skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Countdown to Zero Day : Stuxnet and the launch of the world's first digital weapon Preview this item
ClosePreview this item
Checking...

Countdown to Zero Day : Stuxnet and the launch of the world's first digital weapon

Author: Kim Zetter
Publisher: New York : Crown Publishers, [2014]
Edition/Format:   Print book : English : First editionView all editions and formats
Summary:
"Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran's nuclear efforts and shows how its existence has ushered in a new age of warfare--one in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Narrative non-fiction
Case studies
Document Type: Book
All Authors / Contributors: Kim Zetter
ISBN: 9780770436179 077043617X 9780770436193 0770436196 0770436188 9780770436186
OCLC Number: 858126251
Description: 433 pages ; 25 cm
Contents: Prologue : The case of the centrifuges --
Early warning --
500 kilobytes of mystery --
Natanz --
Stuxnet deconstructed --
Springtime for Ahmadinejad --
Digging for zero days --
Zero-day paydays --
The payload --
Industrial controls out of control --
Precision weapon --
A digital plot is hatched --
A new fighting domain --
Digital warheads --
Son of Stuxnet --
Flame --
Olympic Games --
The mystery of the centrifuges --
Qualified success --
Digital Pandora.
Responsibility: Kim Zetter.
More information:

Abstract:

"Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran's nuclear efforts and shows how its existence has ushered in a new age of warfare--one in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery--apparently as much to the technicians replacing the centrifuges as to the inspectors observing them. Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly. At first, the firm's programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity. They had, they soon learned, stumbled upon the world's first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet's planning, execution, and discovery, covering its genesis in the corridors of Bush's White House and its unleashing on systems in Iran--and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making. But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today's flourishing zero-day "grey markets," in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike--and shows us just what might happen should our infrastructure be targeted by such an attack. Propelled by Zetter's unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war."--

"This story of the virus that destroyed Iran's nuclear centrifuges, by top cybersecurity journalist Kim Zetter, shows that the door has been opened on a new age of warfare--one in which a digital attack can have the same destructive capability as a megaton bomb dropped from an airplane"--

