Cargando…

Predicting Malicious Behavior : Tools and Techniques for Ensuring Global Security.

A groundbreaking exploration of how to identify and fight security threats at every levelThis revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Jackson, Gary M.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken : John Wiley & Sons, 2012.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_ocn794663277
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 120604s2012 xx o 000 0 eng d
010 |a  2012933633 
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d N$T  |d YDXCP  |d TEFOD  |d OCLCQ  |d OCLCF  |d OCLCQ  |d RECBK  |d COO  |d DEBSZ  |d TEFOD  |d OCLCQ  |d ZCU  |d MERUC  |d SAV  |d U3W  |d OCLCA  |d HCO  |d ICG  |d INT  |d OCLCQ  |d VT2  |d OCLCQ  |d DKC  |d AU@  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
016 7 |a 016009803  |2 Uk 
019 |a 864910680  |a 1081233435  |a 1103270288  |a 1129352548 
020 |a 9781118226254  |q (electronic bk.) 
020 |a 1118226259  |q (electronic bk.) 
020 |a 9781118239568  |q (electronic bk.) 
020 |a 1118239563  |q (electronic bk.) 
020 |a 9781118166130 
020 |a 1118166132 
028 0 1 |a EB00063161  |b Recorded Books 
029 1 |a DEBBG  |b BV044159736 
029 1 |a DEBSZ  |b 431068100 
035 |a (OCoLC)794663277  |z (OCoLC)864910680  |z (OCoLC)1081233435  |z (OCoLC)1103270288  |z (OCoLC)1129352548 
037 |a DF44C770-D6BC-4DFA-83CE-C30B3B188D8B  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9 .A25 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |a 355/.033 
049 |a UAMI 
100 1 |a Jackson, Gary M. 
245 1 0 |a Predicting Malicious Behavior :  |b Tools and Techniques for Ensuring Global Security. 
260 |a Hoboken :  |b John Wiley & Sons,  |c 2012. 
300 |a 1 online resource (554 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Predicting Malicious Behavior; Contents; Foreword; Introduction; Part I Understanding the Dark Side: Malicious Intent; Chapter 1 Analyzing the Malicious Individual; Analyzing the Unique Individual; Richard Reid: The Shoe Bomber; The Event; The Motivation; Causes; A Behavior Analysis; Ted Bundy: The Infamous Serial Murderer; Similarities of Targets; The Motivation; Determining the Complexities Underlying Individual Malicious Behavior: A Behavior Analysis; Removing Subjectivity and Bias from the Behavior Analysis; The Individual Cyber Attacker. 
505 8 |a Identifying the Threat from the Lone Cyber AttackerRecognizing the Power of Being Anonymous; Recognizing When a Hacker Is Detached from the Target; Recognizing Motivation; Identifying the Power of Disruption; Recognizing the Need for Theft; A Behavior Analysis; Modeling the Individual: Advantages and Disadvantages; How Individuals May Vary; The Loner; The Chameleon; The Social Misfit; The Individual versus the Group; Advantages of AuBA #1: Automated Summarization; In Summary; Chapter 2 Analyzing the Malicious Group; Understanding the Group Adversary; Analyzing al-Qaeda. 
505 8 |a Automated Behavior Analysis SummaryThe Organization; Group Dynamics; The Motivation; Declarations of War; A Behavior Analysis; Analyzing Hezbollah; The Organization; Consistency of Behavior; The Motivation; Targeting Consistency; A Behavior Analysis; Analyzing the Coordinated Group Cyber Threat; The Group Structure; The Motivation; A Behavior Analysis; Advantages of AuBA #2: Theme-Guided Smart Searches; In Summary; Chapter 3 Analyzing Country-Level Threats; Threats to Our National Infrastructure; Analyzing the Specific Threat of Terrorist Attacks. 
505 8 |a Current Terrorist Threats to the United StatesPreventing Terrorist Attacks on U.S. Soil; Improving Network Security; Current Network Security; Current Foreign Threats to Network Security; Understanding Current Technology for Protecting Our Networks; Facing Chemical, Biological, Radiological, and Nuclear (CBRN) Threats; Understanding the Threat of a Biological Attack; Anticipating the Dirty Bomb; Advantages of AuBA #3: Reducing Errors and Inefficiencies of Manual Predictive Modeling; In Summary; Chapter 4 Threats and Security Nightmares: Our Current Reactive State of Security. 
505 8 |a Analyzing Mall, School, Workplace, and Other Seemingly Random Public ViolenceMaking Sense of Seemingly Senseless Public Attacks; Why Are We Violent?; Unanticipated Terrorist Network Attacks; Understanding the Element of Surprise; Anticipating the Unknown; Can Technology Detect First-Time Attacks?; Detecting the New Attack; Advantages of AuBA #4: Building Predictive Applications; In Summary; Chapter 5 Current Network Security; Hacking and National Network Security; Growing Damage and Threat; Assessing Current Technology; Signature Detection. 
500 |a Forensics: The Key to Defining New Signatures for Detection. 
520 |a A groundbreaking exploration of how to identify and fight security threats at every levelThis revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with intelligence officer experience who invented the technology, it explores the keys to understanding the dark side of human nature, various types of security threats (current and potential), and how to construct a methodology to predict and combat malicious behavior. The companion CD demonstrates avai. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Military art and science. 
650 0 |a Computer science. 
650 2 |a Computer Security 
650 2 |a Military Science 
650 2 |a Electronic Data Processing 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Art et science militaires. 
650 6 |a Informatique. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer science  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Military art and science  |2 fast 
758 |i has work:  |a Predicting malicious behavior (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCXwqmdBQx64t79CQQfdDC3  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Jackson, Gary M.  |t Predicting Malicious Behavior : Tools and Techniques for Ensuring Global Security.  |d Hoboken : John Wiley & Sons, ©2012  |z 9781118166130 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=818116  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL818116 
938 |a EBSCOhost  |b EBSC  |n 458263 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00063161 
938 |a YBP Library Services  |b YANK  |n 7660239 
994 |a 92  |b IZTAP