Biomedical Defense Principles to Counter DNA Deep Hacking
Autor Rocky Termaninien Limba Engleză Hardback – 5 dec 2022
Readers will learn about the methods and possible effects of bio-hacking attacks, and, in turn the best methods of autonomic and cognitive defense strategies to detect, capture, analyze, and neutralize DNA bio-hacking attacks, including the versatile DNA symmetrical AI Cognitive Defense System (ACDS). DNA bio-hackers plan to destroy, distort and contaminate confidential, healthy DNA records and potentially create corrupted genes for erroneous diagnosis of illnesses, disease genesis and even wrong DNA fingerprinting for criminal forensics investigations.
- Presents a comprehensive reference for the fascinating emerging technology of DNA storage, the first book to present this level of detail and scope of coverage of this groundbreaking field
- Helps readers understand key concepts of how DNA works as an information storage system and how it can be applied as a new technology for data storage
- Provides readers with key technical understanding of technologies used to work with DNA data encoding, such as CRISPR, as well as emerging areas of application and ethical concern, such as smart cities, cybercrime, and cyber warfare
- Includes coverage of synthesizing DNA-encoded data, sequencing DNA-encoded data, and fusing DNA with Digital Immunity Ecosystem (DIE)
Preț: 850.76 lei
Preț vechi: 1059.35 lei
-20% Nou
Puncte Express: 1276
Preț estimativ în valută:
162.80€ • 170.40$ • 135.50£
162.80€ • 170.40$ • 135.50£
Carte tipărită la comandă
Livrare economică 24 martie-07 aprilie
Livrare express 22-28 februarie pentru 219.41 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780323999144
ISBN-10: 032399914X
Pagini: 382
Ilustrații: 170 illustrations (40 in full color)
Dimensiuni: 216 x 276 x 28 mm
Greutate: 1.17 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 032399914X
Pagini: 382
Ilustrații: 170 illustrations (40 in full color)
Dimensiuni: 216 x 276 x 28 mm
Greutate: 1.17 kg
Editura: ELSEVIER SCIENCE
Cuprins
1. Structure of DNA and the landscape of DNA Deep Hacking (DDH)
2. History of bio-hackers, psychological profiling and fingerprinting of the bio-hacker. The story the recent North Korean WannaCry ransomware attack
3. Code injection and the E. Coli story as the carrier of malware DNA code
4. CRISPR the magical knife. The anatomy and mechanics. The good, the bad and the ugly
5. The Genome vandalism. "When ISIS Meets CRISPR" the blueprint from Hell. Generating DNA sequence from payload binary code
6. Synthesis of DNA with encoded malicious code. The E. Coli Plasmids story
7. Third party role of the Dark Web and the Deep Web, The Onion Router (TOR)
8. How to select a target. Planning the bio-attack, damage, and vulnerability of the attack
9. The Drone technology, Transport strategy and risk evaluation
10. Drone delivery methods, how to communicate with the destination
11. The Bio-Stuxnet malicious DNA attack. Attack simulation and review results.
12. Translation and storage of the DNA contaminated code
13. Encryption technology and camouflaging contaminated DNA-code injection
14. Detection of surprise bio-attack, the bio-response, response of Government agencies. DNA bio-defense. Attack forecast and eradication, security measure to protect the DNA data files
15. Reverse Engineering technology
16. The controversy of CRISPR with religion and ethics advocates to control evolution and embryology enhancement, and elimination of genetically inherited diseases
Appendix
Epilogue
2. History of bio-hackers, psychological profiling and fingerprinting of the bio-hacker. The story the recent North Korean WannaCry ransomware attack
3. Code injection and the E. Coli story as the carrier of malware DNA code
4. CRISPR the magical knife. The anatomy and mechanics. The good, the bad and the ugly
5. The Genome vandalism. "When ISIS Meets CRISPR" the blueprint from Hell. Generating DNA sequence from payload binary code
6. Synthesis of DNA with encoded malicious code. The E. Coli Plasmids story
7. Third party role of the Dark Web and the Deep Web, The Onion Router (TOR)
8. How to select a target. Planning the bio-attack, damage, and vulnerability of the attack
9. The Drone technology, Transport strategy and risk evaluation
10. Drone delivery methods, how to communicate with the destination
11. The Bio-Stuxnet malicious DNA attack. Attack simulation and review results.
12. Translation and storage of the DNA contaminated code
13. Encryption technology and camouflaging contaminated DNA-code injection
14. Detection of surprise bio-attack, the bio-response, response of Government agencies. DNA bio-defense. Attack forecast and eradication, security measure to protect the DNA data files
15. Reverse Engineering technology
16. The controversy of CRISPR with religion and ethics advocates to control evolution and embryology enhancement, and elimination of genetically inherited diseases
Appendix
Epilogue