|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_ocn794663277 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
120604s2012 xx o 000 0 eng d |
010 |
|
|
|a 2012933633
|
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d N$T
|d YDXCP
|d TEFOD
|d OCLCQ
|d OCLCF
|d OCLCQ
|d RECBK
|d COO
|d DEBSZ
|d TEFOD
|d OCLCQ
|d ZCU
|d MERUC
|d SAV
|d U3W
|d OCLCA
|d HCO
|d ICG
|d INT
|d OCLCQ
|d VT2
|d OCLCQ
|d DKC
|d AU@
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
016 |
7 |
|
|a 016009803
|2 Uk
|
019 |
|
|
|a 864910680
|a 1081233435
|a 1103270288
|a 1129352548
|
020 |
|
|
|a 9781118226254
|q (electronic bk.)
|
020 |
|
|
|a 1118226259
|q (electronic bk.)
|
020 |
|
|
|a 9781118239568
|q (electronic bk.)
|
020 |
|
|
|a 1118239563
|q (electronic bk.)
|
020 |
|
|
|a 9781118166130
|
020 |
|
|
|a 1118166132
|
028 |
0 |
1 |
|a EB00063161
|b Recorded Books
|
029 |
1 |
|
|a DEBBG
|b BV044159736
|
029 |
1 |
|
|a DEBSZ
|b 431068100
|
035 |
|
|
|a (OCoLC)794663277
|z (OCoLC)864910680
|z (OCoLC)1081233435
|z (OCoLC)1103270288
|z (OCoLC)1129352548
|
037 |
|
|
|a DF44C770-D6BC-4DFA-83CE-C30B3B188D8B
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9 .A25
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|a 355/.033
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Jackson, Gary M.
|
245 |
1 |
0 |
|a Predicting Malicious Behavior :
|b Tools and Techniques for Ensuring Global Security.
|
260 |
|
|
|a Hoboken :
|b John Wiley & Sons,
|c 2012.
|
300 |
|
|
|a 1 online resource (554 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Predicting Malicious Behavior; Contents; Foreword; Introduction; Part I Understanding the Dark Side: Malicious Intent; Chapter 1 Analyzing the Malicious Individual; Analyzing the Unique Individual; Richard Reid: The Shoe Bomber; The Event; The Motivation; Causes; A Behavior Analysis; Ted Bundy: The Infamous Serial Murderer; Similarities of Targets; The Motivation; Determining the Complexities Underlying Individual Malicious Behavior: A Behavior Analysis; Removing Subjectivity and Bias from the Behavior Analysis; The Individual Cyber Attacker.
|
505 |
8 |
|
|a Identifying the Threat from the Lone Cyber AttackerRecognizing the Power of Being Anonymous; Recognizing When a Hacker Is Detached from the Target; Recognizing Motivation; Identifying the Power of Disruption; Recognizing the Need for Theft; A Behavior Analysis; Modeling the Individual: Advantages and Disadvantages; How Individuals May Vary; The Loner; The Chameleon; The Social Misfit; The Individual versus the Group; Advantages of AuBA #1: Automated Summarization; In Summary; Chapter 2 Analyzing the Malicious Group; Understanding the Group Adversary; Analyzing al-Qaeda.
|
505 |
8 |
|
|a Automated Behavior Analysis SummaryThe Organization; Group Dynamics; The Motivation; Declarations of War; A Behavior Analysis; Analyzing Hezbollah; The Organization; Consistency of Behavior; The Motivation; Targeting Consistency; A Behavior Analysis; Analyzing the Coordinated Group Cyber Threat; The Group Structure; The Motivation; A Behavior Analysis; Advantages of AuBA #2: Theme-Guided Smart Searches; In Summary; Chapter 3 Analyzing Country-Level Threats; Threats to Our National Infrastructure; Analyzing the Specific Threat of Terrorist Attacks.
|
505 |
8 |
|
|a Current Terrorist Threats to the United StatesPreventing Terrorist Attacks on U.S. Soil; Improving Network Security; Current Network Security; Current Foreign Threats to Network Security; Understanding Current Technology for Protecting Our Networks; Facing Chemical, Biological, Radiological, and Nuclear (CBRN) Threats; Understanding the Threat of a Biological Attack; Anticipating the Dirty Bomb; Advantages of AuBA #3: Reducing Errors and Inefficiencies of Manual Predictive Modeling; In Summary; Chapter 4 Threats and Security Nightmares: Our Current Reactive State of Security.
|
505 |
8 |
|
|a Analyzing Mall, School, Workplace, and Other Seemingly Random Public ViolenceMaking Sense of Seemingly Senseless Public Attacks; Why Are We Violent?; Unanticipated Terrorist Network Attacks; Understanding the Element of Surprise; Anticipating the Unknown; Can Technology Detect First-Time Attacks?; Detecting the New Attack; Advantages of AuBA #4: Building Predictive Applications; In Summary; Chapter 5 Current Network Security; Hacking and National Network Security; Growing Damage and Threat; Assessing Current Technology; Signature Detection.
|
500 |
|
|
|a Forensics: The Key to Defining New Signatures for Detection.
|
520 |
|
|
|a A groundbreaking exploration of how to identify and fight security threats at every levelThis revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with intelligence officer experience who invented the technology, it explores the keys to understanding the dark side of human nature, various types of security threats (current and potential), and how to construct a methodology to predict and combat malicious behavior. The companion CD demonstrates avai.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Military art and science.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
2 |
|a Military Science
|
650 |
|
2 |
|a Electronic Data Processing
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Art et science militaires.
|
650 |
|
6 |
|a Informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer science
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Military art and science
|2 fast
|
758 |
|
|
|i has work:
|a Predicting malicious behavior (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCXwqmdBQx64t79CQQfdDC3
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Jackson, Gary M.
|t Predicting Malicious Behavior : Tools and Techniques for Ensuring Global Security.
|d Hoboken : John Wiley & Sons, ©2012
|z 9781118166130
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=818116
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL818116
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 458263
|
938 |
|
|
|a Recorded Books, LLC
|b RECE
|n rbeEB00063161
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7660239
|
994 |
|
|
|a 92
|b IZTAP
|