1.

Record Nr.

UNINA9910450714403321

Titolo

Fighting terror in cyberspace [[electronic resource] /] / editors Mark Last, Abraham Kandel

Pubbl/distr/stampa

New Jersey ; ; London, : World Scientific, c2005

ISBN

1-281-89921-6

9786611899219

981-270-325-X

Descrizione fisica

1 online resource (184 p.)

Collana

Series in machine perception and artificial intelligence ; ; v. 65

Altri autori (Persone)

LastMark

KandelAbraham

Disciplina

363.32

Soggetti

Terrorism - Computer network resources

Terrorism - Prevention

Cyberterrorism - Prevention

Electronic books.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Preface; Contents; 1. Terrorism and the Internet: Use and Abuse; 2. The Radical Islam and the Cyber Jihad; 3. Using Data Mining Technology for Terrorist Detection on the Web; 4. A Content-Based Model for Web-Monitoring; 5. TDS - An Innovative Terrorist Detection System; 6. Clustering Algorithms for Variable-Length Vectors and Their Application to Detecting Terrorist Activities; 7. Analysis of Financial Intelligence and the Detection of Terror Financing; 8. Identification of Terrorist Web Sites with Cross-Lingual Classification Tools; Appendix A Useful Sources

Appendix B Terrorist Web Sites - ExamplesAppendix C About the Authors; Index

Sommario/riassunto

As became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters to their networks. This is evident from the large number of web sites run by different terrorist organizations, though the URLs and



geographical locations of these web sites are frequently moved around the globe. The wide use of the Internet by terrorists makes some people think that the risk of a major cyber-attack

2.

Record Nr.

UNINA9910956999003321

Autore

Rogers Russ

Titolo

Hacking a terror network : the silent threat of covert channels / / Russ Rogers, Matthew G. Devost, technical editor

Pubbl/distr/stampa

Rockland, MA, : Syngress, : Distributed by O'Reilly Media, c2005

ISBN

9786611035792

9781281035790

1281035793

9780080488882

0080488889

9781597490160

1597490164

Edizione

[1st ed.]

Descrizione fisica

1 online resource (401 p.)

Disciplina

303.625

363.325

364.16/8

Soggetti

Terrorism - Computer network resources

Thrillers (Fiction)

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di contenuto

Cover; Contents; Foreword; Prologue; Chapter 1: The Mind of Terror; Chapter 2: Unseen Planning; Chapter 3: Making Friends; Chapter 4: One Step Closer; Chapter 5: Over the Line; Chapter 6: Images of Death; Chapter 7: The Real Assignment; Chapter 8: Creating the Code; Chapter 9: Over the Edge; Chapter 10: Biding Time; Chapter 11: Covert Channels; Chapter 12: Facing the Truth; Chapter 13: Taking Command; Chapter 14: Racing the Clock; Chapter 15: Losing Control; Chapter 16: Heightened Motivation; Chapter 17: Chasing Ghosts; Chapter 18: Taking Back Control; Chapter 19: Vengeance for Deceit



Chapter 20: Eliminating False PositivesChapter 21: Gaining a Finger Hold; Chapter 22: Compressing Timelines; Chapter 23: A Plan Comes Together; Chapter 24: Turning Fiction into Reality; Glossary; Other books from Russ Rogers and Security Horizon, Inc....

Sommario/riassunto

Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic ""insider's look"" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to ""hack along"" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combina