Counterterrorism and Open Source Intelligence [recurso electrónico] / edited by Uffe Kock Wiil.
Tipo de material: TextoSeries Lecture Notes in Social NetworksEditor: Vienna : Springer Vienna : Imprint: Springer, 2011Descripción: XVIII, 458 p. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783709103883Tema(s): Computer science | Data protection | Computer Science | Systems and Data Security | Statistical Physics, Dynamical Systems and ComplexityFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 005.8 Clasificación LoC:QA76.9.A25Recursos en línea: Libro electrónico En: Springer eBooksResumen: Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open source intelligence and perspectives on how to effectively operate in order to prevent terrorist activities.Tipo de ítem | Biblioteca actual | Colección | Signatura | Copia número | Estado | Fecha de vencimiento | Código de barras |
---|---|---|---|---|---|---|---|
Libro Electrónico | Biblioteca Electrónica | Colección de Libros Electrónicos | QA76.9 .A25 (Browse shelf(Abre debajo)) | 1 | No para préstamo | 376980-2001 |
Navegando Biblioteca Electrónica Estantes, Código de colección: Colección de Libros Electrónicos Cerrar el navegador de estanterías (Oculta el navegador de estanterías)
QA76.9 .A25 Cryptology and Network Security | QA76.9 .A25 Cryptography and Coding | QA76.9 .A25 Progress in Cryptology – INDOCRYPT 2011 | QA76.9 .A25 Counterterrorism and Open Source Intelligence | QA76.9 .A25 ISSE 2009 Securing Electronic Business Processes | QA76.9 .A25 ISSE 2010 Securing Electronic Business Processes | QA76.9 .A25 IT Security Management |
Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open source intelligence and perspectives on how to effectively operate in order to prevent terrorist activities.
19