LEADER 04536nam 22007575 450 001 9910299250803321 005 20200630023426.0 010 $a3-319-17244-1 024 7 $a10.1007/978-3-319-17244-6 035 $a(CKB)3710000000394701 035 $a(EBL)2094705 035 $a(SSID)ssj0001500981 035 $a(PQKBManifestationID)11874368 035 $a(PQKBTitleCode)TC0001500981 035 $a(PQKBWorkID)11521983 035 $a(PQKB)10049930 035 $a(DE-He213)978-3-319-17244-6 035 $a(MiAaPQ)EBC2094705 035 $a(PPN)185486096 035 $a(EXLCZ)993710000000394701 100 $a20150407d2015 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCounterterrorism and Cybersecurity$b[electronic resource] $eTotal Information Awareness /$fby Newton Lee 205 $a2nd ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (488 p.) 300 $aDescription based upon print version of record. 311 $a3-319-17243-3 320 $aIncludes bibliographical references and index. 327 $aSeptember 11 Attacks -- U.S. Intelligence Community -- Understanding Terrorism -- Cures for Terrorism -- War and Peace -- The Rise and Fall of Total Information Awareness -- The Afterlife of Total Information Awareness and Edward Snowden's NSA Leaks -- A Two-Way Street of Total Information Awareness -- Cyber Warfare: Weapon of Mass Disruption -- Cyber Attacks, Prevention, and Countermeasures -- Cyber security Training in Medical Centers -- Plan X and Generation Z -- Artificial Intelligence and Data Mining -- Gamification of Penetration Testing -- USB Write Blocking and Forensics -- DARPA's Cyber Grand Challenge (2014-2016). 330 $aFrom 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from thought leaders and the make-believe of Hollywood such as 24, Homeland and The Americans. President Barack Obama also said in his 2015 State of the Union address, "We are making sure our government integrates intelligence to combat cyber threats, just as we have done to combat terrorism. In this new edition, there are seven completely new chapters, including three new contributed chapters by healthcare chief information security officer Ray Balut and Jean C. Stanford, DEF CON speaker Philip Polstra and security engineer and Black Hat speaker Darren Manners, as well as new commentaries by communications expert Andy Marken and DEF CON speaker Emily Peed. The book offers practical advice for businesses, governments and individuals to better secure the world and protect cyberspace. 606 $aComputer security 606 $aPolitical science 606 $aData mining 606 $aApplication software 606 $aMultimedia information systems 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aPolitical Science$3https://scigraph.springernature.com/ontologies/product-market-codes/911000 606 $aData Mining and Knowledge Discovery$3https://scigraph.springernature.com/ontologies/product-market-codes/I18030 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aMultimedia Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I18059 615 0$aComputer security. 615 0$aPolitical science. 615 0$aData mining. 615 0$aApplication software. 615 0$aMultimedia information systems. 615 14$aSystems and Data Security. 615 24$aPolitical Science. 615 24$aData Mining and Knowledge Discovery. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aMultimedia Information Systems. 676 $a004 676 $a005.7 676 $a005.8 676 $a006.312 676 $a006.7 676 $a320 700 $aLee$b Newton$4aut$4http://id.loc.gov/vocabulary/relators/aut$0960106 906 $aBOOK 912 $a9910299250803321 996 $aCounterterrorism and Cybersecurity$92500651 997 $aUNINA