Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges
Terrorism, Security, and Computation

Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges

Threats and Counter Efforts

    • 139,99 €
    • 139,99 €

Publisher Description

This book covers the security and safety of CBRNE assets and management, and illustrates which risks may emerge and how to counter them through an enhanced risk management approach. It also tackles the CBRNE-Cyber threats, their risk mitigation measures and the relevance of raising awareness and education enforcing a CBRNE-Cy security culture. The authors present international instruments and legislation to deal with these threats, for instance the UNSCR1540.

The authors address a multitude of stakeholders, and have a multidisciplinary nature dealing with cross-cutting areas like the convergence of biological and chemical, the development of edging technologies, and in the cyber domain, the impelling risks due to the use of malwares against critical subsystems of CBRN facilities. Examples are provided in this book.
Academicians, diplomats, technicians and engineers working in the chemical, biological, radiological, nuclear, explosive and cyber fields will find this book valuable as a reference. Students studying in these related fields will also find this book useful as a reference.

GENRE
Computing & Internet
RELEASED
2017
30 October
LANGUAGE
EN
English
LENGTH
417
Pages
PUBLISHER
Springer International Publishing
SIZE
5.5
MB

More Books by Maurizio Martellini & Andrea Malizia

Machine Learning for Cyber Agents Machine Learning for Cyber Agents
2022
Cyber Arms Cyber Arms
2020
21st Century Prometheus 21st Century Prometheus
2020
Information Security of Highly Critical Wireless Networks Information Security of Highly Critical Wireless Networks
2017
Cyber Security Cyber Security
2013

Other Books in This Series

Discovering Hidden Gems in Foreign Languages Discovering Hidden Gems in Foreign Languages
2023
Detecting Trust and Deception in Group Interaction Detecting Trust and Deception in Group Interaction
2021
A Machine Learning Based Model of Boko Haram A Machine Learning Based Model of Boko Haram
2020
Anomaly Detection Principles and Algorithms Anomaly Detection Principles and Algorithms
2017
The Global Cyber-Vulnerability Report The Global Cyber-Vulnerability Report
2015
Violence in Nigeria Violence in Nigeria
2015