Catalog

Record Details

Catalog Search


Search Results Showing Item 1 of 1

Manipulated : inside the cyber war to hijack elections and distort the truth

Available copies

  • 1 of 1 copy available at Kirtland Community College.

Current holds

0 current holds with 1 total copy.

Location Call Number / Copy Notes Barcode Shelving Location Status Due Date
Kirtland Community College Library JF 1083 .P39 2020 30775305553290 General Collection Available -

Record details

  • ISBN: 9781538133507
  • ISBN: 1538133504
  • ISBN: 9781538133514 (ePub ebook)
  • Physical Description: print
    xi, 193 pages ; 24 cm
  • Publisher: Lanham : Rowman & Littlefield, [2020]

Content descriptions

Bibliography, etc. Note: Includes bibliographical references (pages 153-182) and index.
Formatted Contents Note: How did we get here? -- Motives and targets: Manipulation in a post-truth , post-trust era -- How do you know what you think you know? -- The manipulators and their methods -- Hackers in the trenches -- Exclusive interview: Anatomy of a manipulation campaign -- The US elections, 2016 to 2018 -- America isn't the only target -- The next target: What attacks can we expect in 2020 and beyond? -- Your worst nightmare: The death of democracy -- What can you do?
Summary, etc.: "Stories from the Frontlines of the Global Cyberwar Cybersecurity expert Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. She investigates the cyberwarriors who are planning tomorrow's attacks, weaving a fascinating yet bone-chilling tale of Artificial Intelligent mutations carrying out attacks without human intervention, "deepfake" videos that look real to the naked eye, and chatbots that beget other chatbots. Finally, Payton offers readers telltale signs that their most fundamental beliefs are being meddled with and actions they can take or demand that corporations and elected officials must take before it is too late"--
Subject: Elections Corrupt practices
Espionage
Disinformation Political aspects
Internet in political campaigns
Internet Security measures
Cyber intelligence (Computer security)
Search Results Showing Item 1 of 1

Additional Resources