Counterterrorism and Cybersecurity (Record no. 57703)

000 -LEADER
fixed length control field 03477nam a22005295i 4500
001 - CONTROL NUMBER
control field 978-3-319-17244-6
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421112226.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150407s2015 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319172446
-- 978-3-319-17244-6
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
100 1# - AUTHOR NAME
Author Lee, Newton.
245 10 - TITLE STATEMENT
Title Counterterrorism and Cybersecurity
Sub Title Total Information Awareness /
250 ## - EDITION STATEMENT
Edition statement 2nd ed. 2015.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XV, 489 p. 120 illus.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 September 11 Attacks -- U.S. Intelligence Community -- Understanding Terrorism -- Cures for Terrorism -- War and Peace -- The Rise and Fall of Total Information Awareness -- The Afterlife of Total Information Awareness and Edward Snowden's NSA Leaks -- A Two-Way Street of Total Information Awareness -- Cyber Warfare: Weapon of Mass Disruption -- Cyber Attacks, Prevention, and Countermeasures -- Cyber security Training in Medical Centers -- Plan X and Generation Z -- Artificial Intelligence and Data Mining -- Gamification of Penetration Testing -- USB Write Blocking and Forensics -- DARPA's Cyber Grand Challenge (2014-2016).
520 ## - SUMMARY, ETC.
Summary, etc From 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from thought leaders and the make-believe of Hollywood such as 24, Homeland and The Americans. President Barack Obama also said in his 2015 State of the Union address, "We are making sure our government integrates intelligence to combat cyber threats, just as we have done to combat terrorism. In this new edition, there are seven completely new chapters, including three new contributed chapters by healthcare chief information security officer Ray Balut and Jean C. Stanford, DEF CON speaker Philip Polstra and security engineer and Black Hat speaker Darren Manners, as well as new commentaries by communications expert Andy Marken and DEF CON speaker Emily Peed. The book offers practical advice for businesses, governments and individuals to better secure the world and protect cyberspace.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-319-17244-6
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2015.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Political science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data mining.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Multimedia information systems.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Systems and Data Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Political Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data Mining and Knowledge Discovery.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Information Systems Applications (incl. Internet).
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Multimedia Information Systems.
912 ## -
-- ZDB-2-SCS

No items available.