Applying methods of scientific inquiry into intelligence, security, and counterterrorism:
"This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections"--
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
IGI Global
2019.
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | "This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections"-- |
Beschreibung: | 20 PDFs (396 Seiten) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522589785 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00218561 | ||
003 | IGIG | ||
005 | 20190506140859.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 190507s2019 pau fob 001 0 eng d | ||
010 | |z 2018057672 | ||
020 | |a 9781522589785 |q ebook | ||
020 | |z 9781522589761 |q hardcover | ||
020 | |z 9781522589778 |q softcover | ||
024 | 7 | |a 10.4018/978-1-5225-8976-1 |2 doi | |
035 | |a (CaBNVSL)slc20789331 | ||
035 | |a (OCoLC)1100549663 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.9.A25 |b A675 2019e | |
082 | 7 | |a 005.8 |2 23 | |
245 | 0 | 0 | |a Applying methods of scientific inquiry into intelligence, security, and counterterrorism |c Arif Sari, editor. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |b IGI Global |c 2019. | |
300 | |a 20 PDFs (396 Seiten) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Taxonomy of cyber attack weapons, defense strategies, and cyber war incidents -- Chapter 2. Android application security -- Chapter 3. Cyber security and open source intelligence techniques -- Chapter 4. Intelligent strategy and security in education: big data (text analytics) -- Chapter 5. Inevitable battle against botnets -- Chapter 6. A review of the economic benefits of cyber terrorism -- Chapter 7. Guide for modelling a network flow-based detection system for malware categorization: a review of related literature -- Chapter 8. A review of research studies on cyber terror -- Chapter 9. From conventional to sophisticated: a cyber guise to terrorism in the middle East -- Chapter 10. Dark web and its research scopes -- Chapter 11. Enhanced security for network communication with proposed IS-IS protocol -- Chapter 12. Economic impact of cyber attacks on critical infrastructures. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | 0 | |a Description based on title screen (IGI Global, viewed 05/07/2019). | |
650 | 0 | |a Cyber intelligence (Computer security) | |
650 | 0 | |a Cyberterrorism |x Prevention. | |
653 | |a Counter Terrorism. | ||
653 | |a Cyber Threat Intelligence. | ||
653 | |a Cybersecurity. | ||
653 | |a Economics. | ||
653 | |a Intelligence Analysis. | ||
653 | |a Law Enforcement. | ||
653 | |a National Security. | ||
653 | |a Political Strategy. | ||
653 | |a Science Education. | ||
653 | |a Terrorism. | ||
700 | 1 | |a Sari, Arif |d 1986- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2018057672 | |
776 | 0 | 8 | |i Print version: |z 1522589767 |z 9781522589761 |w (DLC) 2018057672 |
966 | 4 | 0 | |l DE-862 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00218561 |
---|---|
_version_ | 1826942596224647168 |
adam_text | |
any_adam_object | |
author2 | Sari, Arif 1986- |
author2_role | edt |
author2_variant | a s as |
author_facet | Sari, Arif 1986- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 A675 2019e |
callnumber-search | QA76.9.A25 A675 2019e |
callnumber-sort | QA 276.9 A25 A675 42019E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Chapter 1. Taxonomy of cyber attack weapons, defense strategies, and cyber war incidents -- Chapter 2. Android application security -- Chapter 3. Cyber security and open source intelligence techniques -- Chapter 4. Intelligent strategy and security in education: big data (text analytics) -- Chapter 5. Inevitable battle against botnets -- Chapter 6. A review of the economic benefits of cyber terrorism -- Chapter 7. Guide for modelling a network flow-based detection system for malware categorization: a review of related literature -- Chapter 8. A review of research studies on cyber terror -- Chapter 9. From conventional to sophisticated: a cyber guise to terrorism in the middle East -- Chapter 10. Dark web and its research scopes -- Chapter 11. Enhanced security for network communication with proposed IS-IS protocol -- Chapter 12. Economic impact of cyber attacks on critical infrastructures. |
ctrlnum | (CaBNVSL)slc20789331 (OCoLC)1100549663 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03296nam a2200577 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00218561</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20190506140859.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">190507s2019 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2018057672</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522589785</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522589761</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522589778</subfield><subfield code="q">softcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-8976-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc20789331</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1100549663</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">A675 2019e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Applying methods of scientific inquiry into intelligence, security, and counterterrorism </subfield><subfield code="c">Arif Sari, editor.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) </subfield><subfield code="b">IGI Global</subfield><subfield code="c">2019.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">20 PDFs (396 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Taxonomy of cyber attack weapons, defense strategies, and cyber war incidents -- Chapter 2. Android application security -- Chapter 3. Cyber security and open source intelligence techniques -- Chapter 4. Intelligent strategy and security in education: big data (text analytics) -- Chapter 5. Inevitable battle against botnets -- Chapter 6. A review of the economic benefits of cyber terrorism -- Chapter 7. Guide for modelling a network flow-based detection system for malware categorization: a review of related literature -- Chapter 8. A review of research studies on cyber terror -- Chapter 9. From conventional to sophisticated: a cyber guise to terrorism in the middle East -- Chapter 10. Dark web and its research scopes -- Chapter 11. Enhanced security for network communication with proposed IS-IS protocol -- Chapter 12. Economic impact of cyber attacks on critical infrastructures.