Counterterrorism and Cybersecurity: Total Information Awareness
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2015
|
Ausgabe: | 2nd ed. 2015 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FKE01 FLA01 FRO01 UBG01 UBM01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XV, 489 p.) Ill. |
ISBN: | 9783319172446 |
DOI: | 10.1007/978-3-319-17244-6 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042544540 | ||
003 | DE-604 | ||
005 | 20150519 | ||
007 | cr|uuu---uuuuu | ||
008 | 150506s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319172446 |c Online |9 978-3-319-17244-6 | ||
024 | 7 | |a 10.1007/978-3-319-17244-6 |2 doi | |
035 | |a (OCoLC)908701616 | ||
035 | |a (DE-599)BVBBV042544540 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-739 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Lee, Newton |e Verfasser |0 (DE-588)1064117694 |4 aut | |
245 | 1 | 0 | |a Counterterrorism and Cybersecurity |b Total Information Awareness |c by Newton Lee |
250 | |a 2nd ed. 2015 | ||
264 | 1 | |a Cham |b Springer International Publishing |c 2015 | |
300 | |a 1 Online-Ressource (XV, 489 p.) |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Data Mining |0 (DE-588)4428654-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bekämpfung |0 (DE-588)4112701-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 2 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 0 | 3 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 1 | 1 | |a Bekämpfung |0 (DE-588)4112701-8 |D s |
689 | 1 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 3 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-17243-9 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-17244-6 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978546&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978546&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027978546 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/978-3-319-17244-6 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17244-6 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17244-6 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17244-6 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17244-6 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17244-6 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17244-6 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17244-6 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17244-6 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17244-6 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17244-6 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17244-6 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17244-6 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17244-6 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17244-6 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804153310216716288 |
---|---|
adam_text | COUNTERTERRORISM AND CYBERSECURITY
/ LEE, NEWTON
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
SEPTEMBER 11 ATTACKS
U.S. INTELLIGENCE COMMUNITY
UNDERSTANDING TERRORISM
CURES FOR TERRORISM
WAR AND PEACE
THE RISE AND FALL OF TOTAL INFORMATION AWARENESS
THE AFTERLIFE OF TOTAL INFORMATION AWARENESS AND EDWARD SNOWDEN S NSA
LEAKS
A TWO-WAY STREET OF TOTAL INFORMATION AWARENESS
CYBER WARFARE: WEAPON OF MASS DISRUPTION
CYBER ATTACKS, PREVENTION, AND COUNTERMEASURES
CYBER SECURITY TRAINING IN MEDICAL CENTERS
PLAN X AND GENERATION Z
ARTIFICIAL INTELLIGENCE AND DATA MINING
GAMIFICATION OF PENETRATION TESTING
USB WRITE BLOCKING AND FORENSICS
DARPA S CYBER GRAND CHALLENGE (2014-2016)
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
COUNTERTERRORISM AND CYBERSECURITY
/ LEE, NEWTON
: 2015
ABSTRACT / INHALTSTEXT
FROM 9/11 TO CHARLIE HEBDO ALONG WITH SONY-POCALYPSE AND DARPA S $2
MILLION CYBER GRAND CHALLENGE, THIS BOOK EXAMINES COUNTERTERRORISM AND
CYBER SECURITY HISTORY, STRATEGIES AND TECHNOLOGIES FROM A
THOUGHT-PROVOKING APPROACH THAT ENCOMPASSES PERSONAL EXPERIENCES,
INVESTIGATIVE JOURNALISM, HISTORICAL AND CURRENT EVENTS, IDEAS FROM
THOUGHT LEADERS AND THE MAKE-BELIEVE OF HOLLYWOOD SUCH AS 24, HOMELAND
AND THE AMERICANS. PRESIDENT BARACK OBAMA ALSOSAID IN HIS 2015 STATE
OF THE UNION ADDRESS, WE ARE MAKING SURE OUR GOVERNMENT INTEGRATES
INTELLIGENCE TO COMBAT CYBER THREATS, JUST AS WE HAVE DONE TO COMBAT
TERRORISM. IN THIS NEW EDITION, THERE ARE SEVEN COMPLETELY NEW CHAPTERS,
INCLUDING THREE NEW CONTRIBUTED CHAPTERS BY HEALTHCARE CHIEF INFORMATION
SECURITY OFFICER RAY BALUT AND JEAN C. STANFORD, DEF CON SPEAKER PHILIP
POLSTRA AND SECURITY ENGINEER AND BLACK HAT SPEAKER DARREN MANNERS, AS
WELL AS NEW COMMENTARIES BY COMMUNICATIONS EXPERT ANDY MARKEN AND DEF
CON SPEAKER EMILY PEED. THE BOOK OFFERS PRACTICAL ADVICE FOR BUSINESSES,
GOVERNMENTS AND INDIVIDUALS TO BETTER SECURE THE WORLD AND PROTECT
CYBERSPACE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Lee, Newton |
author_GND | (DE-588)1064117694 |
author_facet | Lee, Newton |
author_role | aut |
author_sort | Lee, Newton |
author_variant | n l nl |
building | Verbundindex |
bvnumber | BV042544540 |
classification_rvk | ST 276 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)908701616 (DE-599)BVBBV042544540 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-17244-6 |
