000 03675cam a22006011i 4500
001 9780367853860
003 FlBoTFG
005 20220724194418.0
006 m d
007 cr |||||||||||
008 200313s2020 flua ob 001 0 eng d
040 _aOCoLC-P
_beng
_erda
_epn
_cOCoLC-P
020 _a9781000081176
_q(ePub ebook)
020 _a1000081176
_q(ePub ebook)
020 _a9781000081039
_q(PDF ebook)
020 _a1000081036
_q(PDF ebook)
020 _a9781000081107
_q(Mobipocket ebook)
020 _a1000081109
_q(Mobipocket ebook)
020 _a9780367853860
_q(ebook)
020 _a0367853868
_q(ebook)
020 _z9780367424954 (hbk.)
020 _z0367424959
024 7 _a10.1201/9780367853860
_2doi
035 _a(OCoLC)1173714988
_z(OCoLC)1162020258
_z(OCoLC)1164389414
035 _a(OCoLC-P)1173714988
050 4 _aTK5105.59
072 7 _aCOM
_x053000
_2bisacsh
072 7 _aJKV
_2bicssc
082 0 4 _a355.4
_223
100 1 _aAbaimov, Stanislav,
_d1989-
_eauthor.
245 1 0 _aCyber arms :
_bsecurity in cyberspace /
_cStanislav Abaimov, Cyber Security and Electronic Engineering, University of Rome, Tor Vergata Rome, Italy, Maurizio Martellini, Department of Science and High Technology, University of Uninsubria Como, Italy.
264 1 _aBoca Raton, FL :
_bCRC Press, Taylor & Francis Group,
_c[2020]
300 _a1 online resource :
_billustrations (black and white, and colour)
336 _atext
_2rdacontent
336 _astill image
_2rdacontent
337 _acomputer
_2rdamedia
338 _aonline resource
_2rdacarrier
500 _a1. Cyber offence landscape. 2. Cyber defence and countermeasures. 3. Future challenges. 4. Conclusion.
520 _aThis book will raise awareness on emerging challenges of AIempowered cyber arms used in weapon systems and stockpiled in the global cyber arms race. Based on real life events, it provides a comprehensive analysis of cyber offensive and defensive landscape, analyses the cyber arms evolution from prank malicious codes into lethal weapons of mass destruction, reveals the scale of cyber offensive conflicts, explores cyber warfare mutation, warns about cyber arms race escalation and use of Artificial Intelligence (AI) for military purposes. It provides an expert insight into the current and future malicious and destructive use of the evolved cyber arms, AI and robotics, with emphasis on cyber threats to CBRNe and critical infrastructure. The book highlights international efforts in regulating the cyber environment, reviews the best practices of the leading cyber powers and their controversial approaches, recommends responsible state behaviour. It also proposes information security and cyber defence solutions and provides definitions for selected conflicting cyber terms. The disruptive potential of cyber tools merging with military weapons is examined from the technical point of view, as well as legal, ethical, and political perspectives.
588 _aOCLC-licensed vendor bibliographic record.
650 0 _aInternet
_xSecurity measures.
650 0 _aElectronic countermeasures.
650 0 _aSecurity, International.
650 0 _aCyberterrorism.
650 0 _aMilitary weapons
_xTechnological innovations.
650 0 _aCyberinfrastructure
_xSecurity measures.
650 0 _aComputer security.
650 7 _aCOMPUTERS / Security / General
_2bisacsh
700 1 _aMartellini, M.
_q(Maurizio),
_eauthor.
856 4 0 _3Read Online
_uhttps://www.taylorfrancis.com/books/9780367853860
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
942 _2lcc
_cEBK
999 _c17315
_d17315