Counterterrorism and Cybersecurity (eBook)
XV, 489 Seiten
Springer International Publishing (Verlag)
978-3-319-17244-6 (ISBN)
From 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from thought leaders and the make-believe of Hollywood such as 24, Homeland and The Americans. President Barack Obama also said in his 2015 State of the Union address, 'We are making sure our government integrates intelligence to combat cyber threats, just as we have done to combat terrorism.
In this new edition, there are seven completely new chapters, including three new contributed chapters by healthcare chief information security officer Ray Balut and Jean C. Stanford, DEF CON speaker Philip Polstra and security engineer and Black Hat speaker Darren Manners, as well as new commentaries by communications expert Andy Marken and DEF CON speaker Emily Peed.
The book offers practical advice for businesses, governments and individuals to better secure the world and protect cyberspace.
Newton Lee is CEO of Newton Lee Laboratories LLC, president of the Institute for Education, Research and Scholarships, adjunct professor at Woodbury University's School of Media, Culture & Design and editor-in-chief of ACM Computers in Entertainment. Previously, he was a computer scientist at AT&T Bell Laboratories, senior producer and engineer at The Walt Disney Company, and research staff member at the Institute for Defense Analyses. Lee graduated Summa Cum Laude from Virginia Tech with a B.S. and M.S. degree in Computer Science, and he earned a perfect GPA from Vincennes University with an A.S. degree in Electrical Engineering and an honorary doctorate in Computer Science. He is the co-author of Disney Stories: Getting to Digital; author of the Total Information Awareness book series including Facebook Nation and Counterterrorism and Cyber security; coauthor/editor of the Digital Da Vinci book series including Computers in Music and Computers in the Arts and Sciences and editor-in-chief of the Encyclopedia of Computer Graphics and Games.
Newton Lee is CEO of Newton Lee Laboratories LLC, president of the Institute for Education, Research and Scholarships, adjunct professor at Woodbury University's School of Media, Culture & Design and editor-in-chief of ACM Computers in Entertainment. Previously, he was a computer scientist at AT&T Bell Laboratories, senior producer and engineer at The Walt Disney Company, and research staff member at the Institute for Defense Analyses. Lee graduated Summa Cum Laude from Virginia Tech with a B.S. and M.S. degree in Computer Science, and he earned a perfect GPA from Vincennes University with an A.S. degree in Electrical Engineering and an honorary doctorate in Computer Science. He is the co-author of Disney Stories: Getting to Digital; author of the Total Information Awareness book series including Facebook Nation and Counterterrorism and Cyber security; coauthor/editor of the Digital Da Vinci book series including Computers in Music and Computers in the Arts and Sciences and editor-in-chief of the Encyclopedia of Computer Graphics and Games.
September 11 Attacks.- U.S. Intelligence Community.- Understanding Terrorism.- Cures for Terrorism.- War and Peace.- The Rise and Fall of Total Information Awareness.- The Afterlife of Total Information Awareness and Edward Snowden's NSA Leaks.- A Two-Way Street of Total Information Awareness.- Cyber Warfare: Weapon of Mass Disruption.- Cyber Attacks, Prevention, and Countermeasures.- Cyber security Training in Medical Centers.- Plan X and Generation Z.- Artificial Intelligence and Data Mining.- Gamification of Penetration Testing.- USB Write Blocking and Forensics.- DARPA's Cyber Grand Challenge (2014-2016).
Erscheint lt. Verlag | 7.4.2015 |
---|---|
Zusatzinfo | XV, 489 p. 120 illus. |
Verlagsort | Cham |
Sprache | englisch |
Themenwelt | Mathematik / Informatik ► Informatik ► Datenbanken |
Mathematik / Informatik ► Informatik ► Grafik / Design | |
Sozialwissenschaften ► Politik / Verwaltung | |
Schlagworte | Blackhat • counterterrorism • cybersecurity • Cyberterrorism • cyber warfare • Data Mining • DEF CON • healthcare security • Peace • Penetration Test • security vulnerabilities • terrorism • war |
ISBN-10 | 3-319-17244-1 / 3319172441 |
ISBN-13 | 978-3-319-17244-6 / 9783319172446 |
Haben Sie eine Frage zum Produkt? |
Größe: 26,8 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich