Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Hacking the bomb : cyber threats and nuclear weapons
by
Futter, Andrew, 1983- author
in
Nuclear weapons.
/ Nuclear weapons Security measures.
/ Hacking.
/ Command and control systems.
/ Cyberspace operations (Military science)
/ Information warfare.
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Hacking the bomb : cyber threats and nuclear weapons
by
Futter, Andrew, 1983- author
in
Nuclear weapons.
/ Nuclear weapons Security measures.
/ Hacking.
/ Command and control systems.
/ Cyberspace operations (Military science)
/ Information warfare.
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Book
Hacking the bomb : cyber threats and nuclear weapons
Available to read in the library!
Request Book From Autostore
and Choose the Collection Method
Overview
Are nuclear arsenals safe from cyber attack? We may be standing at the edge of a major technological challenge to global nuclear order. The increasing sophistication of hacking and cyber weapons, information warfare capabilities, and other dynamics of the cyber age are challenging the management, safeguards, and warning systems for nuclear weapons. Every nuclear power is currently modernizing its nuclear command, control, and communications (NC3) capabilities, but there is a danger that in upgrading computer systems and making NC3 more networked, states may inadvertently also make their nuclear arsenals more vulnerable to breaches, interference, or even unintended use. In addition to implications for NC3, this new age also affects nuclear strategy, escalation dynamics in crisis management, and the ability to safeguard nuclear secrets. Andrew Futter cuts through the hype surrounding these challenges and provides a framework through which to understand and proactively address the implications of this emerging cyber-nuclear nexus.
Publisher
Georgetown University Press
Subject
ISBN
9781626165649, 9781626165656
Item info:
1
item available
1
item total in all locations
| Call Number | Copies | Material | Location |
|---|---|---|---|
| U264.F877 2018 | 1 | BOOK | AUTOSTORE |
MBRLCatalogueRelatedBooks
Related Items
Related Items
This website uses cookies to ensure you get the best experience on our website.