000 03769nam a22004935i 4500
999 _c200434458
_d52670
003 DE-He213
005 20231104114413.0
007 cr nn 008mamaa
008 150407s2015 gw | s |||| 0|eng d
020 _a9783319172446
_z978-3-319-17244-6
024 7 _a10.1007/978-3-319-17244-6
_2doi
040 _aTR-AnTOB
_beng
_cTR-AnTOB
_erda
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema005.8
_223
100 1 _aLee, Newton.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aCounterterrorism and Cybersecurity :
_bTotal Information Awareness /
_cby Newton Lee.
250 _a2nd ed. 2015.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2015.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aSeptember 11 Attacks -- U.S. Intelligence Community -- Understanding Terrorism -- Cures for Terrorism -- War and Peace -- The Rise and Fall of Total Information Awareness -- The Afterlife of Total Information Awareness and Edward Snowden's NSA Leaks -- A Two-Way Street of Total Information Awareness -- Cyber Warfare: Weapon of Mass Disruption -- Cyber Attacks, Prevention, and Countermeasures -- Cyber security Training in Medical Centers -- Plan X and Generation Z -- Artificial Intelligence and Data Mining -- Gamification of Penetration Testing -- USB Write Blocking and Forensics -- DARPA's Cyber Grand Challenge (2014-2016).
520 _aFrom 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from thought leaders and the make-believe of Hollywood such as 24, Homeland and The Americans. President Barack Obama also said in his 2015 State of the Union address, "We are making sure our government integrates intelligence to combat cyber threats, just as we have done to combat terrorism. In this new edition, there are seven completely new chapters, including three new contributed chapters by healthcare chief information security officer Ray Balut and Jean C. Stanford, DEF CON speaker Philip Polstra and security engineer and Black Hat speaker Darren Manners, as well as new commentaries by communications expert Andy Marken and DEF CON speaker Emily Peed. The book offers practical advice for businesses, governments and individuals to better secure the world and protect cyberspace.
650 0 _aComputer security.
650 0 _aPolitical science.
650 0 _aData mining.
650 0 _aMultimedia systems.
650 1 4 _aSystems and Data Security.
_0http://scigraph.springernature.com/things/product-market-codes/I28060
650 2 4 _aPolitical Science.
_0http://scigraph.springernature.com/things/product-market-codes/911000
650 2 4 _aData Mining and Knowledge Discovery.
_0http://scigraph.springernature.com/things/product-market-codes/I18030
650 2 4 _aInformation Systems Applications (incl. Internet).
_0http://scigraph.springernature.com/things/product-market-codes/I18040
650 2 4 _aMultimedia Information Systems.
_0http://scigraph.springernature.com/things/product-market-codes/I18059
710 2 _aSpringerLink (Online service)
856 4 0 _3Springer eBooks
_zOnline access link to the resource
_uhttps://doi.org/10.1007/978-3-319-17244-6
942 _2lcc
_cEBK
041 _aeng