|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_on1204136680 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
201107s2020 xx o ||| 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|c EBLCP
|d EBLCP
|d LIV
|d REDDC
|d OCLCF
|d IEEEE
|d K6U
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9781119788188
|
020 |
|
|
|a 1119788188
|
020 |
|
|
|a 9781119788195
|q (electronic bk.)
|
020 |
|
|
|a 1119788196
|q (electronic bk.)
|
020 |
|
|
|a 9781119788171
|q (electronic bk.)
|
020 |
|
|
|a 111978817X
|q (electronic bk.)
|
024 |
7 |
|
|a 10.1002/9781119788195
|2 doi
|
029 |
1 |
|
|a AU@
|b 000069691911
|
029 |
1 |
|
|a AU@
|b 000072393476
|
035 |
|
|
|a (OCoLC)1204136680
|
037 |
|
|
|a 9820917
|b IEEE
|
050 |
1 |
4 |
|a HF5548.37
|b .V46 2020
|
082 |
0 |
4 |
|a 658.4/78
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Ventre, Daniel.
|
245 |
1 |
0 |
|a Artificial Intelligence, Cybersecurity and Cyber Defence
|h [electronic resource].
|
260 |
|
|
|a Newark :
|b John Wiley & Sons, Incorporated,
|c 2020.
|
300 |
|
|
|a 1 online resource (222 p.)
|
500 |
|
|
|a Description based upon print version of record.
|
505 |
0 |
|
|a Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Introduction -- Contents -- Introduction -- 1. On the Origins of Artificial Intelligence -- 1.1. The birth of artificial intelligence (AI) -- 1.1.1. The 1950s-1970s in the United States -- 1.1.2. AI research in China -- 1.1.3. AI research in Russia -- 1.1.4. AI research in Japan -- 1.1.5. AI research in France -- 1.2. Characteristics of AI research -- 1.3. The sequences of AI history -- 1.4. The robot and robotics -- 1.5. Example of AI integration: the case of the CIA in the 1980s
|
505 |
8 |
|
|a 1.5.1. The CIA's instruments and methods for understanding and appropriating AI adapted to its needs -- 1.5.2. Focus groups, research, coordination -- 1.5.3. The network of interlocutors outside the intelligence community -- 1.5.4. What AI applications for what intelligence needs? -- 2. Concepts and Discourses -- 2.1. Defining AI -- 2.1.1. AI -- 2.1.2. Expert systems -- 2.1.3. Machine learning and deep learning -- 2.1.4. The robot, robotics -- 2.2. Types of AI -- 2.3. Evolution of the themes over time -- 2.3.1. Google Trends -- 2.3.2. The AAAI magazine
|
505 |
8 |
|
|a 2.4. The stories generated by artificial intelligence -- 2.4.1. The transformative power of AI -- 2.4.2. The absolute superiority of human intelligence over the machine -- 2.4.3. The replacement of humans by machines -- 2.4.4. AI as an existential threat -- 2.4.5. The place of AI and robotics in fiction: the example of Japan -- 2.5. Political considerations -- 2.5.1. National strategies for artificial intelligence -- 2.5.2. U.S. policy -- 3. Artificial Intelligence and Defense Issues -- 3.1. Military policies and doctrines for AI: the American approach -- 3.1.1. American defense AI policy
|
505 |
8 |
|
|a 3.1.2. AI in American military doctrines -- 3.2. Military AI in Russia -- Wars and armies are becoming more and more technologically advanced -- AI and robotics will give rise to new weapons but probably not androids -- AI can be applied to all military functions -- AI paves the way for new operational modes -- AI feeds the information space, constructs it and enriches it -- It is essential to take into consideration the question of the relationship between humans and AI -- Dependence on and effectiveness of intelligent systems does not preclude the issue of trust
|
505 |
8 |
|
|a Can AI be a weapon of dissuasion? What is the strategic role of AI? -- The economic dimension is a key factor that legitimizes military AI research and the integration of AI into armies and warfare. -- 3.3. AI and the art of warfare -- 3.3.1. Manuel de Landa: war in the age of intelligent machines -- 3.3.2. AI announcing a new RMA? -- 3.3.3. Applications of AI in the military field -- 3.3.4. Expert systems in military affairs -- 3.3.5. Autonomous weapons -- 3.3.6. Robotics and AI -- 3.4. AI and cyber conflict -- 3.4.1. Malware, cybersecurity and AI -- 3.4.2. AI and cyberweapons
|
520 |
|
|
|a This book explains the appropriation of artificial intelligence by military organizations, but also law enforcement agencies and the police; to discuss the questions that the development of artificial intelligence. --
|c Edited summary from book.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Intelligence artificielle.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a artificial intelligence.
|2 aat
|
650 |
|
7 |
|a Artificial intelligence
|2 fast
|
650 |
|
7 |
|a Computer networks
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Ventre, Daniel
|t Artificial Intelligence, Cybersecurity and Cyber Defence
|d Newark : John Wiley & Sons, Incorporated,c2020
|z 9781786304674
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6384365
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6384365
|
994 |
|
|
|a 92
|b IZTAP
|