to today's data-driven pursuit of terrorists and industrial-scale cyber-espionage against corporations</subfield></datafield><datafield tag="648" ind1=" " ind2="7"><subfield code="a">Geschichte 1948-2010</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="648" ind1=" " ind2="7"><subfield code="a">Geschichte</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / History</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic intelligence / History</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet in espionage / History</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security) / History</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet / Security measures / History</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet in espionage</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Spionage</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information warfare</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Geschichte</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Spionage</subfield><subfield code="0">(DE-588)4056287-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Geheimdienst</subfield><subfield code="0">(DE-588)4019737-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ausspähen von Daten</subfield><subfield code="0">(DE-588)7714184-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Spionage</subfield><subfield code="0">(DE-588)4056287-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Geschichte 1948-2010</subfield><subfield code="A">z</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Ausspähen von Daten</subfield><subfield code="0">(DE-588)7714184-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Geheimdienst</subfield><subfield code="0">(DE-588)4019737-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Geschichte</subfield><subfield code="A">z</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSB Muenchen - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028221140&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">909</subfield><subfield code="e">22/bsb</subfield><subfield code="f">0904</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">609</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090511</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">909</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090511</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">609</subfield><subfield code="e">22/bsb</subfield><subfield code="f">0904</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028221140</subfield></datafield></record></collection> |
id | DE-604.BV042791331 |
illustrated | Not Illustrated |
indexdate | 2025-03-05T15:01:14Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028221140 |
oclc_num | 927527238 |
open_access_boolean | |
owner | DE-12 DE-210 |
owner_facet | DE-12 DE-210 |
physical | 431 S. 24 cm |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Weidenfeld & Nicolson |
record_format | marc |
spelling | Corera, Gordon Verfasser (DE-588)1145073646 aut Intercept the secret history of computers and spies Gordon Corera 1. publ. in Great Britain London Weidenfeld & Nicolson 2015 431 S. 24 cm txt rdacontent n rdamedia nc rdacarrier HISTORY OF SPECIFIC SUBJECTS. INTERCEPT is the previously untold - and highly classified - story of the melding of technology and espionage. Gordon Corera's compelling narrative takes us from the Second World War through the Cold War and the birth of the internet to the present era of hackers and surveillance. Rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US and China, this is the secret history of how spying drove the rise of the computer. Within the confines of Britain's Second World War code-breaking establishment at Bletchley Park, the work of men like Alan Turing led to the birth of electronic espionage and the first computer, Colossus. In the following decades, computers have transformed the business of espionage, from Cold War spy hunting to today's data-driven pursuit of terrorists and industrial-scale cyber-espionage against corporations Geschichte 1948-2010 gnd rswk-swf Geschichte gnd rswk-swf Computer crimes / History Electronic intelligence / History Internet in espionage / History Cyber intelligence (Computer security) / History Internet / Security measures / History Internet in espionage Spionage gnd Information warfare gnd Computerkriminalität gnd Computersicherheit gnd Geschichte Information warfare (DE-588)4461975-3 gnd rswk-swf Spionage (DE-588)4056287-6 gnd rswk-swf Geheimdienst (DE-588)4019737-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Ausspähen von Daten (DE-588)7714184-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 s Computersicherheit (DE-588)4274324-2 s Information warfare (DE-588)4461975-3 s Spionage (DE-588)4056287-6 s Geschichte 1948-2010 z DE-604 Ausspähen von Daten (DE-588)7714184-2 s Geheimdienst (DE-588)4019737-2 s Datensicherung (DE-588)4011144-1 s Geschichte z Digitalisierung BSB Muenchen - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028221140&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Corera, Gordon Intercept the secret history of computers and spies Computer crimes / History Electronic intelligence / History Internet in espionage / History Cyber intelligence (Computer security) / History Internet / Security measures / History Internet in espionage Spionage gnd Information warfare gnd Computerkriminalität gnd Computersicherheit gnd Geschichte Information warfare (DE-588)4461975-3 gnd Spionage (DE-588)4056287-6 gnd Geheimdienst (DE-588)4019737-2 gnd Computersicherheit (DE-588)4274324-2 gnd Computerkriminalität (DE-588)4010452-7 gnd Ausspähen von Daten (DE-588)7714184-2 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4056287-6 (DE-588)4019737-2 (DE-588)4274324-2 (DE-588)4010452-7 (DE-588)7714184-2 (DE-588)4011144-1 |
title | Intercept the secret history of computers and spies |
title_auth | Intercept the secret history of computers and spies |
title_exact_search | Intercept the secret history of computers and spies |
title_full | Intercept the secret history of computers and spies Gordon Corera |
title_fullStr | Intercept the secret history of computers and spies Gordon Corera |
title_full_unstemmed | Intercept the secret history of computers and spies Gordon Corera |
title_short | Intercept |
title_sort | intercept the secret history of computers and spies |
title_sub | the secret history of computers and spies |
topic | Computer crimes / History Electronic intelligence / History Internet in espionage / History Cyber intelligence (Computer security) / History Internet / Security measures / History Internet in espionage Spionage gnd Information warfare gnd Computerkriminalität gnd Computersicherheit gnd Geschichte Information warfare (DE-588)4461975-3 gnd Spionage (DE-588)4056287-6 gnd Geheimdienst (DE-588)4019737-2 gnd Computersicherheit (DE-588)4274324-2 gnd Computerkriminalität (DE-588)4010452-7 gnd Ausspähen von Daten (DE-588)7714184-2 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Computer crimes / History Electronic intelligence / History Internet in espionage / History Cyber intelligence (Computer security) / History Internet / Security measures / History Internet in espionage Spionage Information warfare Computerkriminalität Computersicherheit Geschichte Geheimdienst Ausspähen von Daten Datensicherung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028221140&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT coreragordon interceptthesecrethistoryofcomputersandspies |