소장자료

>>
소장자료
>
000 nam5i
001 2210080934660
003 DE-He213
005 20250321105425
007 cr nn 008mamaa
008 240802s2024 sz | s |||| 0|eng d
020 a97830316312699978-3-031-63126-9
024 a10.1007/978-3-031-63126-92doi
040 a221008
050 aQA76.9.A25
072 aUR2bicssc
072 aUTN2bicssc
072 aCOM0530002bisacsh
072 aUR2thema
072 aUTN2thema
082 a005.8223
100 aLee, Newton.eauthor.4aut4http://id.loc.gov/vocabulary/relators/aut
245 00 aCounterterrorism and Cybersecurityh[electronic resource] :bTotal Information Awareness /cby Newton Lee.
250 a3rd ed. 2024.
264 aCham :bSpringer International Publishing :bImprint: Springer,c2024.
300 aXIX, 627 p. 132 illus., 128 illus. in color.bonline resource.
336 atextbtxt2rdacontent
337 acomputerbc2rdamedia
338 aonline resourcebcr2rdacarrier
347 atext filebPDF2rda
505 aPart I Counterterrorism History: Then and Now -- From September 11 Attacks to Israel’s 9/11 -- FBI and U.S. Intelligence Community -- Part II Counterterrorism Strategies: Causes and Cures, War and Peace -- Cures for Terrorism -- War and Peace -- Part III Counterterrorism Technologies: Total Information Awareness -- Reincarnation of Total Information Awareness and Edward Snowden’s NSA Leaks -- Two-Way Street of Total Information Awareness -- Part IV Cybersecurity: History, Strategies, and Technologies -- Cyber Warfare: Weapon of Mass Disruption -- Cyberattacks, Prevention, and Countermeasures -- Cybersecurity Training in Medical Centers: Leveraging Every Opportunity to Convey the Message (by Ray Balut and Jean C. Stanford) -- Plan X and Generation Z -- Part V Cybersecurity: Applications and Challenges -- Artificial Intelligence and Data Mining -- Gamification of Penetration Testing (by Darren Manners) -- USB Write Blocking and Forensics (by Philip Polstra) -- Team DESCARTES and DARPA’s Cyber Grand Challenge -- The Quantum Computing Threat (by Skip Sanzeri) -- Secure Communications for Quantum and Beyond: Orchestrated Cryptography for Agility and Policy (by Chris Cap, Scott Kawaguchi, Joey Lupo, Chris Trinidad) -- Index.
520 aCounterterrorism and cybersecurity are the top two priorities at the Federal Bureau of Investigation (FBI). Graduated from the FBI Citizens Academy in 2021, Prof. Newton Lee offers a broad survey of counterterrorism and cybersecurity history, strategies, and technologies in the 3rd edition of his riveting book that examines the role of the intelligence community, cures for terrorism, war and peace, cyber warfare, and quantum computing security. From September 11 attacks and Sony-pocalypse to Israel’s 9/11 and MOAB (Mother of All Breaches), the author shares insights from Hollywood such as 24, Homeland, The Americans, and The X-Files. In real life, the unsung heroes at the FBI have thwarted a myriad of terrorist attacks and cybercrimes. The FBI has worked diligently to improve its public image and build trust through community outreach and pop culture. Imagine Sherlock Holmes meets James Bond in crime fighting, FBI Director Christopher Wray says, “We’ve got technically trained personnel—with cutting-edge tools and skills you might never have imagined seeing outside of a James Bond movie—covering roughly 400 offices around the country.” This book is indispensable for anyone who is contemplating a career at the FBI, think tanks, or law enforcement agencies worldwide. It is also a must-read for every executive to safeguard their organization against cyberattacks that have caused more than 10 billion in damages. In the spirit of President John F. Kennedy, one may proclaim: “Ask not what counterterrorism and cybersecurity can do for you, ask what you can do for counterterrorism and cybersecurity.” Praise for the First Edition: “The book presents a crisp narrative on cyberattacks and how to protect against these attacks. … The author views terrorism as a disease that may be cured through education and communication. … The book is a relevant, useful, and genial mix of history, current times, practical advice, and policy goals.” - Brad Reid, ACM Computing Reviews “Very professional and well researched.” - Eleanor Clift, Newsweek and The Daily Beast.
650 aData protection.
650 aPolitical science.
650 aData mining.
650 aApplication software.
650 aMultimedia systems.
650 aData and Information Security.
650 aPolitical Science.
650 aData Mining and Knowledge Discovery.
650 aComputer and Information Systems Applications.
650 aMultimedia Information Systems.
710 aSpringerLink (Online service)
773 tSpringer Nature eBook
776 iPrinted edition:z9783031631252
776 iPrinted edition:z9783031631276
776 iPrinted edition:z9783031631283
856 uhttps://doi.org/10.1007/978-3-031-63126-9
912 aZDB-2-SCS
912 aZDB-2-SXCS
950 aComputer Science (SpringerNature-11645)
950 aComputer Science (R0) (SpringerNature-43710)
Counterterrorism and Cybersecurity[electronic resource] :Total Information Awareness /by Newton Lee
종류
전자책
서명
Counterterrorism and Cybersecurity[electronic resource] :Total Information Awareness /by Newton Lee
저자명
판 사항
3rd ed. 2024.
형태사항
XIX, 627 p 132 illus, 128 illus in color online resource.
주기사항
Counterterrorism and cybersecurity are the top two priorities at the Federal Bureau of Investigation (FBI). Graduated from the FBI Citizens Academy in 2021, Prof. Newton Lee offers a broad survey of counterterrorism and cybersecurity history, strategies, and technologies in the 3rd edition of his riveting book that examines the role of the intelligence community, cures for terrorism, war and peace, cyber warfare, and quantum computing security. From September 11 attacks and Sony-pocalypse to Israel’s 9/11 and MOAB (Mother of All Breaches), the author shares insights from Hollywood such as 24, Homeland, The Americans, and The X-Files. In real life, the unsung heroes at the FBI have thwarted a myriad of terrorist attacks and cybercrimes. The FBI has worked diligently to improve its public image and build trust through community outreach and pop culture. Imagine Sherlock Holmes meets James Bond in crime fighting, FBI Director Christopher Wray says, “We’ve got technically trained personnel—with cutting-edge tools and skills you might never have imagined seeing outside of a James Bond movie—covering roughly 400 offices around the country.” This book is indispensable for anyone who is contemplating a career at the FBI, think tanks, or law enforcement agencies worldwide. It is also a must-read for every executive to safeguard their organization against cyberattacks that have caused more than
관련 URL

소장정보

도서예약
서가부재도서 신고
보존서고신청
캠퍼스대출
우선정리신청
검색지인쇄
등록번호 청구기호 별치기호 소장위치 대출상태 반납예정일 서비스
전자자료는 소장사항이 존재하지 않습니다

책소개

전체 메뉴 보기