Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Imagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total Information Awareness book series by Newton Lee. The book examines U.S. counterterrorism history, technologies, and strategies from a unique and thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from great thought leaders, and even the make-believe of Hollywood. Demystifying Total Information Awareness, the author expounds on the U.S. intelligence community, artificial intelligence in data…mehr
Imagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total Information Awareness book series by Newton Lee. The book examines U.S. counterterrorism history, technologies, and strategies from a unique and thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from great thought leaders, and even the make-believe of Hollywood. Demystifying Total Information Awareness, the author expounds on the U.S. intelligence community, artificial intelligence in data mining, social media and privacy, cyber attacks and prevention, causes and cures for terrorism, and longstanding issues of war and peace.
The book offers practical advice for businesses, governments, and individuals to better secure the world and protect cyberspace. It quotes U.S. Navy Admiral and NATO’s Supreme Allied Commander James Stavridis: “Instead of building walls to create security, we need to build bridges.” The book also provides a glimpse into the future of Plan X and Generation Z, along with an ominous prediction from security advisor Marc Goodman at TEDGlobal 2012: “If you control the code, you control the world.”
Counterterrorism and Cybersecurity: Total Information Awareness will keep you up at night but at the same time give you some peace of mind knowing that “our problems are manmade — therefore they can be solved by man [or woman],” as President John F. Kennedy said at the American University commencement in June 1963.
Newton Lee is the founding president of the 501(c)(3) nonprofit Institute for Education, Research, and Scholarships based in Los Angeles, California, a former Disney and Bell Labs engineer, and a 2021 graduate of the FBI Citizens Academy. Serving as an FBI Ambassador, Lee expounds on social media, campus safety, student mental health, cybersecurity, and counterterrorism as portrayed in the highly acclaimed Total Information Awareness book series published by Springer Nature. The Total Information Awareness trilogy has garnered rave reviews from Newsweek and The Daily Beast, ACM Computing Reviews, AdWeek, and Choice Magazine, among others. Veteran Staff Sergeant Andrew Price of the United States Air Force (USAF) remarked, "I am inspired by the prospect of world peace. I'd fully recommend following the author's steps, reaching beyond our borders, making friends outside our norm, and helping to foster world peace and a better tomorrow." Lee earned a B.S. and M.S. in Computer Science from Virginia Tech as well as an A.S. in Electrical Engineering and an honorary doctorate in Computer Science from Vincennes University. He has been honored with a Michigan Leading Edge Technologies Award, two community development awards from the California Junior Chamber of Commerce, and four volunteer project leadership awards from The Walt Disney Company.
Inhaltsangabe
PART I: Counterterrorism in Retrospect: Then and Now.- U.S. Intelligence Community.- PART II: Counterterrorism Technologies: Total Information Awareness and Data Mining.- The Rise and Fall of Total Information Awareness.- The Afterlife of Total Information Awareness.- Artificial Intelligence and Data Mining.- PART III: Counterterrorism Technologies: Social Media and Cybersecurity.- Social Media and Two-way Street of Total Information Awareness.- Cyber Warfare: Weapon of Mass Destruction.- Cyber Attacks, Prevention and Countermeasures.- Plan X and Generation Z.- PART IV: Counterterrorism Strategies: Causes and Cures.- Understanding Terrorism.- Cure for Terrorism.- War and Peace.
Part I Counterterrorism History: Then and Now.- From September 11 Attacks to Israel's 9/11.- FBI and U.S. Intelligence Community.- Part II Counterterrorism Strategies: Causes and Cures, War and Peace.- Cures for Terrorism.- War and Peace.- Part III Counterterrorism Technologies: Total Information Awareness.- Reincarnation of Total Information Awareness and Edward Snowden's NSA Leaks.- Two-Way Street of Total Information Awareness.- Part IV Cybersecurity: History, Strategies, and Technologies.- Cyber Warfare: Weapon of Mass Disruption.- Cyberattacks, Prevention, and Countermeasures.- Cybersecurity Training in Medical Centers: Leveraging Every Opportunity to Convey the Message (by Ray Balut and Jean C. Stanford).- Plan X and Generation Z.- Part V Cybersecurity: Applications and Challenges.- Artificial Intelligence and Data Mining.- Gamification of Penetration Testing (by Darren Manners).- USB Write Blocking and Forensics (by Philip Polstra).- Team DESCARTES and DARPA's Cyber Grand Challenge.- The Quantum Computing Threat (by Skip Sanzeri).- Secure Communications for Quantum and Beyond: Orchestrated Cryptography for Agility and Policy (by Chris Cap, Scott Kawaguchi, Joey Lupo, Chris Trinidad).- Index.
PART I: Counterterrorism in Retrospect: Then and Now.- U.S. Intelligence Community.- PART II: Counterterrorism Technologies: Total Information Awareness and Data Mining.- The Rise and Fall of Total Information Awareness.- The Afterlife of Total Information Awareness.- Artificial Intelligence and Data Mining.- PART III: Counterterrorism Technologies: Social Media and Cybersecurity.- Social Media and Two-way Street of Total Information Awareness.- Cyber Warfare: Weapon of Mass Destruction.- Cyber Attacks, Prevention and Countermeasures.- Plan X and Generation Z.- PART IV: Counterterrorism Strategies: Causes and Cures.- Understanding Terrorism.- Cure for Terrorism.- War and Peace.
Part I Counterterrorism History: Then and Now.- From September 11 Attacks to Israel's 9/11.- FBI and U.S. Intelligence Community.- Part II Counterterrorism Strategies: Causes and Cures, War and Peace.- Cures for Terrorism.- War and Peace.- Part III Counterterrorism Technologies: Total Information Awareness.- Reincarnation of Total Information Awareness and Edward Snowden's NSA Leaks.- Two-Way Street of Total Information Awareness.- Part IV Cybersecurity: History, Strategies, and Technologies.- Cyber Warfare: Weapon of Mass Disruption.- Cyberattacks, Prevention, and Countermeasures.- Cybersecurity Training in Medical Centers: Leveraging Every Opportunity to Convey the Message (by Ray Balut and Jean C. Stanford).- Plan X and Generation Z.- Part V Cybersecurity: Applications and Challenges.- Artificial Intelligence and Data Mining.- Gamification of Penetration Testing (by Darren Manners).- USB Write Blocking and Forensics (by Philip Polstra).- Team DESCARTES and DARPA's Cyber Grand Challenge.- The Quantum Computing Threat (by Skip Sanzeri).- Secure Communications for Quantum and Beyond: Orchestrated Cryptography for Agility and Policy (by Chris Cap, Scott Kawaguchi, Joey Lupo, Chris Trinidad).- Index.
Rezensionen
"The author of Facebook Nation: Total Information Awareness presents in this new book a timely, informative, and interesting discussion of cybersecurity and cyberterrorism. Easily read and generally nonpartisan, this book should be on the reading list of anyone thinking about the broad policy issues and trends surrounding data mining, privacy, and cyberwarfare. ... The book presents a crisp narrative on common cyber attacks that currently occur and discusses how business and government may protect against these attacks. ... The narrative is certainly full of detail, but it moves along briskly in a compelling fashion that makes it hard to put down. ... The author views terrorism as a disease that may be cured through education and communication. ... The book concludes with the optimistic view that people want peace, and that social media provides opportunities for achieving this. ... The book is a relevant, useful, and genial mix of history, current times, practical advice, and policy goals." (Brad Reid, ACM Computing Reviews, July, 2013)
"Very professional and well researched." (Eleanor Clift, Newsweek and The Daily Beast, July, 2013)
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG i.I. Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309