Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Applying methods of scientific inqui...
~
Sari, Arif, (1986-)
Applying methods of scientific inquiry into intelligence, security, and counterterrorism
Record Type:
Electronic resources : Monograph/item
Title/Author:
Applying methods of scientific inquiry into intelligence, security, and counterterrorismArif Sari, editor.
other author:
Sari, Arif,
Published:
Hershey, Pennsylvania :IGI Global,2019.
Description:
1 online resource (xvi, 396 p.)
Subject:
Cyber intelligence (Computer security)Congresses.
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1
ISBN:
9781522589785 (e-book)
Applying methods of scientific inquiry into intelligence, security, and counterterrorism
Applying methods of scientific inquiry into intelligence, security, and counterterrorism
[electronic resource] /Arif Sari, editor. - Hershey, Pennsylvania :IGI Global,2019. - 1 online resource (xvi, 396 p.)
Includes bibliographical references and index.
Chapter 1. Taxonomy of cyber attack weapons, defense strategies, and cyber war incidents -- Chapter 2. Android application security -- Chapter 3. Cyber security and open source intelligence techniques -- Chapter 4. Intelligent strategy and security in education: big data (text analytics) -- Chapter 5. Inevitable battle against botnets -- Chapter 6. A review of the economic benefits of cyber terrorism -- Chapter 7. Guide for modelling a network flow-based detection system for malware categorization: a review of related literature -- Chapter 8. A review of research studies on cyber terror -- Chapter 9. From conventional to sophisticated: a cyber guise to terrorism in the middle East -- Chapter 10. Dark web and its research scopes -- Chapter 11. Enhanced security for network communication with proposed IS-IS protocol -- Chapter 12. Economic impact of cyber attacks on critical infrastructures.
Restricted to subscribers or individual electronic text purchasers.
"This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections"--Provided by publisher.
ISBN: 9781522589785 (e-book)Subjects--Topical Terms:
695345
Cyber intelligence (Computer security)
--Congresses.
LC Class. No.: QA76.9.A25 / A675 2019e
Dewey Class. No.: 005.8
Applying methods of scientific inquiry into intelligence, security, and counterterrorism
LDR
:02204nmm a2200277 a 4500
001
560055
003
IGIG
005
20191028144135.0
006
m o d
007
cr cn
008
200109s2019 pau fob 001 0 eng d
010
$z
2018057672
020
$a
9781522589785 (e-book)
020
$a
9781522589761 (hardback)
035
$a
(OCoLC)1100549663
035
$a
1081021202
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
QA76.9.A25
$b
A675 2019e
082
0 0
$a
005.8
$2
23
245
0 0
$a
Applying methods of scientific inquiry into intelligence, security, and counterterrorism
$h
[electronic resource] /
$c
Arif Sari, editor.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2019.
300
$a
1 online resource (xvi, 396 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. Taxonomy of cyber attack weapons, defense strategies, and cyber war incidents -- Chapter 2. Android application security -- Chapter 3. Cyber security and open source intelligence techniques -- Chapter 4. Intelligent strategy and security in education: big data (text analytics) -- Chapter 5. Inevitable battle against botnets -- Chapter 6. A review of the economic benefits of cyber terrorism -- Chapter 7. Guide for modelling a network flow-based detection system for malware categorization: a review of related literature -- Chapter 8. A review of research studies on cyber terror -- Chapter 9. From conventional to sophisticated: a cyber guise to terrorism in the middle East -- Chapter 10. Dark web and its research scopes -- Chapter 11. Enhanced security for network communication with proposed IS-IS protocol -- Chapter 12. Economic impact of cyber attacks on critical infrastructures.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections"--Provided by publisher.
650
0
$a
Cyber intelligence (Computer security)
$v
Congresses.
$3
695345
650
0
$a
Cyberterrorism
$x
Prevention.
$3
274740
700
1
$a
Sari, Arif,
$d
1986-
$e
editor.
$3
843604
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000172125
電子館藏
1圖書
電子書
EB JF1525.P85 G739 2019 [2019]
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login