Muutke küpsiste eelistusi

E-raamat: Storing Digital Binary Data in Cellular DNA: The New Paradigm

(CEO, Merit CyberSecurity Consulting, San Francisco, California, USA)
  • Formaat: PDF+DRM
  • Ilmumisaeg: 18-Aug-2020
  • Kirjastus: Academic Press Inc
  • Keel: eng
  • ISBN-13: 9780128234587
  • Formaat - PDF+DRM
  • Hind: 178,82 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 18-Aug-2020
  • Kirjastus: Academic Press Inc
  • Keel: eng
  • ISBN-13: 9780128234587

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Storing Digital Binary Data into Cellular DNA demonstrates how current digital information storage systems have short longevity and limited capacity, also pointing out that their production and consumption of data exceeds supply. Author Rocky Termanini explains the DNA system and how it encodes vast amounts of data, then presents information on the emergence of DNA as a storage technology for the ever-growing stream of data being produced and consumed. The book will be of interest to a range of readers looking to understand this game-changing technology, including researchers in computer science, biomedical engineers, geneticists, physicians, clinicians, law enforcement and cybersecurity experts.
  • Presents a comprehensive reference on the fascinating and emerging technology of DNA storage
  • Helps readers understand key concepts on how DNA works as an information storage system
  • Provides readers with key information on the technologies used to work with DNA data encoding, such as CRISPR
  • Covers emerging areas of application and ethical concern, such as Smart Cities, cybercrime and cyberwarfare
  • Includes coverage of synthesizing DNA-encoded data, sequencing DNA-encoded data, and fusing DNA with Digital Immunity Ecosystems (DIE)
About the author xix
Acknowledgments xxi
Prologue xxv
Chapter 1 Discovery of the book of life--DNA
1(10)
Initial thoughts
1(1)
DNA--the code of life
2(1)
DNA, the Columbus discovery
3(1)
The DNA pioneers
4(2)
DNA as an organic data castle
6(2)
Music is also one of the DNA's talents
8(1)
Appendix
8(1)
How was DNA first discovered and who discovered it? Read on to find out
9(1)
Glossary (courtesy of MERIT CyberSecurity--archive)
10(5)
Suggested readings
15(1)
Chapter 2 The amazing human DNA system explained
16(1)
"Magical DNA" found in King Tut study
17(1)
Fighting chaos
18(1)
Anatomy of DNA
18(1)
The central dogma of genetics
19(1)
The genetic code
20(2)
Properties of the genetic code
22(1)
Another blessing of DNA, biological profiling
23(1)
The holy grail of DNA: gene editing
24(1)
The yogurt story
25(1)
How gene editing works
25(1)
Anatomy of CRISPR
25(3)
Social and ethical issues in DNA fingerprinting
28(1)
DNA's other dark side, the hacking nightmare
28(1)
DNA is a warm place for music
29(1)
DNA can hack computers
29(1)
Appendices
30(6)
Glossary (MERIT CyberSecurity engineering archives)
30(6)
References
36(3)
Chapter 3 The miraculous anatomy of the digital immunity ecosystem
39(40)
Introduction
39(3)
What is the Smart Vaccine?
42(1)
Smart cities are like the human body
42(3)
What is a smart city?
45(1)
CEWPS is the intelligent smart shield of the smart city
45(1)
The 3D nanoattack scenario
46(1)
Anatomy of CEWPS and its intelligent components
47(1)
Anatomical composition of CEWPS (the digital immunity ecosystem)
48(9)
CEWPS component 1 The Central Coordination Center
48(1)
CEWPS component 2 The knowledge acquisition component
49(1)
What is experience?
49(2)
What is knowledge?
51(1)
The six stages of a cybercrime episode
51(1)
Cybercrime raw data distillation process
52(2)
CEWPS component 3 The reasoning engine
54(1)
What is causality?
54(1)
What is prediction?
55(1)
We can forecast weather; why cannot we predict crime?
55(1)
Anatomy of the causality reasoning engine
55(2)
CEWPS component 4 Reverse engineering center
57(1)
CEWPS component 5 Smart city critical infrastructure
57(1)
The critical infrastructures in smart cities
57(2)
What is criticality?
57(2)
What is a critical infrastructure?
