000 03864nam a22004337a 4500
001 0082218
003 BD-SySUS
005 20251021124319.0
007 cr nn 008mamaa
008 130417s2013 xxu| s |||| 0|eng d
020 _a9783031522710
040 _cBD-SySUS
050 4 _aQA76.76.A65
072 7 _aUNH
_2bicssc
072 7 _aUDBD
_2bicssc
072 7 _aCOM032000
_2bisacsh
082 0 4 _a005.7
_223
_bCYB
245 1 0 _aCybersecurity and Artificial Intelligence:
_bTransformational Strategies and Disruptive Innovation (Advanced Sciences and Technologies for Security Applications) /
_cby Hamid Jahankhani (Editor), Gordon Bowen (Editor), Mhd Saeed Sharif (Editor), Osama Hussien (Editor)
264 1 _aNew York, NY :
_bSpringer New York :
_bImprint: Springer,
_c2024..
300 _a332 p.
_bill. ;
_c22 cm.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aPART I: Counterterrorism in Retrospect: Then and Now -- U.S. Intelligence Community -- PART II: Counterterrorism Technologies: Total Information Awareness and Data Mining -- The Rise and Fall of Total Information Awareness -- The Afterlife of Total Information Awareness -- Artificial Intelligence and Data Mining -- PART III: Counterterrorism Technologies: Social Media and Cybersecurity -- Social Media and Two-way Street of Total Information Awareness -- Cyber Warfare: Weapon of Mass Destruction -- Cyber Attacks, Prevention and Countermeasures -- Plan X and Generation Z -- PART IV: Counterterrorism Strategies: Causes and Cures -- Understanding Terrorism -- Cure for Terrorism -- War and Peace.
520 _aImagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total Information Awareness book series by Newton Lee. The book examines U.S. counterterrorism history, technologies, and strategies from a unique and thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from great thought leaders, and even the make-believe of Hollywood. Demystifying Total Information Awareness, the author expounds on the U.S. intelligence community, artificial intelligence in data mining, social media and privacy, cyber attacks and prevention, causes and cures for terrorism, and longstanding issues of war and peace. The book offers practical advice for businesses, governments, and individuals to better secure the world and protect cyberspace. It quotes U.S. Navy Admiral and NATO’s Supreme Allied Commander James Stavridis: “Instead of building walls to create security, we need to build bridges.” The book also provides a glimpse into the future of Plan X and Generation Z, along with an ominous prediction from security advisor Marc Goodman at TEDGlobal 2012: “If you control the code, you control the world.” Counterterrorism and Cybersecurity: Total Information Awareness will keep you up at night but at the same time give you some peace of mind knowing that “our problems are manmade — therefore they can be solved by man [or woman],” as President John F. Kennedy said at the American University commencement in June 1963.
650 0 _aComputer science.
_970673
650 0 _aData mining.
_970674
650 0 _aMultimedia information systems.
_970675
650 0 _aManagement information systems.
_970676
650 1 4 _aComputer Science.
_970677
650 2 4 _aInformation Systems Applications (incl. Internet).
_970678
650 2 4 _aMultimedia Information Systems.
_970679
650 2 4 _aManagement of Computing and Information Systems.
_970680
650 2 4 _aData Mining and Knowledge Discovery.
_970681
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781461472049
942 _2ddc
_cBK
999 _c87404
_d87404