Table of Contents:
  • Dedication
  • Forward by David Irvine
  • Preface
  • About the Study Questions
  • Acknowledgment
  • Weaponization of Computer
  • Human Nature and Cyber Weaponry: use of Denial and Deception in Cyber Counterintelligence.-  The Human Element: The 'Trigger' on Cyber Weapons
  • Cyber Defence for IMGs and NGOs Using Crime Prevention through Environmental Design
  • Drinking from a Fire Hydrant: Information Overload as a Cyber Weapon
  • Archer's Stakes in Cyber Space: Methods to Analyze Force Advantage.- The Rule of Law: Controlling Cyber Weapons
  • Double-Edged Sword: Dual-Purpose Cyber Security Methods
  • "Who Was that Masked Man?": System Penetrations;Friend or Foe?
  • Development and Proliferation of Offensive Weapons in Cyber-Security; T. Herr
  • No Smoking Gun: Cyber Weapons and Drug Traffickers
  • Autonomous Weapons: Terminator-Esque Software Design
  • Warfare of the Future
  • Researching Cyber Weapons: An Enumerative Bibliography
  • About the Editor and Contributors
  • Index.