Counterterrorism and Cybersecurity (Record no. 44834)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03938nam a22004937a 4500 |
001 - CONTROL NUMBER | |
control field | sulb-eb0022742 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | BD-SySUS |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20160413122315.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 130417s2013 xxu| s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781461472056 |
-- | 978-1-4614-7205-6 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-1-4614-7205-6 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.76.A65 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UNH |
Source | bicssc |
Subject category code | UDBD |
Source | bicssc |
Subject category code | COM032000 |
Source | bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.7 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Lee, Newton. |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Counterterrorism and Cybersecurity |
Medium | [electronic resource] : |
Remainder of title | Total Information Awareness / |
Statement of responsibility, etc. | by Newton Lee. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | New York, NY : |
Name of producer, publisher, distributor, manufacturer | Springer New York : |
-- | Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice | 2013. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XII, 234 p. |
Other physical details | online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS | |
File type | text file |
Encoding format | |
Source | rda |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | PART I: Counterterrorism in Retrospect: Then and Now -- U.S. Intelligence Community -- PART II: Counterterrorism Technologies: Total Information Awareness and Data Mining -- The Rise and Fall of Total Information Awareness -- The Afterlife of Total Information Awareness -- Artificial Intelligence and Data Mining -- PART III: Counterterrorism Technologies: Social Media and Cybersecurity -- Social Media and Two-way Street of Total Information Awareness -- Cyber Warfare: Weapon of Mass Destruction -- Cyber Attacks, Prevention and Countermeasures -- Plan X and Generation Z -- PART IV: Counterterrorism Strategies: Causes and Cures -- Understanding Terrorism -- Cure for Terrorism -- War and Peace. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Imagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total Information Awareness book series by Newton Lee. The book examines U.S. counterterrorism history, technologies, and strategies from a unique and thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from great thought leaders, and even the make-believe of Hollywood. Demystifying Total Information Awareness, the author expounds on the U.S. intelligence community, artificial intelligence in data mining, social media and privacy, cyber attacks and prevention, causes and cures for terrorism, and longstanding issues of war and peace. The book offers practical advice for businesses, governments, and individuals to better secure the world and protect cyberspace. It quotes U.S. Navy Admiral and NATO’s Supreme Allied Commander James Stavridis: “Instead of building walls to create security, we need to build bridges.” The book also provides a glimpse into the future of Plan X and Generation Z, along with an ominous prediction from security advisor Marc Goodman at TEDGlobal 2012: “If you control the code, you control the world.” Counterterrorism and Cybersecurity: Total Information Awareness will keep you up at night but at the same time give you some peace of mind knowing that “our problems are manmade — therefore they can be solved by man [or woman],” as President John F. Kennedy said at the American University commencement in June 1963. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer science. |
Topical term or geographic name as entry element | Data mining. |
Topical term or geographic name as entry element | Multimedia information systems. |
Topical term or geographic name as entry element | Management information systems. |
Topical term or geographic name as entry element | Computer Science. |
Topical term or geographic name as entry element | Information Systems Applications (incl. Internet). |
Topical term or geographic name as entry element | Multimedia Information Systems. |
Topical term or geographic name as entry element | Management of Computing and Information Systems. |
Topical term or geographic name as entry element | Data Mining and Knowledge Discovery. |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9781461472049 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="http://dx.doi.org/10.1007/978-1-4614-7205-6">http://dx.doi.org/10.1007/978-1-4614-7205-6</a> |
912 ## - | |
-- | ZDB-2-SCS |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type |
No items available.