Counterterrorism and Cybersecurity (Registro nro. 275911)

MARC details
000 -LIDER
fixed length control field 05427nam a22006015i 4500
001 - CONTROL NUMBER
control field 978-3-031-63126-9
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250516160115.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240802s2024 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031631269
-- 978-3-031-63126-9
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Lee, Newton.
Relator term author.
Relator code aut
-- http://id.loc.gov/vocabulary/relators/aut
245 10 - TITLE STATEMENT
Title Counterterrorism and Cybersecurity
Medium [electronic resource] :
Remainder of title Total Information Awareness /
Statement of responsibility, etc. by Newton Lee.
250 ## - EDITION STATEMENT
Edition statement 3rd ed. 2024.
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2024.
300 ## - PHYSICAL DESCRIPTION
Extent XIX, 627 p. 132 illus., 128 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Part I Counterterrorism History: Then and Now -- From September 11 Attacks to Israel's 9/11 -- FBI and U.S. Intelligence Community -- Part II Counterterrorism Strategies: Causes and Cures, War and Peace -- Cures for Terrorism -- War and Peace -- Part III Counterterrorism Technologies: Total Information Awareness -- Reincarnation of Total Information Awareness and Edward Snowden's NSA Leaks -- Two-Way Street of Total Information Awareness -- Part IV Cybersecurity: History, Strategies, and Technologies -- Cyber Warfare: Weapon of Mass Disruption -- Cyberattacks, Prevention, and Countermeasures -- Cybersecurity Training in Medical Centers: Leveraging Every Opportunity to Convey the Message (by Ray Balut and Jean C. Stanford) -- Plan X and Generation Z -- Part V Cybersecurity: Applications and Challenges -- Artificial Intelligence and Data Mining -- Gamification of Penetration Testing (by Darren Manners) -- USB Write Blocking and Forensics (by Philip Polstra) -- Team DESCARTES and DARPA's Cyber Grand Challenge -- The Quantum Computing Threat (by Skip Sanzeri) -- Secure Communications for Quantum and Beyond: Orchestrated Cryptography for Agility and Policy (by Chris Cap, Scott Kawaguchi, Joey Lupo, Chris Trinidad) -- Index.
520 ## - SUMMARY, ETC.
Summary, etc. Counterterrorism and cybersecurity are the top two priorities at the Federal Bureau of Investigation (FBI). Graduated from the FBI Citizens Academy in 2021, Prof. Newton Lee offers a broad survey of counterterrorism and cybersecurity history, strategies, and technologies in the 3rd edition of his riveting book that examines the role of the intelligence community, cures for terrorism, war and peace, cyber warfare, and quantum computing security. From September 11 attacks and Sony-pocalypse to Israel's 9/11 and MOAB (Mother of All Breaches), the author shares insights from Hollywood such as 24, Homeland, The Americans, and The X-Files. In real life, the unsung heroes at the FBI have thwarted a myriad of terrorist attacks and cybercrimes. The FBI has worked diligently to improve its public image and build trust through community outreach and pop culture. Imagine Sherlock Holmes meets James Bond in crime fighting, FBI Director Christopher Wray says, "We've got technically trained personnel-with cutting-edge tools and skills you might never have imagined seeing outside of a James Bond movie-covering roughly 400 offices around the country." This book is indispensable for anyone who is contemplating a career at the FBI, think tanks, or law enforcement agencies worldwide. It is also a must-read for every executive to safeguard their organization against cyberattacks that have caused more than $10 billion in damages. In the spirit of President John F. Kennedy, one may proclaim: "Ask not what counterterrorism and cybersecurity can do for you, ask what you can do for counterterrorism and cybersecurity." Praise for the First Edition: "The book presents a crisp narrative on cyberattacks and how to protect against these attacks. ... The author views terrorism as a disease that may be cured through education and communication. ... The book is a relevant, useful, and genial mix of history, current times, practical advice, and policy goals." - Brad Reid, ACM Computing Reviews "Very professional and well researched." - Eleanor Clift, Newsweek and The Daily Beast.
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE
Owner UABC ;
Method of acquisition Perpetuidad
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Political science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Data mining.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Application software.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Multimedia systems.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Political Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Data Mining and Knowledge Discovery.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Computer and Information Systems Applications.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Multimedia Information Systems.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783031631252
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783031631276
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783031631283
856 40 - ELECTRONIC LOCATION AND ACCESS
Public note Libro electrónico
Uniform Resource Identifier http://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-63126-9
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Libro Electrónico
Existencias
Estado de retiro Colección Ubicación permanente Ubicación actual Fecha de ingreso Total Checkouts Date last seen Número de copia Tipo de material
  Colección de Libros Electrónicos Biblioteca Electrónica Biblioteca Electrónica 16/05/2025   16/05/2025 1 Libro Electrónico

Con tecnología Koha