Activity-based intelligence : principles and applications / / Patrick Biltgen, Stephen Ryan |
Autore | Biltgen Patrick |
Pubbl/distr/stampa | Boston : , : Artech House, , [2016] |
Descrizione fisica | 1 online resource (481 pages) : illustrations |
Disciplina | 327.1273 |
Collana | Artech House electronic warfare library |
Soggetto topico |
Intelligence service - Methodology
Electronic intelligence Multisensor data fusion |
Soggetto genere / forma | Electronic books. |
ISBN | 1-60807-877-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Forward -- Preface -- Chapter 1. Introduction and Motivation -- Chapter 2. ABI History and Origins -- Chapter 3. Discovering the Pillars of ABI -- Chapter 4. The Lexicon of ABI -- Chapter 5. Analytical Methods and ABI -- Chapter 6. Disambiguation and Entity Resolution -- Chapter 7. Discreteness and Durability in the Analytical Process -- Chapter 8. Patterns of Life and Activity Patterns -- Chapter 9. Incidental Collection -- Chapter 10. Data, Big Data, and Datafication -- Chapter 11. Collection -- Chapter 12. Automated Activity Extraction -- Chapter 13. Analysis and Visualization -- Chapter 14. Correlation and Fusion -- Chapter 15. Knowledge Management -- Chapter 16. Anticipatory Intelligence -- Chapter 17. ABI in Policing -- Chapter 18. ABI and the D.C. Beltway Sniper -- Chapter 19. Analyzing Transactions in a Network -- Chapter 20. ABI and the Search for Malaysian Airlines Flight 370 -- Chapter 21. Visual Analytics for Pattern-of-Life Analysis -- Chapter 22. Multi-INT Spatiotemporal Analysis -- Chapter 23. Pattern Analysis of Ubiquitous Sensors -- Chapter 24. ABI Now and Into the Future -- Chapter 25. Conclusion. |
Record Nr. | UNINA-9910465764403321 |
Biltgen Patrick | ||
Boston : , : Artech House, , [2016] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Activity-based intelligence : principles and applications / / Patrick Biltgen, Stephen Ryan |
Autore | Biltgen Patrick |
Pubbl/distr/stampa | Boston : , : Artech House, , [2016] |
Descrizione fisica | 1 online resource (481 pages) : illustrations |
Disciplina | 327.1273 |
Collana | Artech House electronic warfare library |
Soggetto topico |
Intelligence service - Methodology
Electronic intelligence Multisensor data fusion |
ISBN | 1-60807-877-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Forward -- Preface -- Chapter 1. Introduction and Motivation -- Chapter 2. ABI History and Origins -- Chapter 3. Discovering the Pillars of ABI -- Chapter 4. The Lexicon of ABI -- Chapter 5. Analytical Methods and ABI -- Chapter 6. Disambiguation and Entity Resolution -- Chapter 7. Discreteness and Durability in the Analytical Process -- Chapter 8. Patterns of Life and Activity Patterns -- Chapter 9. Incidental Collection -- Chapter 10. Data, Big Data, and Datafication -- Chapter 11. Collection -- Chapter 12. Automated Activity Extraction -- Chapter 13. Analysis and Visualization -- Chapter 14. Correlation and Fusion -- Chapter 15. Knowledge Management -- Chapter 16. Anticipatory Intelligence -- Chapter 17. ABI in Policing -- Chapter 18. ABI and the D.C. Beltway Sniper -- Chapter 19. Analyzing Transactions in a Network -- Chapter 20. ABI and the Search for Malaysian Airlines Flight 370 -- Chapter 21. Visual Analytics for Pattern-of-Life Analysis -- Chapter 22. Multi-INT Spatiotemporal Analysis -- Chapter 23. Pattern Analysis of Ubiquitous Sensors -- Chapter 24. ABI Now and Into the Future -- Chapter 25. Conclusion. |
Record Nr. | UNINA-9910792510903321 |
Biltgen Patrick | ||
Boston : , : Artech House, , [2016] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Activity-based intelligence : principles and applications / / Patrick Biltgen, Stephen Ryan |
Autore | Biltgen Patrick |
Pubbl/distr/stampa | Boston : , : Artech House, , [2016] |
Descrizione fisica | 1 online resource (481 pages) : illustrations |
Disciplina | 327.1273 |
Collana | Artech House electronic warfare library |
Soggetto topico |
Intelligence service - Methodology
Electronic intelligence Multisensor data fusion |
ISBN | 1-60807-877-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Forward -- Preface -- Chapter 1. Introduction and Motivation -- Chapter 2. ABI History and Origins -- Chapter 3. Discovering the Pillars of ABI -- Chapter 4. The Lexicon of ABI -- Chapter 5. Analytical Methods and ABI -- Chapter 6. Disambiguation and Entity Resolution -- Chapter 7. Discreteness and Durability in the Analytical Process -- Chapter 8. Patterns of Life and Activity Patterns -- Chapter 9. Incidental Collection -- Chapter 10. Data, Big Data, and Datafication -- Chapter 11. Collection -- Chapter 12. Automated Activity Extraction -- Chapter 13. Analysis and Visualization -- Chapter 14. Correlation and Fusion -- Chapter 15. Knowledge Management -- Chapter 16. Anticipatory Intelligence -- Chapter 17. ABI in Policing -- Chapter 18. ABI and the D.C. Beltway Sniper -- Chapter 19. Analyzing Transactions in a Network -- Chapter 20. ABI and the Search for Malaysian Airlines Flight 370 -- Chapter 21. Visual Analytics for Pattern-of-Life Analysis -- Chapter 22. Multi-INT Spatiotemporal Analysis -- Chapter 23. Pattern Analysis of Ubiquitous Sensors -- Chapter 24. ABI Now and Into the Future -- Chapter 25. Conclusion. |