edition | 2nd ed. 2015 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04176nmm a2200769zc 4500</leader><controlfield tag="001">BV042544540</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150519 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150506s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319172446</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-17244-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-17244-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)908701616</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042544540</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lee, Newton</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1064117694</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Counterterrorism and Cybersecurity</subfield><subfield code="b">Total Information Awareness</subfield><subfield code="c">by Newton Lee</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed. 2015</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XV, 489 p.)</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-17243-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-17244-6</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978546&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978546&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027978546</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17244-6</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17244-6</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17244-6</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17244-6</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17244-6</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17244-6</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17244-6</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17244-6</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17244-6</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17244-6</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17244-6</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17244-6</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17244-6</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17244-6</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17244-6</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042544540 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:24:34Z |
institution | BVB |
isbn | 9783319172446 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027978546 |
oclc_num | 908701616 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
physical | 1 Online-Ressource (XV, 489 p.) Ill. |
psigel | ZDB-2-SCS ZDB-2-SCS_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer International Publishing |
record_format | marc |
spelling | Lee, Newton Verfasser (DE-588)1064117694 aut Counterterrorism and Cybersecurity Total Information Awareness by Newton Lee 2nd ed. 2015 Cham Springer International Publishing 2015 1 Online-Ressource (XV, 489 p.) Ill. txt rdacontent c rdamedia cr rdacarrier Terrorismus (DE-588)4059534-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Data Mining (DE-588)4428654-5 gnd rswk-swf Bekämpfung (DE-588)4112701-8 gnd rswk-swf Informatik (DE-588)4026894-9 s Datenschutz (DE-588)4011134-9 s Data Mining (DE-588)4428654-5 s Terrorismus (DE-588)4059534-1 s DE-604 Bekämpfung (DE-588)4112701-8 s Computersicherheit (DE-588)4274324-2 s Internetkriminalität (DE-588)7864395-8 s 1\p DE-604 Erscheint auch als Druckausgabe 978-3-319-17243-9 https://doi.org/10.1007/978-3-319-17244-6 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978546&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978546&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Lee, Newton Counterterrorism and Cybersecurity Total Information Awareness Terrorismus (DE-588)4059534-1 gnd Computersicherheit (DE-588)4274324-2 gnd Datenschutz (DE-588)4011134-9 gnd Informatik (DE-588)4026894-9 gnd Internetkriminalität (DE-588)7864395-8 gnd Data Mining (DE-588)4428654-5 gnd Bekämpfung (DE-588)4112701-8 gnd |
subject_GND | (DE-588)4059534-1 (DE-588)4274324-2 (DE-588)4011134-9 (DE-588)4026894-9 (DE-588)7864395-8 (DE-588)4428654-5 (DE-588)4112701-8 |
title | Counterterrorism and Cybersecurity Total Information Awareness |
title_auth | Counterterrorism and Cybersecurity Total Information Awareness |
title_exact_search | Counterterrorism and Cybersecurity Total Information Awareness |
title_full | Counterterrorism and Cybersecurity Total Information Awareness by Newton Lee |
title_fullStr | Counterterrorism and Cybersecurity Total Information Awareness by Newton Lee |
title_full_unstemmed | Counterterrorism and Cybersecurity Total Information Awareness by Newton Lee |
title_short | Counterterrorism and Cybersecurity |
title_sort | counterterrorism and cybersecurity total information awareness |
title_sub | Total Information Awareness |
topic | Terrorismus (DE-588)4059534-1 gnd Computersicherheit (DE-588)4274324-2 gnd Datenschutz (DE-588)4011134-9 gnd Informatik (DE-588)4026894-9 gnd Internetkriminalität (DE-588)7864395-8 gnd Data Mining (DE-588)4428654-5 gnd Bekämpfung (DE-588)4112701-8 gnd |
topic_facet | Terrorismus Computersicherheit Datenschutz Informatik Internetkriminalität Data Mining Bekämpfung |
url | https://doi.org/10.1007/978-3-319-17244-6 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978546&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978546&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT leenewton counterterrorismandcybersecuritytotalinformationawareness |