| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910450714403321 |
|
|
Titolo |
Fighting terror in cyberspace [[electronic resource] /] / editors Mark Last, Abraham Kandel |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New Jersey ; ; London, : World Scientific, c2005 |
|
|
|
|
|
|
|
ISBN |
|
1-281-89921-6 |
9786611899219 |
981-270-325-X |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (184 p.) |
|
|
|
|
|
|
Collana |
|
Series in machine perception and artificial intelligence ; ; v. 65 |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Terrorism - Computer network resources |
Terrorism - Prevention |
Cyberterrorism - Prevention |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Preface; Contents; 1. Terrorism and the Internet: Use and Abuse; 2. The Radical Islam and the Cyber Jihad; 3. Using Data Mining Technology for Terrorist Detection on the Web; 4. A Content-Based Model for Web-Monitoring; 5. TDS - An Innovative Terrorist Detection System; 6. Clustering Algorithms for Variable-Length Vectors and Their Application to Detecting Terrorist Activities; 7. Analysis of Financial Intelligence and the Detection of Terror Financing; 8. Identification of Terrorist Web Sites with Cross-Lingual Classification Tools; Appendix A Useful Sources |
Appendix B Terrorist Web Sites - ExamplesAppendix C About the Authors; Index |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
As became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters to their networks. This is evident from the large number of web sites run by different terrorist organizations, though the URLs and |
|
|
|
|
|
|
|
|
|
|
|
|
|
geographical locations of these web sites are frequently moved around the globe. The wide use of the Internet by terrorists makes some people think that the risk of a major cyber-attack |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910956999003321 |
|
|
Autore |
Rogers Russ |
|
|
Titolo |
Hacking a terror network : the silent threat of covert channels / / Russ Rogers, Matthew G. Devost, technical editor |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Rockland, MA, : Syngress, : Distributed by O'Reilly Media, c2005 |
|
|
|
|
|
|
|
ISBN |
|
9786611035792 |
9781281035790 |
1281035793 |
9780080488882 |
0080488889 |
9781597490160 |
1597490164 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (401 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Terrorism - Computer network resources |
Thrillers (Fiction) |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Contents; Foreword; Prologue; Chapter 1: The Mind of Terror; Chapter 2: Unseen Planning; Chapter 3: Making Friends; Chapter 4: One Step Closer; Chapter 5: Over the Line; Chapter 6: Images of Death; Chapter 7: The Real Assignment; Chapter 8: Creating the Code; Chapter 9: Over the Edge; Chapter 10: Biding Time; Chapter 11: Covert Channels; Chapter 12: Facing the Truth; Chapter 13: Taking Command; Chapter 14: Racing the Clock; Chapter 15: Losing Control; Chapter 16: Heightened Motivation; Chapter 17: Chasing Ghosts; Chapter 18: Taking Back Control; Chapter 19: Vengeance for Deceit |
|
|
|
|
|
|
|
|
|
|
|
Chapter 20: Eliminating False PositivesChapter 21: Gaining a Finger Hold; Chapter 22: Compressing Timelines; Chapter 23: A Plan Comes Together; Chapter 24: Turning Fiction into Reality; Glossary; Other books from Russ Rogers and Security Horizon, Inc.... |
|
|
|
|
|
|
Sommario/riassunto |
|
Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic ""insider's look"" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to ""hack along"" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combina |
|
|
|
|
|
|
|
| |