Artificial intelligence, cybersecurity and cyber defense / (Record no. 77007)

000 -LEADER
fixed length control field 04810nam a22002897a 4500
003 - CONTROL NUMBER IDENTIFIER
control field CITU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230221153113.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr an aaaaaaaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 211005b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781786304674
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119788195
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng.
100 1# - MAIN ENTRY--PERSONAL NAME
Preferred name for the person Ventre, Daniel,
Relator term author.
245 10 - TITLE STATEMENT
Title Artificial intelligence, cybersecurity and cyber defense /
Statement of responsibility, etc Daniel Ventre.
263 ## - PROJECTED PUBLICATION DATE
Projected publication date 2007
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken :
Name of publisher, distributor, etc ISTE Ltd / John Wiley and Sons Inc,
Date of publication, distribution, etc 2020.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (272 pages).
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code nc
Source rdacarrier
500 ## - GENERAL NOTE
General note ABOUT THE AUTHOR<br/>Daniel Ventre: Researcher at CESDIP Laboratory (CNRS/University of Versailles/Ministry of Justice/University of Cergy Pontoise)
505 0# - CONTENTS
Formatted contents note TABLE OF CONTENTS<br/>Introduction ix<br/><br/>Chapter 1. On the Origins of Artificial Intelligence 1<br/><br/>1.1. The birth of artificial intelligence (AI) 1<br/><br/>1.1.1. The 1950s–1970s in the United States 1<br/><br/>1.1.2. AI research in China 7<br/><br/>1.1.3. AI research in Russia 9<br/><br/>1.1.4. AI research in Japan 12<br/><br/>1.1.5. AI research in France 14<br/><br/>1.2. Characteristics of AI research 16<br/><br/>1.3. The sequences of AI history 19<br/><br/>1.4. The robot and robotics 23<br/><br/>1.5. Example of AI integration: the case of the CIA in the 1980s 27<br/><br/>1.5.1. The CIA’s instruments and methods for understanding and appropriating AI adapted to its needs 29<br/><br/>1.5.2. Focus groups, research, coordination 35<br/><br/>1.5.3. The network of interlocutors outside the intelligence community 36<br/><br/>1.5.4. What AI applications for what intelligence needs? 42<br/><br/>Chapter 2. Concepts and Discourses 45<br/><br/>2.1. Defining AI 47<br/><br/>2.1.1. AI 47<br/><br/>2.1.2. Expert systems 54<br/><br/>2.1.3. Machine learning and deep learning 56<br/><br/>2.1.4. The robot, robotics 57<br/><br/>2.2. Types of AI 60<br/><br/>2.3. Evolution of the themes over time 62<br/><br/>2.3.1. Google Trends 62<br/><br/>2.3.2. The AAAI magazine 63<br/><br/>2.4. The stories generated by artificial intelligence 67<br/><br/>2.4.1. The transformative power of AI 67<br/><br/>2.4.2. The absolute superiority of human intelligence over the machine 75<br/><br/>2.4.3. The replacement of humans by machines 76<br/><br/>2.4.4. AI as an existential threat 77<br/><br/>2.4.5. The place of AI and robotics in fiction: the example of Japan 80<br/><br/>2.5. Political considerations 82<br/><br/>2.5.1. National strategies for artificial intelligence 85<br/><br/>2.5.2. U.S. policy 97<br/><br/>Chapter 3. Artificial Intelligence and Defense Issues 105<br/><br/>3.1. Military policies and doctrines for AI: the American approach 105<br/><br/>3.1.1. American defense AI policy 105<br/><br/>3.1.2. AI in American military doctrines 114<br/><br/>3.2. Military AI in Russia 128<br/><br/>3.3. AI and the art of warfare 136<br/><br/>3.3.1. Manuel de Landa: war in the age of intelligent machines 136<br/><br/>3.3.2. AI announcing a new RMA? 139<br/><br/>3.3.3. Applications of AI in the military field 143<br/><br/>3.3.4. Expert systems in military affairs 146<br/><br/>3.3.5. Autonomous weapons 148<br/><br/>3.3.6. Robotics and AI 151<br/><br/>3.4. AI and cyber conflict 155<br/><br/>3.4.1. Malware, cybersecurity and AI 157<br/><br/>3.4.2. AI and cyberweapons 162<br/><br/>3.4.3. Offensive–defensive/security configurations 163<br/><br/>3.4.4. Adversarial AI and adversarial Machine Learning 171<br/><br/>3.4.5. AI and information warfare 173<br/><br/>3.4.6. Example 1: the war in Syria 179<br/><br/>3.4.7. Example 2: events in Hong Kong in 2019 181<br/><br/>3.4.8. Example 3: malicious AI attacks 183<br/><br/>3.4.9. Example 4: swarming attacks 184<br/><br/>3.4.10. Example 5: crossing universes with AI and without AI 185<br/><br/>Conclusion 187<br/><br/>Appendices 195<br/><br/>Appendix 1. A Chronology of AI 197<br/><br/>Appendix 2. AI in Joint Publications (Department of Defense, United States) 207<br/><br/>Appendix 3. AI in the Guidelines and Instructions of the Department of Defense (United States) 209<br/><br/>Appendix 4. AI in U.S. Navy Instructions 211<br/><br/>Appendix 5. AI in U.S. Marine Corps Documents 213<br/><br/>Appendix 6. AI in U.S. Air Force Documents 215<br/><br/>References 217<br/><br/>Index 235
520 ## - SUMMARY, ETC.
Summary, etc DESCRIPTION<br/>The aim of the book is to analyse and understand the impacts of artificial intelligence in the fields of national security and defense; to identify the political, geopolitical, strategic issues of AI; to analyse its place in conflicts and cyberconflicts, and more generally in the various forms of violence; to explain the appropriation of artificial intelligence by military organizations, but also law enforcement agencies and the police; to discuss the questions that the development of artificial intelligence and its use raise in armies, police, intelligence agencies, at the tactical, operational and strategic levels.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
856 ## - ELECTRONIC LOCATION AND ACCESS
Link text Fulltext available at Wiley Online Library
Uniform Resource Identifier https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type EBOOK
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Source of acquisition Inventory number Full call number Barcode Date last seen Price effective from Item type
          COLLEGE LIBRARY COLLEGE LIBRARY 2021-10-05 ALBASA 50753 V 2020 CL-50753 2021-10-05 2021-10-05 EBOOK