Using the history of the Conficker computer worm as a centerpiece, the author discusses the war raging over the Internet between those who want to exploit it and those who aim to protect it.
hid | mid | miid | nid | wid | location_code | location | barcode | callnum | dewey | created | updated |
---|---|---|---|---|---|---|---|---|---|---|---|
1134164 | 4819479 | 2293 | 98999 | 160913 | BRHS | 114 | BRHS40195 | 364.16 BOW | 364.16 | 1581465224 | 1736518457 |
1888161 | 5482362 | 1791 | 98999 | 160913 | GCHS | 214 | GCHS313441 | 005.8 BOW | 5.8 | 1582575937 | 1662467957 |
2601806 | 6105937 | 2367 | 98999 | 160913 | WAS | 469 | WOS0302303 | 005.8 BOW | 5.8 | 1637782573 | 1736800991 |
2601807 | 6105937 | 2367 | 98999 | 160913 | WAS | 469 | WOS0302302 | 005.8 BOW | 5.8 | 1637782573 | 1736800991 |