59(6)
CEWPS component 6 The Smart Vaccine center
62(1)
CEWPS component 7 The vaccine knowledge base
63(1)
CEWPS component 8 The virus knowledge base
63(1)
CEWPS component 9 CEWPS smart Nanogrid
64(1)
The smart grid model
65(4)
Connectivity of critical systems to a city's smart Nanogrid
65(1)
Anatomy of the autonomic adapter
66(1)
A smart city is an idealistic hype
66(2)
Sample system performance screens on the city dashboard
68(1)
Appendices
69(8)
Appendix 3A Glossary (extracted from MERIT cybersecurity library)
69(8)
References
77(2)
Chapter 4 Hacking DNA genes-- the real nightmare
79(18)
A glimpse of the bright future
79(1)
Stuxnet is the devil's key to hell
80(2)
The DNA stuxnet (DNAXNET)
82(2)
Criminals could alter their DNA to evade justice with new genetic editing tools
84(3)
DNA digital data hacking
84(1)
DNA crime
84(1)
Gene hacking
85(2)
MyHeritage website leakage
87(1)
Appendices
88(1)
Appendix 4.A The complete story of Stuxnet
88(1)
Two attack strategies
89(1)
The crack in the door
90(1)
Damages
91(1)
Historical background
92(3)
Appendix 4.B Glossary (extracted from MERIT CyberSecurity archives)
93(2)
Suggested readings
95(2)
Chapter 5 The digital universe with DNA--the magic of CRISPR
97(42)
For your own information
97(1)
What is our digital universe?
98(1)
How big is our digital universe?
99(2)
Why is the digital universe growing so fast?
101(1)
Data storage capacity is becoming asymptotic
102(1)
Dubai is the magical smart city with its Achilles' heel
103(2)
Dubai embracing DNA storage
105(1)
The hyper data center of the world
106(1)
Five types of data centers
107(1)
The top 10 hyperscale data centers
108(1)
How did DNA digital storage start?
109(2)
From DNA genetic code to DNA binary code
111(1)
Total size of the human genes in bytes
111(1)
Why ASCII was so important to DNA coding--A glimpse of history
112(5)
The Huffman compression rule
117(1)
Example: the gopher message
117(1)
Summary of the data storage in DNA
118(1)
The CRISPR magic
119(1)
How to hack DNA
120(2)
Anatomy of CRISPR--the smart cleaver
122(2)
Word on word processing
122(2)
Artificial intelligence--centric text editing
124(2)
Ethical concerns
126(1)
CRISPR is the Holy Grail of data deluge
126(1)
Appendices
127(9)
Appendix 5.A Glossary of data center terms (MERIT CyberSecurity engineering)
127(5)
Appendix 5.B Glossary for big data (prepared by MERIT CyberSecurity Engineering)
132(2)
Appendix 5.C Glossary of CRISPR (MERIT Cybersecurity knowledge base)
134(2)
Appendix 5.D A list of features standard in current word processing programs
136(1)
Suggested readings
136(3)
Chapter 6 Getting DNA storage on board: starting with data encoding
139(34)
Some mathematical ideas that we all need to know
139(1)
And DNA does that!
139(1)
Data nomenclature
140(1)
The random access method
141(1)
Other existing encoding methods
142(4)
Bancroft encoding method
142(1)
The Huffman encoding method
142(2)
The Goldman encoding method
144(1)
XOR encoding method
145(1)
The tunable (balanced) redundancy method
146(1)
Selecting the best encoding method
146(1)
DNA storage with random access
146(1)
The simulation method
146(4)
Experiment description
148(1)
Experiment results
148(1)
What is sequencing depth (number of sequence times)
149(1)
Reduced sequencing depth
149(1)
Naive encoding method
150(1)
Comparison of reliability versus density
150(3)
Test result 1 Percent of file recovery as a function of strand density
151(1)
Test result 2 Density as a function of strand length in bits
151(1)
Test result 3 Desired reliability as a function of time span and number of copies needed to achieve the desired reliability
152(1)
DNA the Rosetta stone
153(1)
Silicon is getting scarce
154(1)
What is silicon?
154(1)
Artificial gene synthesis
155(1)
Amazon's flying warehouses
156(1)
Church's DNA storage
156(1)
DNA computing--the tables turned
156(1)
DNA is the new supercomputer
157(1)
Appendix 6A Glossary of DNA encoding (from merit CyberSecurity library)
158(13)
Suggested readings
171(2)
Chapter 7 Synthesizing DNA-encoded data
173(52)
One trillionth of a gram!