Record Nr. | UNINA-9910826855803321 |
Biltgen Patrick | ||
Boston : , : Artech House, , [2016] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Blogs and military information strategy / / James Kinniburgh, Dorothy Denning |
Autore | Kinniburgh James |
Pubbl/distr/stampa | Hurlburt Field, Florida : , : The JSOU Press, , 2006 |
Descrizione fisica | 1 online resource (xii, 33 pages) |
Collana | JSOU report |
Soggetto topico |
Blogs
Information warfare - Blogs Strategy War on Terrorism, 2001-2009 - Electronic intelligence - United States Military intelligence - United States Electronic intelligence Information warfare |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910707943803321 |
Kinniburgh James | ||
Hurlburt Field, Florida : , : The JSOU Press, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Contemporary panopticism : current social control / / Azher Aslam |
Autore | Aslam Azher |
Pubbl/distr/stampa | Hamburg, [Germany] : , : Anchor Academic Publishing, , 2016 |
Descrizione fisica | 1 online resource (40 pages) |
Disciplina | 621.38928 |
Collana | Compact |
Soggetto topico |
Electronic surveillance
Electronic intelligence |
ISBN | 3-95489-486-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910150433903321 |
Aslam Azher | ||
Hamburg, [Germany] : , : Anchor Academic Publishing, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptologic aspects of German intelligence activities in South America during World War II / / David P. Mowry |
Autore | Mowry David P. |
Pubbl/distr/stampa | Fort George G. Meade, MD : , : Center for Cryptologic History, National Security Agency, , 2011 |
Descrizione fisica | 1 online resource ( vi, 94 pages) : illustrations |
Collana | United States cryptologic history. Series IV |
Soggetto topico |
World War, 1939-1945 - Cryptography
Confidential communications - Germany World War, 1939-1945 - Military intelligence - Germany World War, 1939-1945 - Electronic intelligence - Germany Confidential communications Cryptography Electronic intelligence Military intelligence |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | United States cryptologic history. Series IV vol. v. 11 |
Record Nr. | UNINA-9910708002003321 |
Mowry David P. | ||
Fort George G. Meade, MD : , : Center for Cryptologic History, National Security Agency, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor |
Autore | Shimonski Robert |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (258 p.) |
Disciplina | 327.12 |
Soggetto topico |
Electronic intelligence
Internet in espionage Cyber intelligence (Computer security) Internet - Security measures Computer crimes |
Soggetto genere / forma | Electronic books. |
ISBN | 0-12-801468-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home) Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods Protect Yourself! |
Record Nr. | UNINA-9910460221703321 |
Shimonski Robert | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor |
Autore | Shimonski Robert |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (258 p.) |
Disciplina | 327.12 |
Soggetto topico |
Electronic intelligence
Internet in espionage Cyber intelligence (Computer security) Internet - Security measures Computer crimes |
ISBN | 0-12-801468-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home) Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods Protect Yourself! |
Record Nr. | UNINA-9910787012103321 |
Shimonski Robert | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor |
Autore | Shimonski Robert |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (258 p.) |
Disciplina | 327.12 |
Soggetto topico |
Electronic intelligence
Internet in espionage Cyber intelligence (Computer security) Internet - Security measures Computer crimes |
ISBN | 0-12-801468-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home) Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods Protect Yourself! |
Record Nr. | UNINA-9910829064003321 |
Shimonski Robert | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Database creation for information processing methods, metrics, and models (DCIPM3) / / Sean Murray [and five others] |
Autore | Murray Sean |
Pubbl/distr/stampa | Adelphi, MD : , : Army Research Laboratory, , May 2009 |
Descrizione fisica | 1 online resource (vi, 14 pages) : illustrations |
Soggetto topico |
Electronic intelligence
Information retrieval Data mining Semantic Web |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Database creation for information processing methods, metrics, and models |
Record Nr. | UNINA-9910699576903321 |
Murray Sean | ||
Adelphi, MD : , : Army Research Laboratory, , May 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|