ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب 21st Century Prometheus

دانلود کتاب پرومتئوس قرن بیست و یکم

21st Century Prometheus

مشخصات کتاب

21st Century Prometheus

ویرایش:  
نویسندگان:   
سری:  
ISBN (شابک) : 3030282848, 9783030282844 
ناشر: Springer 
سال نشر: 2020 
تعداد صفحات: 373 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 6 مگابایت 

قیمت کتاب (تومان) : 31,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 7


در صورت تبدیل فایل کتاب 21st Century Prometheus به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب پرومتئوس قرن بیست و یکم نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Contents
Acronyms and Abbreviations
Introduction
	References
Part I: The Changing CBRN Risk Landscape
	The Twenty-first Century: The Epoch of Advanced Missile Systems and Growing Vulnerabilities
		1 The New Strategic Layer
			1.1 Boost-Phase Defence
		2 Hypersonic Missiles
			2.1 Hypersonic Cruise Missile
			2.2 Hypersonic Boost-Glide Vehicles
			2.3 Consequences for International Security and Strategic Stability Between U.S., China and Russia
		3 Nuclear-Powered Engine for Cruise Missiles and Torpedoes: Burevestnik and Status 6
		4 Expanding “ASAT States’ Club”
		5 Usable Nuclear Weapons: Low-Yield Nuclear Weapons
		6 A Brief Look at the Military Applications of AI
		7 Conclusions
		References
	The Dark Side of Nuclear Energy: Risks of Proliferation from Domestic Fuel Cycle Technologies
		1 Introduction
		2 The Dual Use Nature of Nuclear Energy
		3 Risks from the Nuclear Fuel Cycle Technologies
		4 Impact of Other Technical Developments
		5 Supply and Demand for Nuclear Energy
		6 Policy Responses
		7 The Special Case of Iran
		8 Future Developments
		9 The Prospects for Systemic Solutions
		10 Conclusions
		References
	Chemical and Biological Risks in the Twenty-first Century
		1 Introduction
		2 Convergence at the Intersection of Chemistry, Biology and Technology
		3 Novel CB Agents
		4 Preventing the (Re)-acquisition of CB Weapons
		5 Old Versus New Technologies
		6 New Technologies for Risk Mitigation
		7 Conclusions
		References
	Neuroscience-Based Weapons
		1 Introduction
		2 Neuroscience Advances of Concern
		3 The International Biological and Chemical Prohibition Regime
		4 Responsible Science and Dual Use: Engaging the Neuroscience Community
		5 Conclusion: Strengthening the Chemical and Biological Prohibition Regime
		References
	Hybrid Emerging Threats and Information Warfare: The Story of the Cyber-AI Deception Machine
		1 Introduction
		2 Converging Technologies and Hybrid Emerging Threats
		3 The Deception Machine: Hybrid Cyber-AI Warfare
			3.1 Killing the Truth: Information Warfare in Syria
			3.2 Weaponizing the Truth: Hybrid Cyber-AI Adversarial Attacks
			3.3 Obscuring the Truth: Disinformation, Hate Speech and Election Interference
		4 A Future of Affective Computing and Neuromodulation
		5 The Rise of Hacktivism and Cyber Mercenaries
		6 Cyberattacks on Smart Critical Systems
		7 Drone Swarms, 3D-Printers and Urban Violence
		8 The Urgent Need for Foresight and Anticipatory Intelligence
		References
	Artificial Intelligence and Warfare
		1 Technology and Warfare
		2 Capabilities of Artificial Intelligence
			2.1 Automated vs. Autonomous
			2.2 Nuclear Deterrence Is Diminished by AI
			2.3 AI Device Swarms Will Undermine Traditional Defenses
			2.4 AI Hacks Computers and Creates Its Own Language
			2.5 Going From Servants to Predictive Consultants
		3 Commercial Markets for AI
		4 AI Competes with Funding for Traditional DOD Platforms
			4.1 The Debate About Killer Robots
			4.2 Moral Objections Delay AI Development for DOD
		5 AI in Russia and China
		6 The Emerging Arms Race for AI
		7 Cyber Vulnerabilities for AI
		8 Conclusion
		References
	Artificial Intelligence in Autonomous Weapon Systems
		1 Introduction
		2 Intelligence, Actuation and Human Role in Autonomy
			2.1 Artificial Intelligence Functionality
				2.1.1 AI Limitations, Risks, Adverse Effects
			2.2 From Decision Making to Action
			2.3 Human-Machine Relations in Autonomy
		3 AWS Cyber Vulnerabilities
		4 Artificial Intelligence Arms Race
		5 Principles of Humanity Versus Autonomous Lethal Force
		6 Future Challenges
		7 Conclusions
		References
	Understanding the Threat Posed by COTS Small UAVs Armed with CBR Payloads
		1 Overview
		2 COTS Small UAVs
		3 Conventional Munitions and Riot Control Agents Deployed from COTS Small UAVs
