@inbook{b1679f4c21c347ceb0f2d6271b44651f,
title = "Weaponization of computers",
abstract = "This chapter examines how computers hardware and software can be weaponized. It draws analogies with other items of common use and shows how, why and by whom cyber technology is weaponization. It concludes with a discussion of the implications for policy and ramifications for practice.",
keywords = "cyber weapons, cyber war, digital arms, national secuirty, Intelligence analysis, Counterintelligence",
author = "Henry Prunckun",
year = "2018",
doi = "10.1007/978-3-319-74107-9_1",
language = "English",
isbn = "9783319741062",
series = "Advanced Sciences and Technologies for Security Applications",
publisher = "Springer",
pages = "1--12",
editor = "Henry Prunckun",
booktitle = "Cyber weaponry",
address = "United States",
}