000 | 03477nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-3-319-17244-6 | ||
003 | DE-He213 | ||
005 | 20200421112226.0 | ||
007 | cr nn 008mamaa | ||
008 | 150407s2015 gw | s |||| 0|eng d | ||
020 |
_a9783319172446 _9978-3-319-17244-6 |
||
024 | 7 |
_a10.1007/978-3-319-17244-6 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aLee, Newton. _eauthor. |
|
245 | 1 | 0 |
_aCounterterrorism and Cybersecurity _h[electronic resource] : _bTotal Information Awareness / _cby Newton Lee. |
250 | _a2nd ed. 2015. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 |
_aXV, 489 p. 120 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aSeptember 11 Attacks -- U.S. Intelligence Community -- Understanding Terrorism -- Cures for Terrorism -- War and Peace -- The Rise and Fall of Total Information Awareness -- The Afterlife of Total Information Awareness and Edward Snowden's NSA Leaks -- A Two-Way Street of Total Information Awareness -- Cyber Warfare: Weapon of Mass Disruption -- Cyber Attacks, Prevention, and Countermeasures -- Cyber security Training in Medical Centers -- Plan X and Generation Z -- Artificial Intelligence and Data Mining -- Gamification of Penetration Testing -- USB Write Blocking and Forensics -- DARPA's Cyber Grand Challenge (2014-2016). | |
520 | _aFrom 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from thought leaders and the make-believe of Hollywood such as 24, Homeland and The Americans. President Barack Obama also said in his 2015 State of the Union address, "We are making sure our government integrates intelligence to combat cyber threats, just as we have done to combat terrorism. In this new edition, there are seven completely new chapters, including three new contributed chapters by healthcare chief information security officer Ray Balut and Jean C. Stanford, DEF CON speaker Philip Polstra and security engineer and Black Hat speaker Darren Manners, as well as new commentaries by communications expert Andy Marken and DEF CON speaker Emily Peed. The book offers practical advice for businesses, governments and individuals to better secure the world and protect cyberspace. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aPolitical science. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData mining. | |
650 | 0 | _aMultimedia information systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aPolitical Science. |
650 | 2 | 4 | _aData Mining and Knowledge Discovery. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
650 | 2 | 4 | _aMultimedia Information Systems. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319172439 |
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-17244-6 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c57703 _d57703 |