173(1)
The DNA writer
173(1)
DNA Fountain software strategy
174(3)
Fountain software architecture
177(1)
A reliable and efficient DNA storage architecture
178(2)
DNA computing is around the corner
180(1)
The adleman discovery
180(1)
Dr. Jian-Jun Shu discovery
181(1)
The BLAST algorithm software
182(1)
BLAST software architecture
182(1)
One word on FASTA software system
183(1)
The story of binary code
183(2)
Nondeterministic universal turing machine
185(1)
Video and audio media features
185(1)
Digital video
186(1)
Binary to DNA code, revisited
187(6)
Anatomy of text and binary
187(1)
Quantum computing
188(2)
The QC entanglement process
190(1)
The D-wave systems
190(1)
Quantum computer versus DNA computer
191(1)
Coding malware into a strand of DNA
192(1)
Mechanics of the buffer overflow
193(1)
Method 1 Spilled data
193(1)
Method 2 Launch pad
194(1)
Sherlock software
194(1)
The creative mind of the hacker
194(1)
The next generation of DNA hacking
195(1)
CRISPR, the gene editor
195(1)
Who is the DNA cyber hacker?
196(1)
Type 1 Artificial intelligence--powered malware
197(1)
DeepLocker--The smart software
197(1)
Type 2 Nanopowered malware
198(1)
DNA malware-as-a-service
198(1)
DNA hacking with nanorobots
199(1)
How could DNA attack a computer?
199(1)
Appendices
200(24)
Appendix 7.A Bioinformatics
200(1)
Appendix 7.B IBM's DeepLocker--the Al-powered malware
201(1)
Appendix 7.C FASTQ software
202(1)
Appendix 7.D The Bachand DNA story
202(2)
Appendix 7.E Deep neural network
204(2)
Appendix 7.F Sherlock detective software
206(1)
Appendix 7.G Glossary (deep neural networks)
206(13)
Appendix 7.H Glossary (DNA terms)
219(5)
Suggested readings
224(1)
Chapter 8 Sequencing DNA-encoded data
225(36)
The grandiose design of our digital universe in the 21st century
225(1)
Smart City ontology
226(1)
The bright sun of DNA is coming up
227(1)
How to retrieve your Illumina Solexa sequencing data
228(3)
Mac OS X
229(1)
Linux
229(2)
What is the Illumina method of DNA sequencing?
231(1)
Illumina DNA sequencing operations?
231(2)
The disruptive industry of digital DNA sequencing
233(1)
From cell atlas project to DNA storage libraries
233(1)
Blockchained cannabis DNA
234(1)
The hidden second code in our DNA
235(1)
Get on the A-train for blockchain
236(1)
The sunrise
236(1)
Unseen sinkholes
237(1)
Blockchain's competitionethereum
238(1)
Disadvantages of blockchain
238(2)
Malware is hovering over DNA code
240(1)
Case 1 Blockchained malware inside DNA
241(1)
Case 2 biohacking--malware hidden in DNA
242(1)
Case 3 DNA malware trafficking
243(2)
DNA satellite hacking
243(1)
DNA drone hacking
244(1)
Appendices
245(14)
Appendix 8.A The cannabis dilemma
245(1)
Appendix 8.B Dr. Church's Regenesis book
246(1)
Appendix 8.C The miracle of making protein
247(1)
Appendix 8.D Unit conversion table
247(2)
Appendix 8.E Glossary for blockchain (From MERIT CyberSecurity knowledge base)
249(10)
Suggested readings
259(2)
Chapter 9 Decoding back to binary
261(34)
Introduction
261(1)
Dynamic equilibrium
261(3)
Structure DNA
264(1)
The central dogma of genetics
265(2)
Key players in DNA synthesis/sequencing and storage
267(1)
Academic research
267(1)
University of Washington
267(1)
Harvard University
267(1)
Columbia University
267(1)
University of Illinois, Urbana-Champaign
267(1)
Swiss Federal Institute of Technology (ETH), Zurich
268(1)
Research consortium
268(1)
Industry
268(1)
Microsoft Research
268(1)
Micron Technology
268(1)
More Research
268(1)
Start-ups
269(1)
Catalog
269(1)
Iridia
269(1)
Helixworks
269(1)
US Government
269(1)
Defense Advanced Research Projects Agency
269(1)
Intelligence Advanced Research Projects Activity
269(1)
National Institutes of Health
270(1)
National Science Foundation
270(1)
Foreign research
270(1)
European Bioinformatics Institute
270(1)
Decoding DNA sequence back into binary
270(3)
Copying DNA sequences with polymerase chain reaction
273(3)
Molecular information storage (MIST) story
275(1)
Just so you know, your DNA can be a wallet for bitcoin data
276(1)
BioEdit software, sequence editing
276(1)
The next-generation sequencing technology
277(1)
Malware Technology
278(2)
DNA malware
280(3)
The Two-way malware of binary data and DNA
280(1)
Method 1 Binary malware, inject into DNA
280(2)
Method 2 Infected DNA, converted to binary
282(1)
Blockchain malware
283(1)
A rainstorm of grasshoppers; now we have a rainstorm of blockchain
283(1)
Appendices
284(10)
Appendix 9.A
284(1)
Appendix 9.B Glossary for DNA sequencing (from MERIT Cyber Library)
284(10)
Suggested readings
294(1)
Chapter 10 Fusing DNA with digital immunity ecosystem
295(28)
How did human immunity come about?