		4 Chemical, Biological, and Radiological Payloads
		5 CBR Agents: Physical Forms, Exposure Pathways, and Effects
		6 Acquisition of CBR Agents by Non-state Actors
		7 Potential Targets for CBR Attacks
		8 Barriers to a Successful CBR Attack by COTS Small UAVs
		9 Conclusions
		References
	Education and Training as a Disruptive Dual Use Technology
		1 Introduction
		2 Education and Training
		3 Case Histories
		4 Conclusions
		References
Part II: Evolving Risk Mitigation Strategies and Technologies
	Detection and Identification Technologies for CBRN Agents
		1 Introduction
		2 Chemical Detection/Identification Technologies
			2.1 Chromatography
			2.2 Colorimetric Detection
			2.3 Elemental Analysis
			2.4 Molecular Spectroscopy
			2.5 Sensors
			2.6 Ion Mobility Spectrometry Methods
			2.7 Mass Spectrometry (MS)
			2.8 Thermal analysis
		3 Biological Detection/Identification Technologies
			3.1 Key Concepts
			3.2 Biological Detection Methods and Equipment
		4 Mixed CB Agents
		5 Radiological/Nuclear Detection and Identification Technologies
		6 Explosives Detection/Identification Technologies
		7 Conclusions
		Annex I – Comparison of Various Detection Technologies
		References
	Chemical Forensics
		1 Introduction
		2 Current Procedures of the OPCW
		3 Forensic Evidence from the OPCW Inspections
		4 Techniques in Chemical Forensics
			4.1 Investigations of Synthetic Routes
				4.1.1 Impurity Profiling
				4.1.2 Side Product and Starting Material Analysis
			4.2 Current Analysis Techniques
				4.2.1 Gas Chromatography-Mass Spectrometry
				4.2.2 Liquid Chromatography-Mass Spectrometry
				4.2.3 Inductively Coupled Plasma-Mass Spectrometry
				4.2.4 Nuclear Magnetic Resonance Spectroscopy
				4.2.5 Infrared Spectroscopy
				4.2.6 Raman Spectroscopy
				4.2.7 Ion Chromatography
			4.3 Sampling and Sample Preparation
			4.4 Multivariate Statistical Analysis
		5 Conclusions and Future Considerations
		References
	Recent Developments in the Clinical Management of Weaponized
Nerve Agent Toxicity
		1 Introduction
		2 Nerve Agent Exposures
			2.1 Classic V and G Nerve Agents
			2.2 Novichok and Novel Organophosphates
			2.3 Unitary Agents vs Binary Agents
			2.4 Route of Exposures
			2.5 Pediatric Considerations (Exposure)
		3 Nerve Agent Toxicology
			3.1 Pharmacokinetics of Nerve Agents
			3.2 Cholinesterase Enzymes
			3.3 Mechanism of Action
			3.4 Enzymatic “Aging”
			3.5 Clinical Effects
			3.6 Diagnosis and Laboratory Findings
		4 Treatment Strategies
			4.1 Exposure Avoidance
			4.2 Decontamination Procedures
			4.3 Pretreatment
			4.4 Supportive Care
			4.5 Anticholinergics
			4.6 Oximes
			4.7 Benzodiazepines
			4.8 Scavengers
			4.9 Pediatric Considerations (Treatment)
			4.10 Possible Advances in Treatment
		5 Medical Resource Management
			5.1 Mass Poisonings and Resource Demanding Exposures
			5.2 Strategic Stockpiles
			5.3 Medication Alternatives
		6 Summary
		References
	Diagnosing the Cause of Disease: Interactive Teaching Approaches
		1 Introduction
		2 Interactive Teaching Resource
			2.1 The Approach
			2.2 Multiple Uses of Chemicals
		Annex 1: Diagnosing the Cause of Disease
			Rolling Scenario: Disease Outbreak
				Background Information
			Slide Deck: Differentiating the Cause of Disease
			Post-Course Hand-out
				Diagnosing the Cause of a Disease: Distinguishing Between a Natural and Deliberate Disease Outbreak
		Annex 2: Multiple Uses of Chemistry
			What is Legal?
		References
			Q fever and C. Burnetii
			Differentiating Between Natural and Deliberate Disease Outbreaks
			Unusual Disease Outbreaks
			Chemistry
	Evaluation Systems for Biological Security Risk Mitigation Training and Education
		1 Introduction
		2 Designing Evaluation
		3 Evaluation of Reaction
		4 Evaluation of Learning
		5 Evaluation of Behaviour
		6 Evaluation of Results
		7 Indicators, Metrics and Data
		8 Conclusions
		References
	Microbial Forensics: Detection and Characterization in the Twenty-first Century
		1 Introduction
		2 Anthrax Attacks in the United States
		3 Sequencing Techniques
		4 Metagenomics in Forensics
		5 Microbiomes in Forensic Inquiry
		6 Contamination, Endemism, and Background Noise
		7 Repositories and Databases
		8 Public Health and Microbial Forensics
		9 Synthetic DNA Attribution
		10 Conclusion: Gaps and Challenges
		References




نظرات کاربران