Fighting terror in cyberspace:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Hackensack, N.J.
World Scientific
c2005
|
Schriftenreihe: | Series in machine perception and artificial intelligence
v. 65 |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references and index Terrorism and the Internet : use and abuse / Abraham R. Wagner -- The radical Islam and the cyber jihad / Shaul Shay -- Using data mining technology for terrorist detection on the web / Mark Last -- A content-based model for web-monitoring / Bracha Shapira -- TDS : an innovative terrorist detection system / Yuval Elovici -- Clustering algorithms for variable-length vectors and their application to detecting terrorist activities / Menahem Friedman, Moti Schneider, Abraham Kandel -- Analysis of financial intelligence and the detection of terror financing / Yehuda Shaffer -- Identification of terrorist web sites with cross-lingual classification tools / Alex Markov and Mark Last As became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters to their networks. This is evident from the large number of web sites run by different terrorist organizations, though the URLs and geographical locations of these web sites are frequently moved around the globe. The wide use of the Internet by terrorists makes some people think that the risk of a major cyber-attack |
Beschreibung: | 1 Online-Ressource (xv, 167 p.) |
ISBN: | 9789812703255 981270325X |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043112492 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2005 |||| o||u| ||||||eng d | ||
020 | |a 9789812703255 |c electronic bk. |9 978-981-270-325-5 | ||
020 | |a 981270325X |c electronic bk. |9 981-270-325-X | ||
035 | |a (OCoLC)77554503 | ||
035 | |a (DE-599)BVBBV043112492 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 363.32 |2 22 | |
245 | 1 | 0 | |a Fighting terror in cyberspace |c editors Mark Last and Abraham Kandel |
264 | 1 | |a Hackensack, N.J. |b World Scientific |c c2005 | |
300 | |a 1 Online-Ressource (xv, 167 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Series in machine perception and artificial intelligence |v v. 65 | |
500 | |a Includes bibliographical references and index | ||
500 | |a Terrorism and the Internet : use and abuse / Abraham R. Wagner -- The radical Islam and the cyber jihad / Shaul Shay -- Using data mining technology for terrorist detection on the web / Mark Last -- A content-based model for web-monitoring / Bracha Shapira -- TDS : an innovative terrorist detection system / Yuval Elovici -- Clustering algorithms for variable-length vectors and their application to detecting terrorist activities / Menahem Friedman, Moti Schneider, Abraham Kandel -- Analysis of financial intelligence and the detection of terror financing / Yehuda Shaffer -- Identification of terrorist web sites with cross-lingual classification tools / Alex Markov and Mark Last | ||
500 | |a As became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters to their networks. This is evident from the large number of web sites run by different terrorist organizations, though the URLs and geographical locations of these web sites are frequently moved around the globe. The wide use of the Internet by terrorists makes some people think that the risk of a major cyber-attack | ||
650 | 7 | |a POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement |2 bisacsh | |
650 | 7 | |a Data mining |2 fast | |
650 | 7 | |a Internet |2 fast | |
650 | 7 | |a Terrorism / Prevention |2 fast | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a Data mining | |
650 | 4 | |a Internet | |
650 | 4 | |a Terrorism |x Prevention | |
700 | 1 | |a Last, Mark |e Sonstige |4 oth | |
700 | 1 | |a Kandel, Abraham |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174599 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028536683 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174599 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174599 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175533757431808 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043112492 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)77554503 (DE-599)BVBBV043112492 |
dewey-full | 363.32 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.32 |
dewey-search | 363.32 |
dewey-sort | 3363.32 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03161nmm a2200481zcb4500</leader><controlfield tag="001">BV043112492</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789812703255</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-981-270-325-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">981270325X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">981-270-325-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)77554503</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043112492</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.32</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fighting terror in cyberspace</subfield><subfield code="c">editors Mark Last and Abraham Kandel</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hackensack, N.J.