Counterterrorism and cybersecurity: total information awareness
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY [u.a.]
Springer
2013
|
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHM01 FHN01 FKE01 UBG01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781461472049 9781461472056 |
DOI: | 10.1007/978-1-4614-7205-6 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV040984151 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 130507s2013 |||| o||u| ||||||eng d | ||
015 | |a 13,O05 |2 dnb | ||
016 | 7 | |a 1033617229 |2 DE-101 | |
020 | |a 9781461472049 |9 978-1-4614-7204-9 | ||
020 | |a 9781461472056 |c Online |9 978-1-4614-7205-6 | ||
024 | 7 | |a 10.1007/978-1-4614-7205-6 |2 doi | |
024 | 3 | |a 9781461472056 | |
035 | |a (OCoLC)846965268 | ||
035 | |a (DE-599)DNB1033617229 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-634 |a DE-739 |a DE-355 | ||
082 | 0 | |a 005.7 | |
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Lee, Newton |e Verfasser |4 aut | |
245 | 1 | 0 | |a Counterterrorism and cybersecurity |b total information awareness |c Newton Lee |
264 | 1 | |a New York, NY [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 0 | 7 | |a Bekämpfung |0 (DE-588)4112701-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Data Mining |0 (DE-588)4428654-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 2 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 0 | 3 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 1 | 1 | |a Bekämpfung |0 (DE-588)4112701-8 |D s |
689 | 1 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 3 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4614-7205-6 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025962077&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025962077&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-025962077 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7205-6 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7205-6 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7205-6 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7205-6 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7205-6 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7205-6 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7205-6 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7205-6 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7205-6 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7205-6 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7205-6 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804150304520798208 |
---|---|
adam_text | COUNTERTERRORISM AND CYBERSECURITY
/ LEE, NEWTON
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
PART I: COUNTERTERRORISM IN RETROSPECT: THEN AND NOW
U.S. INTELLIGENCE COMMUNITY
PART II: COUNTERTERRORISM TECHNOLOGIES: TOTAL INFORMATION AWARENESS AND
DATA MINING
THE RISE AND FALL OF TOTAL INFORMATION AWARENESS
THE AFTERLIFE OF TOTAL INFORMATION AWARENESS
ARTIFICIAL INTELLIGENCE AND DATA MINING
PART III: COUNTERTERRORISM TECHNOLOGIES: SOCIAL MEDIA AND CYBERSECURITY
SOCIAL MEDIA AND TWO-WAY STREET OF TOTAL INFORMATION AWARENESS
CYBER WARFARE: WEAPON OF MASS DESTRUCTION
CYBER ATTACKS, PREVENTION AND COUNTERMEASURES
PLAN X AND GENERATION Z
PART IV: COUNTERTERRORISM STRATEGIES: CAUSES AND CURES
UNDERSTANDING TERRORISM
CURE FOR TERRORISM
WAR AND PEACE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
COUNTERTERRORISM AND CYBERSECURITY
/ LEE, NEWTON
: 2013
ABSTRACT / INHALTSTEXT
IMAGINE JAMES BOND MEETS SHERLOCK HOLMES: COUNTERTERRORISM AND
CYBERSECURITY IS THE SEQUEL TO FACEBOOK NATION IN THE TOTAL INFORMATION
AWARENESS BOOK SERIES BY NEWTON LEE. THE BOOK EXAMINES U.S.
COUNTERTERRORISM HISTORY, TECHNOLOGIES, AND STRATEGIES FROM A UNIQUE AND
THOUGHT-PROVOKING APPROACH THAT ENCOMPASSES PERSONAL EXPERIENCES,
INVESTIGATIVE JOURNALISM, HISTORICAL AND CURRENT EVENTS, IDEAS FROM
GREAT THOUGHT LEADERS, AND EVEN THE MAKE-BELIEVE OF HOLLYWOOD.
DEMYSTIFYING TOTAL INFORMATION AWARENESS, THE AUTHOR EXPOUNDS ON THE
U.S. INTELLIGENCE COMMUNITY, ARTIFICIAL INTELLIGENCE IN DATA MINING,
SOCIAL MEDIA AND PRIVACY, CYBER ATTACKS AND PREVENTION, CAUSES AND CURES
FOR TERRORISM, AND LONGSTANDING ISSUES OF WAR AND PEACE. THE BOOK OFFERS
PRACTICAL ADVICE FOR BUSINESSES, GOVERNMENTS, AND INDIVIDUALS TO BETTER
SECURE THE WORLD AND PROTECT CYBERSPACE. IT QUOTES U.S. NAVY ADMIRAL AND
NATO’S SUPREME ALLIED COMMANDER JAMES STAVRIDIS: “INSTEAD OF
BUILDING WALLS TO CREATE SECURITY, WE NEED TO BUILD BRIDGES.” THE BOOK
ALSO PROVIDES A GLIMPSE INTO THE FUTURE OF PLAN X AND GENERATION Z,
ALONG WITH AN OMINOUS PREDICTION FROM SECURITY ADVISOR MARC GOODMAN AT
TEDGLOBAL 2012: “IF YOU CONTROL THE CODE, YOU CONTROL THE WORLD.”
