Cyber threats and nuclear weapons / (Record no. 80192)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02164cam a22003017i 4500 |
001 - CONTROL NUMBER | |
control field | gwcwbfwmd7fw77sd |
003 - CONTROL NUMBER IDENTIFIER | |
control field | SE-LIBR |
005 - DATE AND TIME | |
control field | 20220831105705.0 |
008 - GENERAL INFORMATION | |
fixed length control field | 220829s2021 cau|||||||||||000 0|eng|d |
020 ## - ISBN | |
ISBN | 9781503630390 |
020 ## - ISBN | |
ISBN | 1503630390 |
040 ## - CATALOGUING LIBRARY | |
Original cataloging library | Sipr |
041 ## - LANGUAGE CODE | |
Language code | eng |
100 1# - AUTHOR | |
Personal name | Lin, Herbert |
245 10 - TITLE | |
Title | Cyber threats and nuclear weapons / |
Author, etc | Herbert Lin |
260 ## - PUBLICATION DATA | |
Place of publication | Stanford, CA : |
Publisher | Stanford University Press, |
Year | 2021 |
300 ## - PAGES ETC | |
Pages | 200 p. |
500 ## - GENERAL NOTE | |
General note | SIP2209 |
520 8# - SUMMARY | |
Summary, etc | The technology controlling United States nuclear weapons predates the Internet. Updating the technology for the digital era is necessary, but it comes with the risk that anything digital can be hacked. Moreover, using new systems for both nuclear and non-nuclear operations will lead to levels of nuclear risk hardly imagined before. This book is the first to confront these risks comprehensively. 0With Cyber Threats and Nuclear Weapons, Herbert Lin provides a clear-eyed breakdown of the cyber risks to the U.S. nuclear enterprise. Featuring a series of scenarios that clarify the intersection of cyber and nuclear risk, this book guides readers through a little-understood element of the risk profile that government decision-makers should be anticipating. What might have happened if the Cuban Missile Crisis took place in the age of Twitter, with unvetted information swirling around? What if an adversary announced that malware had compromised nuclear systems, clouding the confidence of nuclear decision-makers? 0Cyber Threats and Nuclear Weapons, the first book to consider cyber risks across the entire nuclear enterprise, concludes with crucial advice on how government can manage the tensions between new nuclear capabilities and increasing cyber risk. This is an invaluable handbook for those ready to confront the unique challenges of cyber nuclear risk. |
650 ## - KEYWORD | |
Keyword | nuclear weapons |
Subdivision | computers |
650 ## - KEYWORD | |
Keyword | nuclear warfare |
Subdivision | military operations |
650 ## - KEYWORD | |
Keyword | information technology |
Subdivision | security |
653 ## - UNCONTROLLED KEYWORD | |
Uncontrolled keyword | cyber threats |
653 ## - UNCONTROLLED KEYWORD | |
Uncontrolled keyword | cyber space |
653 ## - UNCONTROLLED KEYWORD | |
Uncontrolled keyword | cyber warfare |
852 ## - LOCATION | |
Classification part | 623.454.8 Lin |
942 ## - ITEM TYPE (KOHA) | |
Koha item type | monograph |
Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Date acquired | Total Checkouts | Total Renewals | Full call number | Acquisition no. | Checked out | Date last seen | Date checked out | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
SIPRI Library and Documentation | SIPRI Library and Documentation | 2022-08-31 | 1 | 32 | 623.454.8 Lin | 22/146 | 2025-05-17 | 2022-08-31 | 2022-08-31 | monograph |