</subfield><subfield code="b">World Scientific</subfield><subfield code="c">c2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xv, 167 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Series in machine perception and artificial intelligence</subfield><subfield code="v">v. 65</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Terrorism and the Internet : use and abuse / Abraham R. Wagner -- The radical Islam and the cyber jihad / Shaul Shay -- Using data mining technology for terrorist detection on the web / Mark Last -- A content-based model for web-monitoring / Bracha Shapira -- TDS : an innovative terrorist detection system / Yuval Elovici -- Clustering algorithms for variable-length vectors and their application to detecting terrorist activities / Menahem Friedman, Moti Schneider, Abraham Kandel -- Analysis of financial intelligence and the detection of terror financing / Yehuda Shaffer -- Identification of terrorist web sites with cross-lingual classification tools / Alex Markov and Mark Last</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">As became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters to their networks. This is evident from the large number of web sites run by different terrorist organizations, though the URLs and geographical locations of these web sites are frequently moved around the globe. The wide use of the Internet by terrorists makes some people think that the risk of a major cyber-attack</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data mining</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Last, Mark</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kandel, Abraham</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174599</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028536683</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174599</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174599</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043112492 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:48Z |
institution | BVB |
isbn | 9789812703255 981270325X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028536683 |
oclc_num | 77554503 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xv, 167 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | World Scientific |
record_format | marc |
series2 | Series in machine perception and artificial intelligence |
spelling | Fighting terror in cyberspace editors Mark Last and Abraham Kandel Hackensack, N.J. World Scientific c2005 1 Online-Ressource (xv, 167 p.) txt rdacontent c rdamedia cr rdacarrier Series in machine perception and artificial intelligence v. 65 Includes bibliographical references and index Terrorism and the Internet : use and abuse / Abraham R. Wagner -- The radical Islam and the cyber jihad / Shaul Shay -- Using data mining technology for terrorist detection on the web / Mark Last -- A content-based model for web-monitoring / Bracha Shapira -- TDS : an innovative terrorist detection system / Yuval Elovici -- Clustering algorithms for variable-length vectors and their application to detecting terrorist activities / Menahem Friedman, Moti Schneider, Abraham Kandel -- Analysis of financial intelligence and the detection of terror financing / Yehuda Shaffer -- Identification of terrorist web sites with cross-lingual classification tools / Alex Markov and Mark Last As became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters to their networks. This is evident from the large number of web sites run by different terrorist organizations, though the URLs and geographical locations of these web sites are frequently moved around the globe. The wide use of the Internet by terrorists makes some people think that the risk of a major cyber-attack POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement bisacsh Data mining fast Internet fast Terrorism / Prevention fast Terrorismus Data mining Internet Terrorism Prevention Last, Mark Sonstige oth Kandel, Abraham Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174599 Aggregator Volltext |
spellingShingle | Fighting terror in cyberspace POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement bisacsh Data mining fast Internet fast Terrorism / Prevention fast Terrorismus Data mining Internet Terrorism Prevention |
title | Fighting terror in cyberspace |
title_auth | Fighting terror in cyberspace |
title_exact_search | Fighting terror in cyberspace |
title_full | Fighting terror in cyberspace editors Mark Last and Abraham Kandel |
title_fullStr | Fighting terror in cyberspace editors Mark Last and Abraham Kandel |
title_full_unstemmed | Fighting terror in cyberspace editors Mark Last and Abraham Kandel |
title_short | Fighting terror in cyberspace |
title_sort | fighting terror in cyberspace |
topic | POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement bisacsh Data mining fast Internet fast Terrorism / Prevention fast Terrorismus Data mining Internet Terrorism Prevention |
topic_facet | POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement Data mining Internet Terrorism / Prevention Terrorismus Terrorism Prevention |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174599 |
work_keys_str_mv | AT lastmark fightingterrorincyberspace AT kandelabraham fightingterrorincyberspace |