|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn476063503 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr mn|---||||| |
008 |
091207s2005 si ob 001 0 eng d |
010 |
|
|
|a 2010280283
|
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d MHW
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d ZCU
|d MERUC
|d U3W
|d OCLCO
|d OCLCQ
|d OCLCF
|d OCLCO
|d ICG
|d VT2
|d OCLCO
|d OCLCQ
|d OCLCO
|d WYU
|d TKN
|d LEAUB
|d DKC
|d AU@
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
015 |
|
|
|a GBA611138
|2 bnb
|
016 |
7 |
|
|a 013368112
|2 Uk
|
019 |
|
|
|a 1055373882
|a 1062982338
|a 1081242114
|a 1086428239
|a 1228532489
|
020 |
|
|
|a 9789812703255
|q (electronic bk.)
|
020 |
|
|
|a 981270325X
|q (electronic bk.)
|
020 |
|
|
|a 9812564934
|
020 |
|
|
|a 9789812564931
|
029 |
1 |
|
|a AU@
|b 000048758381
|
029 |
1 |
|
|a AU@
|b 000051363994
|
029 |
1 |
|
|a AU@
|b 000058413360
|
029 |
1 |
|
|a DEBBG
|b BV044124646
|
029 |
1 |
|
|a DEBSZ
|b 396119727
|
029 |
1 |
|
|a DEBSZ
|b 45642766X
|
035 |
|
|
|a (OCoLC)476063503
|z (OCoLC)1055373882
|z (OCoLC)1062982338
|z (OCoLC)1081242114
|z (OCoLC)1086428239
|z (OCoLC)1228532489
|
050 |
|
4 |
|a QA76.9.D343 F54 2005eb
|
082 |
0 |
4 |
|a 363.32
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Last, Mark.
|
245 |
1 |
0 |
|a Fighting Terror In Cyberspace.
|
260 |
|
|
|a Singapore :
|b World Scientific,
|c 2005.
|
300 |
|
|
|a 1 online resource (184 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Series in machine perception and artificial intelligence ;
|v v. 65
|
520 |
|
|
|a As became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters to their networks. This is evident from the large number of web sites run by different terrorist organizations, though the URLs and geographical locations of these web sites are frequently moved around the globe. The wide use of the Internet by terrorists makes some people think that the risk of a major cyber-attack.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Preface; Contents; 1. Terrorism and the Internet: Use and Abuse; 2. The Radical Islam and the Cyber Jihad; 3. Using Data Mining Technology for Terrorist Detection on the Web; 4. A Content-Based Model for Web-Monitoring; 5. TDS -- An Innovative Terrorist Detection System; 6. Clustering Algorithms for Variable-Length Vectors and Their Application to Detecting Terrorist Activities; 7. Analysis of Financial Intelligence and the Detection of Terror Financing; 8. Identification of Terrorist Web Sites with Cross-Lingual Classification Tools; Appendix A Useful Sources.
|
504 |
|
|
|a Includes bibliographical references and index.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Cyberterrorism
|x Prevention.
|
650 |
|
0 |
|a Terrorism
|x Computer network resources.
|
650 |
|
0 |
|a Terrorism
|x Prevention.
|
650 |
|
6 |
|a Terrorisme
|x Prévention.
|
650 |
|
7 |
|a Cyberterrorism
|x Prevention
|2 fast
|
650 |
|
7 |
|a Terrorism
|x Prevention
|2 fast
|
700 |
1 |
|
|a Kandel, Abraham.
|
758 |
|
|
|i has work:
|a Fighting terror in cyberspace (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGW4pTJytY4HG6KTqWGF4y
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
1 |
|
|z 9789812564931
|
830 |
|
0 |
|a Series in machine perception and artificial intelligence ;
|v v. 65.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=296122
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL296122
|
994 |
|
|
|a 92
|b IZTAP
|