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/858126251<\/a>> # Countdown to Zero Day : Stuxnet and the launch of the world\'s first digital weapon<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a>, schema:Book<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"858126251<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/nyu<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/viaf.org\/viaf\/130168302<\/a>> ; # United States.<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/diplomatic_relations<\/a>> ; # Diplomatic relations<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/internationale_politik<\/a>> ; # Internationale Politik<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/computers_general<\/a>> ; # COMPUTERS--General<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/355.4\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/cyberspace_operations_military_science_united_states<\/a>> ; # Cyberspace operations (Military science)--United States<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/computer_crimes_investigation_iran<\/a>> ; # Computer crimes--Investigation--Iran<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/network_centric_operations_military_science<\/a>> ; # Network-centric operations (Military science)<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Place\/united_states_iran<\/a>> ; # United States--Iran.<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/nuclear_nonproliferation<\/a>> ; # Nuclear nonproliferation<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/militartechnik<\/a>> ; # Milit\u00E4rtechnik<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/cyberspace_operations_military_science<\/a>> ; # Cyberspace operations (Military science)<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/sabotage_iran<\/a>> ; # Sabotage--Iran<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/uranium_enrichment_equipment_and_supplies<\/a>> ; # Uranium enrichment--Equipment and supplies<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Place\/forenta_staterna<\/a>> ; # F\u00F6renta staterna.<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/network_centric_operations_military_science_israel<\/a>> ; # Network-centric operations (Military science)--Israel<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/rootkits_computer_software<\/a>> ; # Rootkits (Computer software)<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh2010103970<\/a>> ; # Nuclear nonproliferation--Iran<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/information_warfare<\/a>> ; # Information warfare<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/nuclear_arms_control_iran<\/a>> ; # Nuclear arms control--Iran<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/political_science_political_freedom_&_security_intelligence<\/a>> ; # POLITICAL SCIENCE--Political Freedom & Security--Intelligence<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/it_forensisk_verksamhet<\/a>> ; # IT-forensisk verksamhet<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/1204889<\/a>> ; # Iran.<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Place\/iran<\/a>> ; # Iran.<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/vapnade_styrkor<\/a>> ; # V\u00E4pnade styrkor<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/network_centric_operations_military_science_united_states<\/a>> ; # Network-centric operations (Military science)--United States<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Place\/iran_united_states<\/a>> ; # Iran--United States.<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/computers_security_general<\/a>> ; # COMPUTERS--Security--General<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/information_technology<\/a>> ; # Information technology<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/1359266<\/a>> ; # Armed Forces (United States)<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/diplomatiska_forbindelser<\/a>> ; # Diplomatiska f\u00F6rbindelser<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/1204236<\/a>> ; # Israel.<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/1204155<\/a>> ; # United States.<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/sabotage<\/a>> ; # Sabotage<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Place\/israel<\/a>> ; # Israel.<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/computer_crimes_investigation<\/a>> ; # Computer crimes--Investigation<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/nuclear_arms_control<\/a>> ; # Nuclear arms control<\/span>\n\u00A0\u00A0\u00A0\nschema:bookEdition<\/a> \"First edition.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> bgn:PrintBook<\/a> ;\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/viaf.org\/viaf\/30632795<\/a>> ; # Kim Zetter<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2014<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Prologue : The case of the centrifuges -- Early warning -- 500 kilobytes of mystery -- Natanz -- Stuxnet deconstructed -- Springtime for Ahmadinejad -- Digging for zero days -- Zero-day paydays -- The payload -- Industrial controls out of control -- Precision weapon -- A digital plot is hatched -- A new fighting domain -- Digital warheads -- Son of Stuxnet -- Flame -- Olympic Games -- The mystery of the centrifuges -- Qualified success -- Digital Pandora.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"\"This story of the virus that destroyed Iran\'s nuclear centrifuges, by top cybersecurity journalist Kim Zetter, shows that the door has been opened on a new age of warfare--one in which a digital attack can have the same destructive capability as a megaton bomb dropped from an airplane\"--<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"\"Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran\'s nuclear efforts and shows how its existence has ushered in a new age of warfare--one in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery--apparently as much to the technicians replacing the centrifuges as to the inspectors observing them. Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly. At first, the firm\'s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity. They had, they soon learned, stumbled upon the world\'s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet\'s planning, execution, and discovery, covering its genesis in the corridors of Bush\'s White House and its unleashing on systems in Iran--and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making. But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today\'s flourishing zero-day \"grey markets,\" in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike--and shows us just what might happen should our infrastructure be targeted by such an attack. Propelled by Zetter\'s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war.\"--<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/1391810230<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Case studies<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Narrative non-fiction<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:image<\/a> <http:\/\/9780770436179.jpg<\/a>> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Countdown to Zero Day : Stuxnet and the launch of the world\'s first digital weapon<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"858126251<\/span>\" ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9780770436186<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9780770436179<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9780770436193<\/a>> ;\u00A0\u00A0\u00A0\numbel:isLike<\/a> <http:\/\/bnb.data.bl.uk\/id\/resource\/GBB4B9078<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/858126251<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/355.4\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Place\/forenta_staterna<\/a>> # F\u00F6renta staterna.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"F\u00F6renta staterna.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Place\/iran<\/a>> # Iran.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Iran.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Place\/iran_united_states<\/a>> # Iran--United States.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Iran--United States.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Place\/israel<\/a>> # Israel.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Israel.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Place\/united_states_iran<\/a>> # United States--Iran.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"United States--Iran.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/computer_crimes_investigation<\/a>> # Computer crimes--Investigation<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer crimes--Investigation<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/computer_crimes_investigation_iran<\/a>> # Computer crimes--Investigation--Iran<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh85029493<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer crimes--Investigation--Iran<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/computers_general<\/a>> # COMPUTERS--General<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--General<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/computers_security_general<\/a>> # COMPUTERS--Security--General<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Security--General<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/cyberspace_operations_military_science<\/a>> # Cyberspace operations (Military science)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cyberspace operations (Military science)<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/cyberspace_operations_military_science_united_states<\/a>> # Cyberspace operations (Military science)--United States<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh2013000988<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cyberspace operations (Military science)--United States<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/diplomatic_relations<\/a>> # Diplomatic relations<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Diplomatic relations<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/diplomatiska_forbindelser<\/a>> # Diplomatiska f\u00F6rbindelser<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Diplomatiska f\u00F6rbindelser<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/information_technology<\/a>> # Information technology<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Information technology<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/information_warfare<\/a>> # Information warfare<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Information warfare<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/internationale_politik<\/a>> # Internationale Politik<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Internationale Politik<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/it_forensisk_verksamhet<\/a>> # IT-forensisk verksamhet<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"IT-forensisk verksamhet<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/militartechnik<\/a>> # Milit\u00E4rtechnik<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Milit\u00E4rtechnik<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/network_centric_operations_military_science<\/a>> # Network-centric operations (Military science)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Network-centric operations (Military science)<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/network_centric_operations_military_science_israel<\/a>> # Network-centric operations (Military science)--Israel<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh2009009407<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Network-centric operations (Military science)--Israel<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/network_centric_operations_military_science_united_states<\/a>> # Network-centric operations (Military science)--United States<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh2009009407<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Network-centric operations (Military science)--United States<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/nuclear_arms_control<\/a>> # Nuclear arms control<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Nuclear arms control<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/nuclear_arms_control_iran<\/a>> # Nuclear arms control--Iran<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh85092943<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Nuclear arms control--Iran<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/nuclear_nonproliferation<\/a>> # Nuclear nonproliferation<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Nuclear nonproliferation<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/political_science_political_freedom_&_security_intelligence<\/a>> # POLITICAL SCIENCE--Political Freedom & Security--Intelligence<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"POLITICAL SCIENCE--Political Freedom & Security--Intelligence<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/rootkits_computer_software<\/a>> # Rootkits (Computer software)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Rootkits (Computer software)<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/sabotage<\/a>> # Sabotage<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Sabotage<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/sabotage_iran<\/a>> # Sabotage--Iran<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh85116210<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Sabotage--Iran<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/uranium_enrichment_equipment_and_supplies<\/a>> # Uranium enrichment--Equipment and supplies<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh85141286<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Uranium enrichment--Equipment and supplies<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1391810230#Topic\/vapnade_styrkor<\/a>> # V\u00E4pnade styrkor<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"V\u00E4pnade styrkor<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/authorities\/subjects\/sh2010103970<\/a>> # Nuclear nonproliferation--Iran<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Nuclear nonproliferation--Iran<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/nyu<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"nyu<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/1204155<\/a>> # United States.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"United States.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/1204236<\/a>> # Israel.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Israel.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/1204889<\/a>> # Iran.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Iran.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/1359266<\/a>> # Armed Forces (United States)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Armed Forces (United States)<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/130168302<\/a>> # United States.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Organization<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"United States.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/30632795<\/a>> # Kim Zetter<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Zetter<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Kim<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Kim Zetter<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9780770436179<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"077043617X<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9780770436179<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9780770436186<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"0770436188<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9780770436186<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9780770436193<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"0770436196<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9780770436193<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/858126251<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/858126251<\/a>> ; # Countdown to Zero Day : Stuxnet and the launch of the world\'s first digital weapon<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2020-01-10<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Content-negotiable representations<\/p>\n