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 05/07/2019).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Counter Terrorism.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Threat Intelligence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Economics.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Intelligence Analysis.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Law Enforcement.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">National Security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Political Strategy.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Science Education.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Terrorism.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sari, Arif</subfield><subfield code="d">1986-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2018057672</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522589767</subfield><subfield code="z">9781522589761</subfield><subfield code="w">(DLC) 2018057672</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00218561 |
illustrated | Not Illustrated |
indexdate | 2025-03-18T14:30:31Z |
institution | BVB |
isbn | 9781522589785 |
language | English |
oclc_num | 1100549663 |
open_access_boolean | |
owner | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 20 PDFs (396 Seiten) Also available in print. |
psigel | ZDB-98-IGB FWS_PDA_IGB ZDB-98-IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global |
record_format | marc |
spelling | Applying methods of scientific inquiry into intelligence, security, and counterterrorism Arif Sari, editor. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) IGI Global 2019. 20 PDFs (396 Seiten) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Taxonomy of cyber attack weapons, defense strategies, and cyber war incidents -- Chapter 2. Android application security -- Chapter 3. Cyber security and open source intelligence techniques -- Chapter 4. Intelligent strategy and security in education: big data (text analytics) -- Chapter 5. Inevitable battle against botnets -- Chapter 6. A review of the economic benefits of cyber terrorism -- Chapter 7. Guide for modelling a network flow-based detection system for malware categorization: a review of related literature -- Chapter 8. A review of research studies on cyber terror -- Chapter 9. From conventional to sophisticated: a cyber guise to terrorism in the middle East -- Chapter 10. Dark web and its research scopes -- Chapter 11. Enhanced security for network communication with proposed IS-IS protocol -- Chapter 12. Economic impact of cyber attacks on critical infrastructures. Restricted to subscribers or individual electronic text purchasers. "This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 05/07/2019). Cyber intelligence (Computer security) Cyberterrorism Prevention. Counter Terrorism. Cyber Threat Intelligence. Cybersecurity. Economics. Intelligence Analysis. Law Enforcement. National Security. Political Strategy. Science Education. Terrorism. Sari, Arif 1986- editor. IGI Global, publisher. (Original) (DLC)2018057672 Print version: 1522589767 9781522589761 (DLC) 2018057672 |
spellingShingle | Applying methods of scientific inquiry into intelligence, security, and counterterrorism Chapter 1. Taxonomy of cyber attack weapons, defense strategies, and cyber war incidents -- Chapter 2. Android application security -- Chapter 3. Cyber security and open source intelligence techniques -- Chapter 4. Intelligent strategy and security in education: big data (text analytics) -- Chapter 5. Inevitable battle against botnets -- Chapter 6. A review of the economic benefits of cyber terrorism -- Chapter 7. Guide for modelling a network flow-based detection system for malware categorization: a review of related literature -- Chapter 8. A review of research studies on cyber terror -- Chapter 9. From conventional to sophisticated: a cyber guise to terrorism in the middle East -- Chapter 10. Dark web and its research scopes -- Chapter 11. Enhanced security for network communication with proposed IS-IS protocol -- Chapter 12. Economic impact of cyber attacks on critical infrastructures. Cyber intelligence (Computer security) Cyberterrorism Prevention. |
title | Applying methods of scientific inquiry into intelligence, security, and counterterrorism |
title_auth | Applying methods of scientific inquiry into intelligence, security, and counterterrorism |
title_exact_search | Applying methods of scientific inquiry into intelligence, security, and counterterrorism |
title_full | Applying methods of scientific inquiry into intelligence, security, and counterterrorism Arif Sari, editor. |
title_fullStr | Applying methods of scientific inquiry into intelligence, security, and counterterrorism Arif Sari, editor. |
title_full_unstemmed | Applying methods of scientific inquiry into intelligence, security, and counterterrorism Arif Sari, editor. |
title_short | Applying methods of scientific inquiry into intelligence, security, and counterterrorism |
title_sort | applying methods of scientific inquiry into intelligence security and counterterrorism |
topic | Cyber intelligence (Computer security) Cyberterrorism Prevention. |
topic_facet | Cyber intelligence (Computer security) Cyberterrorism Prevention. |
work_keys_str_mv | AT sariarif applyingmethodsofscientificinquiryintointelligencesecurityandcounterterrorism AT igiglobal applyingmethodsofscientificinquiryintointelligencesecurityandcounterterrorism |