295(1)
Plague at the Siege of Caffa, 1346
295(1)
The plague of Athens, 430 BC
296(1)
DNA digital storage meets the Digital Immunity Ecosystem
297(1)
Anatomy of Digital Immunity Ecosystem and its intelligent components
298(1)
Anatomical composition of Digital Immunity Ecosystem
299(1)
Component 1 The central coordination center
299(1)
Component 2 The knowledge acquisition component
300(1)
Component 3 Reverse engineering center
301(1)
Component 4 The causality reasoning and predictor
302(1)
Component 5 Smart city critical infrastructures
303(2)
Component 6 The smart vaccine center
305(1)
Component 7 The vaccine knowledge base
306(1)
Component 8 The virus knowledge base
307(1)
Component 9 CEWPS smart nanogrid
308(1)
The smart grid model
308(3)
The DNA component
309(1)
How did encryption get into DNA?
310(1)
Cryptology evolution of time
311(1)
The miracle of cryptology in DNA
311(1)
DNA cryptology
311(1)
The encryption algorithm
312(1)
Malware going after DNA storage
313(1)
DNA computing
313(1)
DNA computing applications
314(1)
DNA computer
314(1)
Case study: demographic and data storage growth of Dubai
315(1)
Dubai digital data forecast
315(2)
Appendices
317(5)
Appendix 10.A Cryptography: one-time pad
317(1)
Appendix 10.B DNA cryptography with data encryption standards
318(1)
Appendix 10.C DNA cryptography with advanced encryption standard
319(1)
Appendix 10.D Advanced encryption standard algorithm
320(1)
Appendix 10.E DNA encoding
320(1)
Appendix 10.F Cryptology glossary (From MERIT CyberSecurity library)
321(1)
Suggested readings
322(1)
Chapter 11 DNA storage heading for smart city
323(20)
Introduction
323(1)
Why do we need molecular information storage?
324(1)
Smart city needs smart data
325(2)
The smart city will switch from hardware to bioware
327(2)
DNA potentialities
329(2)
Concluding revelation
331(1)
Appendices
332(9)
Appendix 11.A Glossary Smart Cities (MERIT Knowledge Library)
332(9)
Suggested readings
341(2)
Chapter 12 DNA Data and Social Crime
343(20)
Sources of social crime
343(1)
Poverty as a pervasive social crime
344(2)
Key information stored in DNA data storage
346(2)
DNA can interpret the behavior of a mass killer
348(1)
Can we reverse engineer DNA and predict a crime?
348(1)
Smart cities and eradication of cybercrime
349(1)
Final thought
350(3)
Some interesting numbers about DNA data storage
353(1)
Some interesting numbers about datacenter power consumption
353(1)
Justification for using DNA storage
353(1)
Appendices
354(8)
Appendix 12.A Poverty State of the Health
354(1)
Appendix 12.B Glossary for Social/Hate Crime
354(4)
Appendix 12.C Glossary (Courtesy MERIT CyberSecurity Library)
358(4)
Suggested readings
362(1)
Chapter 13 DNA data and cybercrime and cyberterrorism
363(28)
Opening thoughts
363(1)
DNA is our binary Holy Grail of data storage
364(1)
Behavior of the cybercriminal
365(1)
Adding insult to injury
365(1)
Anatomy of cyberterrorism
366(1)
Cybercrime runs on steroids; antivirus technology runs on diesel
366(2)
Where did the word cyber come from?
