Using the history of the Conficker computer worm as a centerpiece, the author discusses the war raging over the Internet between those who want to exploit it and those who aim to protect it.
| hid | mid | miid | nid | wid | location_code | location | barcode | callnum | dewey | created | updated |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 1134164 | 4819479 | 2293 | 98999 | 160913 | BRHS | 114 | BRHS40195 | 364.16 BOW | 364.16 | 1581465224 | 1736518457 |
| 1888161 | 5482362 | 2443 | 98999 | 160913 | GCHS | 214 | GCHS313441 | 005.8 BOW | 5.8 | 1582575937 | 1742569409 |
| 2601806 | 6105937 | 2367 | 98999 | 160913 | WAS | 469 | WOS0302303 | 005.8 BOW | 5.8 | 1637782573 | 1736800991 |
| 2601807 | 6105937 | 2367 | 98999 | 160913 | WAS | 469 | WOS0302302 | 005.8 BOW | 5.8 | 1637782573 | 1736800991 |