Description

Book Synopsis


Table of Contents
1. Structure of DNA and the landscape of DNA Deep Hacking (DDH) 2. History of bio-hackers, psychological profiling and fingerprinting of the bio-hacker. The story the recent North Korean WannaCry ransomware attack 3. Code injection and the E. Coli story as the carrier of malware DNA code 4. CRISPR the magical knife. The anatomy and mechanics. The good, the bad and the ugly 5. The Genome vandalism. "When ISIS Meets CRISPR" the blueprint from Hell. Generating DNA sequence from payload binary code 6. Synthesis of DNA with encoded malicious code. The E. Coli Plasmids story 7. Third party role of the Dark Web and the Deep Web, The Onion Router (TOR) 8. How to select a target. Planning the bio-attack, damage, and vulnerability of the attack 9. The Drone technology, Transport strategy and risk evaluation 10. Drone delivery methods, how to communicate with the destination 11. The Bio-Stuxnet malicious DNA attack. Attack simulation and review results. 12. Translation and storage of the DNA contaminated code 13. Encryption technology and camouflaging contaminated DNA-code injection 14. Detection of surprise bio-attack, the bio-response, response of Government agencies. DNA bio-defense. Attack forecast and eradication, security measure to protect the DNA data files 15. Reverse Engineering technology 16. The controversy of CRISPR with religion and ethics advocates to control evolution and embryology enhancement, and elimination of genetically inherited diseases Appendix Epilogue

Biomedical Defense Principles to Counter DNA Deep

Product form

£124.20

Includes FREE delivery

RRP £138.00 – you save £13.80 (10%)

Order before 4pm today for delivery by Fri 19 Dec 2025.

A Hardback by Rocky Termanini

Out of stock


    View other formats and editions of Biomedical Defense Principles to Counter DNA Deep by Rocky Termanini

    Publisher: Elsevier Science
    Publication Date: 12/6/2022 12:00:00 AM
    ISBN13: 9780323999144, 978-0323999144
    ISBN10: 032399914X

    Description

    Book Synopsis


    Table of Contents
    1. Structure of DNA and the landscape of DNA Deep Hacking (DDH) 2. History of bio-hackers, psychological profiling and fingerprinting of the bio-hacker. The story the recent North Korean WannaCry ransomware attack 3. Code injection and the E. Coli story as the carrier of malware DNA code 4. CRISPR the magical knife. The anatomy and mechanics. The good, the bad and the ugly 5. The Genome vandalism. "When ISIS Meets CRISPR" the blueprint from Hell. Generating DNA sequence from payload binary code 6. Synthesis of DNA with encoded malicious code. The E. Coli Plasmids story 7. Third party role of the Dark Web and the Deep Web, The Onion Router (TOR) 8. How to select a target. Planning the bio-attack, damage, and vulnerability of the attack 9. The Drone technology, Transport strategy and risk evaluation 10. Drone delivery methods, how to communicate with the destination 11. The Bio-Stuxnet malicious DNA attack. Attack simulation and review results. 12. Translation and storage of the DNA contaminated code 13. Encryption technology and camouflaging contaminated DNA-code injection 14. Detection of surprise bio-attack, the bio-response, response of Government agencies. DNA bio-defense. Attack forecast and eradication, security measure to protect the DNA data files 15. Reverse Engineering technology 16. The controversy of CRISPR with religion and ethics advocates to control evolution and embryology enhancement, and elimination of genetically inherited diseases Appendix Epilogue

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account