366(2)
Cybercrime data repositories
368(1)
The storage supply is killing the storage demand
369(1)
DNA is the holy grail of digital storage
370(1)
Back to smart city
371(3)
What is cyberterrorism?
374(3)
DNA is the holy grail of smart city
377(2)
Appendices
379(3)
Appendix 13.A The human cell atlas
379(2)
Appendix 13.B DNA computing explained
381(1)
The experiment
381(1)
Biochemistry-based information technology
382(7)
Real case of chemical DNA computer
383(1)
Appendix 13.C Glossary for smart city {MERIT cybersecurity engineering)
383(6)
Suggested readings
389(2)
Chapter 14 DNA is a time storage machine for 10,000 years
391(22)
A special genre of time machine
391(1)
DNA time clock can predict when we will die
392(1)
The link between biological clock and mortality
393(1)
The telomere story
393(1)
Time travel is within reach
394(3)
The amazing storage phenomenon
397(1)
Storage evolution over time
397(1)
DNA storage random access retrieval
397(2)
Appendices
399(11)
Appendix 14.A Svalbard Global Data Vault
399(2)
Appendix 14.B Glossary (Courtesy http://www.genesinlife.org/glossary)
401(9)
Suggested readings
410(3)
Chapter 15 DNA and religion
413(32)
DNA and religion galaxies are intersecting
414(1)
We all ride our personal boat
414(1)
The blessing of bacteria
414(1)
Peace between science and religion--injecting "scriptural" DNA into the body
415(1)
The magic of CRISPR
415(1)
DNA and bacteria are allies
416(1)
The magic of CRISPR, the futuristic phenomenon
417(1)
Stepping into God's domain
418(1)
What is more important--DNA or religion?
419(2)
Some atheistic arrogance
419(1)
The Collins defense
419(1)
Dr. Crick and Churchill arguments
420(1)
Religious communilies are not happy
420(1)
Personal and medical data used as DNA fingerprint
421(1)
DNA is human future diary, cannot be fooled
421(1)
Finally, CODIS was born
422(1)
Now religion speaks about DNA
422(1)
The story of evolution
423(1)
Concluding thoughts
423(1)
The last words of Einstein
424(1)
Appendices
424(6)
Appendix 15.A The God Gene how faith is hardwired into our genes (extracted from wikipedia)
424(2)
Appendix 15.B Some laws and principles in evolutionary biology (from library of MERIT CyberSecurity)
426(2)
Appendix 15.C Holy Quran refers to DNA
428(1)
The programming in genes
428(1)
Holy Quran reference to DNA
429(1)
Appendix 15.D The information capacity of DNA
430(1)
Advantages of knowing DNA
430(14)
Appendix 15.E Glossary for research ethics (from library of MERIT CyberSecurity)
430(14)
Suggested readings
444(1)
Index 445
Dr. Rocky Termanini, CEO of MERIT CyberSecurity Group, is a subject matter expert in IT security and brings 46 years of cross-industry experience at national and international levels. He received his Ph.D. in Computer Science, Artificial Intelligence, from Yale University. He is the designer of the "Cognitive Early-Warning Predictive System" and "The Smart Vaccine" which replicates the human immune system to protect the critical infrastructures against future cyber wars. Dr. Termanini spent five years in the Middle East working as a security consultant in Saudi Arabia, Bahrain, and the UAE. Professor Termaninis teaching experience spans over 30 years. He taught Information Systems courses at Connecticut State University, Quinnipiac University, University of Bahrain, University College of Bahrain, Abu Dhabi University, and lectured at Zayed University in Dubai. Dr. Rocky Termanini is a senior advisor to the Department of Homeland Security and other Federal Law Enforcement agencies, as well as an advisor to the FBI on Cyber-terrorism and global malware. Dr. Termanini was the security manager of the Saudi e-Government project for the Saudi Ministry of Interior. Presently, Dr. Termanini helps companies set up cyber-security plans to protect their information assets and to monitor employee loyalty. He is a visiting professor to several universities in the Persian Gulf region, giving short courses in Digital Forensics and ethical hacking. Dr. Termanini has experience in preparing DARPA solicitations for cyber security grants and is the author of two books on Cybersecurity from CRC Press. He is the author of Storing Digital Binary Data into Cellular DNA: The New Paradigm from Elsevier Academic Press.