COUNTERTERRORISM AND CYBERSECURITY: TOTAL INFORMATION AWARENESS WILL
KEEP YOU UP AT NIGHT BUT AT THE SAME TIME GIVE YOU SOME PEACE OF MIND
KNOWING THAT “OUR PROBLEMS ARE MANMADE — THEREFORE THEY CAN BE
SOLVED BY MAN [OR WOMAN],” AS PRESIDENT JOHN F. KENNEDY SAID AT THE
AMERICAN UNIVERSITY COMMENCEMENT IN JUNE 1963
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Lee, Newton |
author_facet | Lee, Newton |
author_role | aut |
author_sort | Lee, Newton |
author_variant | n l nl |
building | Verbundindex |
bvnumber | BV040984151 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)846965268 (DE-599)DNB1033617229 |
dewey-full | 005.7 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.7 |
dewey-search | 005.7 |
dewey-sort | 15.7 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-1-4614-7205-6 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03800nmm a2200745zc 4500</leader><controlfield tag="001">BV040984151</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">130507s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">13,O05</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1033617229</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461472049</subfield><subfield code="9">978-1-4614-7204-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461472056</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4614-7205-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4614-7205-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781461472056</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)846965268</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1033617229</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.7</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lee, Newton</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Counterterrorism and cybersecurity</subfield><subfield code="b">total information awareness</subfield><subfield code="c">Newton Lee</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4614-7205-6</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025962077&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025962077&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025962077</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7205-6</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7205-6</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7205-6</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7205-6</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7205-6</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7205-6</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7205-6</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7205-6</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7205-6</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7205-6</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7205-6</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV040984151 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:36:48Z |
institution | BVB |
isbn | 9781461472049 9781461472056 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025962077 |
oclc_num | 846965268 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-634 DE-739 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-634 DE-739 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource |
psigel | ZDB-2-SCS |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
spelling | Lee, Newton Verfasser aut Counterterrorism and cybersecurity total information awareness Newton Lee New York, NY [u.a.] Springer 2013 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Bekämpfung (DE-588)4112701-8 gnd rswk-swf Data Mining (DE-588)4428654-5 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Informatik (DE-588)4026894-9 s Datenschutz (DE-588)4011134-9 s Data Mining (DE-588)4428654-5 s Terrorismus (DE-588)4059534-1 s 1\p DE-604 Bekämpfung (DE-588)4112701-8 s Computersicherheit (DE-588)4274324-2 s Internetkriminalität (DE-588)7864395-8 s 2\p DE-604 https://doi.org/10.1007/978-1-4614-7205-6 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025962077&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025962077&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Lee, Newton Counterterrorism and cybersecurity total information awareness Bekämpfung (DE-588)4112701-8 gnd Data Mining (DE-588)4428654-5 gnd Computersicherheit (DE-588)4274324-2 gnd Terrorismus (DE-588)4059534-1 gnd Datenschutz (DE-588)4011134-9 gnd Informatik (DE-588)4026894-9 gnd Internetkriminalität (DE-588)7864395-8 gnd |
subject_GND | (DE-588)4112701-8 (DE-588)4428654-5 (DE-588)4274324-2 (DE-588)4059534-1 (DE-588)4011134-9 (DE-588)4026894-9 (DE-588)7864395-8 |
title | Counterterrorism and cybersecurity total information awareness |
title_auth | Counterterrorism and cybersecurity total information awareness |
title_exact_search | Counterterrorism and cybersecurity total information awareness |
title_full | Counterterrorism and cybersecurity total information awareness Newton Lee |
title_fullStr | Counterterrorism and cybersecurity total information awareness Newton Lee |
title_full_unstemmed | Counterterrorism and cybersecurity total information awareness Newton Lee |
title_short | Counterterrorism and cybersecurity |
title_sort | counterterrorism and cybersecurity total information awareness |
title_sub | total information awareness |
topic | Bekämpfung (DE-588)4112701-8 gnd Data Mining (DE-588)4428654-5 gnd Computersicherheit (DE-588)4274324-2 gnd Terrorismus (DE-588)4059534-1 gnd Datenschutz (DE-588)4011134-9 gnd Informatik (DE-588)4026894-9 gnd Internetkriminalität (DE-588)7864395-8 gnd |
topic_facet | Bekämpfung Data Mining Computersicherheit Terrorismus Datenschutz Informatik Internetkriminalität |
url | https://doi.org/10.1007/978-1-4614-7205-6 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025962077&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025962077&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT leenewton counterterrorismandcybersecuritytotalinformationawareness |