000726513 000__ 03467cam\a2200481Ii\4500 000726513 001__ 726513 000726513 005__ 20230306140825.0 000726513 006__ m\\\\\o\\d\\\\\\\\ 000726513 007__ cr\cn\nnnunnun 000726513 008__ 150413s2015\\\\sz\\\\\\ob\\\\001\0\eng\d 000726513 020__ $$a9783319172446$$qelectronic book 000726513 020__ $$a3319172441$$qelectronic book 000726513 020__ $$z9783319172439 000726513 0247_ $$a10.1007/978-3-319-17244-6$$2doi 000726513 035__ $$aSP(OCoLC)ocn907238293 000726513 035__ $$aSP(OCoLC)907238293 000726513 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dGW5XE$$dN$T$$dYDXCP$$dIDEBK$$dUPM$$dCOO$$dEBLCP$$dDEBSZ$$dVLB 000726513 043__ $$an-us--- 000726513 049__ $$aISEA 000726513 050_4 $$aHV6432$$b.L44 2015eb 000726513 08204 $$a363.325/17$$223 000726513 1001_ $$aLee, Newton,$$eauthor. 000726513 24510 $$aCounterterrorism and cybersecurity$$h[electronic resource] :$$btotal information awareness /$$cNewton Lee. 000726513 250__ $$aSecond edition 000726513 264_1 $$aCham :$$bSpringer,$$c2015. 000726513 300__ $$a1 online resource 000726513 336__ $$atext$$btxt$$2rdacontent 000726513 337__ $$acomputer$$bc$$2rdamedia 000726513 338__ $$aonline resource$$bcr$$2rdacarrier 000726513 504__ $$aIncludes bibliographical references and index. 000726513 5050_ $$aSeptember 11 Attacks -- U.S. Intelligence Community -- Understanding Terrorism -- Cures for Terrorism -- War and Peace -- The Rise and Fall of Total Information Awareness -- The Afterlife of Total Information Awareness and Edward Snowden's NSA Leaks -- A Two-Way Street of Total Information Awareness -- Cyber Warfare: Weapon of Mass Disruption -- Cyber Attacks, Prevention, and Countermeasures -- Cyber security Training in Medical Centers -- Plan X and Generation Z -- Artificial Intelligence and Data Mining -- Gamification of Penetration Testing -- USB Write Blocking and Forensics -- DARPA's Cyber Grand Challenge (2014-2016). 000726513 506__ $$aAccess limited to authorized users. 000726513 520__ $$aFrom 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from thought leaders and the make-believe of Hollywood such as 24, Homeland and The Americans. President Barack Obama also said in his 2015 State of the Union address, "We are making sure our government integrates intelligence to combat cyber threats, just as we have done to combat terrorism. In this new edition, there are seven completely new chapters, including three new contributed chapters by healthcare chief information security officer Ray Balut and Jean C. Stanford, DEF CON speaker Philip Polstra and security engineer and Black Hat speaker Darren Manners, as well as new commentaries by communications expert Andy Marken and DEF CON speaker Emily Peed. The book offers practical advice for businesses, governments and individuals to better secure the world and protect cyberspace. 000726513 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed April 13, 2015). 000726513 650_0 $$aTerrorism$$zUnited States$$xPrevention. 000726513 650_0 $$aTerrorism$$zUnited States$$xPrevention$$xHistory. 000726513 650_0 $$aComputer networks$$xSecurity measures. 000726513 650_0 $$aData mining. 000726513 77608 $$iPrint version:$$z9783319172439 000726513 852__ $$bebk 000726513 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-17244-6$$zOnline Access$$91397441.1 000726513 909CO $$ooai:library.usi.edu:726513$$pGLOBAL_SET 000726513 980__ $$aEBOOK 000726513 980__ $$aBIB 000726513 982__ $$aEbook 000726513 983__ $$aOnline 000726513 994__ $$a92$$bISE