001562150 000__ 02831nam\\2200541\i\4500 001562150 001__ 1562150 001562150 003__ MiAaPQ 001562150 005__ 20241002094116.0 001562150 006__ m\\\\\o\\d\\\\\\\\ 001562150 007__ cr\cn\nnnunnun 001562150 008__ 240729s2018\\\\dcu\\\\\ob\\\\001\0\eng\d 001562150 020__ $$z9781626165656 001562150 020__ $$a9781626165663 001562150 035__ $$a(MiAaPQ)EBC31477194 001562150 035__ $$a(Au-PeEL)EBL31477194 001562150 035__ $$a(OCoLC)1376374808 001562150 040__ $$aMiAaPQ$$beng$$erda$$epn$$cMiAaPQ$$dMiAaPQ 001562150 050_4 $$aU264$$b.F888 2018 001562150 0820_ $$a355.825119$$223 001562150 1001_ $$aFutter, Andrew,$$d1983-$$eauthor. 001562150 24510 $$aHacking the Bomb :$$bCyber Threats and Nuclear Weapons /$$cAndrew Futter ; foreword by Lord Des Browne. 001562150 250__ $$aFirst edition. 001562150 264_1 $$aWashington, DC :$$bGeorgetown University Press,$$c[2018] 001562150 264_4 $$c©2018 001562150 300__ $$a1 online resource (xiv, 197 pages). 001562150 336__ $$atext$$btxt$$2rdacontent 001562150 337__ $$acomputer$$bc$$2rdamedia 001562150 338__ $$aonline resource$$bcr$$2rdacarrier 001562150 504__ $$aIncludes bibliographical references and index. 001562150 5050_ $$aIntroduction : war games redux? -- The nature of the challenge -- What exactly do we mean by cyber? -- How and why are nuclear systems vulnerable or at risk? -- What might hackers do to nuclear systems? -- Stealing nuclear secrets -- Could cyber-attacks lead to nuclear use or stop nuclear systems from working? -- The cyber-nuclear nexus at the strategic level -- Nuclear weapons, attribution and cyber deterrence -- Nuclear stability, crisis management, and a cyber-nuclear security dilemma -- Challenges for our cyber-nuclear future -- Nuclear weapons modernisation and the future computerised global nuclear environment -- Conclusion : managing our cyber-nuclear future. 001562150 506__ $$aAccess limited to authorized users. 001562150 588__ $$aDescription based on print version record. 001562150 650_0 $$aNuclear weapons.$$0(DLC)sh 85092943 001562150 650_0 $$aNuclear weapons$$xSecurity measures.$$0(DLC)sh 85092943 001562150 650_0 $$aHacking.$$0(DLC)sh2013002597 001562150 650_0 $$aCommand and control systems.$$zUnited States$$0(DLC)sh 99002475 001562150 650_0 $$aCyberspace operations (Military science)$$0(DLC)sh2013000988 001562150 650_0 $$aInformation warfare.$$zUnited States$$0(DLC)sh2008123698 001562150 655_0 $$aElectronic books 001562150 7001_ $$aBrowne, Des,$$ewriter of foreword.$$0(OCoLC)oca00981436 001562150 77608 $$iPrint version:$$aFutter, Andrew, 1983-$$tHacking the Bomb : Cyber Threats and Nuclear Weapons.$$bFirst edition.$$dWashington, DC : Georgetown University Press, c2018 $$z9781626165656 $$w(DLC) 2017035576 001562150 852__ $$bebk 001562150 85640 $$3ProQuest Ebook Central Academic Complete $$uhttps://univsouthin.idm.oclc.org/login?url=https://ebookcentral.proquest.com/lib/usiricelib-ebooks/detail.action?docID=31477194$$zOnline Access 001562150 909CO $$ooai:library.usi.edu:1562150$$pGLOBAL_SET 001562150 980__ $$aBIB 001562150 980__ $$aEBOOK 001562150 982__ $$aEbook 001562150 983__ $$aOnline