語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Applying methods of scientific inqui...
~
Sari, Arif, (1986-)
FindBook
Google Book
Amazon
博客來
Applying methods of scientific inquiry into intelligence, security, and counterterrorism
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Applying methods of scientific inquiry into intelligence, security, and counterterrorism/ Arif Sari, editor.
其他作者:
Sari, Arif,
出版者:
Hershey, Pennsylvania :IGI Global, : 2019.,
面頁冊數:
1 online resource (xvi, 396 p.)
內容註:
Chapter 1. Taxonomy of cyber attack weapons, defense strategies, and cyber war incidents -- Chapter 2. Android application security -- Chapter 3. Cyber security and open source intelligence techniques -- Chapter 4. Intelligent strategy and security in education: big data (text analytics) -- Chapter 5. Inevitable battle against botnets -- Chapter 6. A review of the economic benefits of cyber terrorism -- Chapter 7. Guide for modelling a network flow-based detection system for malware categorization: a review of related literature -- Chapter 8. A review of research studies on cyber terror -- Chapter 9. From conventional to sophisticated: a cyber guise to terrorism in the middle East -- Chapter 10. Dark web and its research scopes -- Chapter 11. Enhanced security for network communication with proposed IS-IS protocol -- Chapter 12. Economic impact of cyber attacks on critical infrastructures.
標題:
Cyber intelligence (Computer security) - Congresses. -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1
ISBN:
9781522589785 (e-book)
Applying methods of scientific inquiry into intelligence, security, and counterterrorism
Applying methods of scientific inquiry into intelligence, security, and counterterrorism
[electronic resource] /Arif Sari, editor. - Hershey, Pennsylvania :IGI Global,2019. - 1 online resource (xvi, 396 p.)
Includes bibliographical references and index.
Chapter 1. Taxonomy of cyber attack weapons, defense strategies, and cyber war incidents -- Chapter 2. Android application security -- Chapter 3. Cyber security and open source intelligence techniques -- Chapter 4. Intelligent strategy and security in education: big data (text analytics) -- Chapter 5. Inevitable battle against botnets -- Chapter 6. A review of the economic benefits of cyber terrorism -- Chapter 7. Guide for modelling a network flow-based detection system for malware categorization: a review of related literature -- Chapter 8. A review of research studies on cyber terror -- Chapter 9. From conventional to sophisticated: a cyber guise to terrorism in the middle East -- Chapter 10. Dark web and its research scopes -- Chapter 11. Enhanced security for network communication with proposed IS-IS protocol -- Chapter 12. Economic impact of cyber attacks on critical infrastructures.
Restricted to subscribers or individual electronic text purchasers.
"This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections"--Provided by publisher.
ISBN: 9781522589785 (e-book)Subjects--Topical Terms:
2074226
Cyber intelligence (Computer security)
--Congresses.
LC Class. No.: QA76.9.A25 / A675 2019e
Dewey Class. No.: 005.8
Applying methods of scientific inquiry into intelligence, security, and counterterrorism
LDR
:02204nmm 2200277 a 4500
001
2183958
003
IGIG
005
20191028144135.0
006
m o d
007
cr cn
008
191225s2019 pau fob 001 0 eng d
010
$z
2018057672
020
$a
9781522589785 (e-book)
020
$a
9781522589761 (hardback)
035
$a
(OCoLC)1100549663
035
$a
1081021202
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
QA76.9.A25
$b
A675 2019e
082
0 0
$a
005.8
$2
23
245
0 0
$a
Applying methods of scientific inquiry into intelligence, security, and counterterrorism
$h
[electronic resource] /
$c
Arif Sari, editor.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2019.
300
$a
1 online resource (xvi, 396 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. Taxonomy of cyber attack weapons, defense strategies, and cyber war incidents -- Chapter 2. Android application security -- Chapter 3. Cyber security and open source intelligence techniques -- Chapter 4. Intelligent strategy and security in education: big data (text analytics) -- Chapter 5. Inevitable battle against botnets -- Chapter 6. A review of the economic benefits of cyber terrorism -- Chapter 7. Guide for modelling a network flow-based detection system for malware categorization: a review of related literature -- Chapter 8. A review of research studies on cyber terror -- Chapter 9. From conventional to sophisticated: a cyber guise to terrorism in the middle East -- Chapter 10. Dark web and its research scopes -- Chapter 11. Enhanced security for network communication with proposed IS-IS protocol -- Chapter 12. Economic impact of cyber attacks on critical infrastructures.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections"--Provided by publisher.
650
0
$a
Cyber intelligence (Computer security)
$v
Congresses.
$3
2074226
650
0
$a
Cyberterrorism
$x
Prevention.
$3
819287
700
1
$a
Sari, Arif,
$d
1986-
$e
editor.
$3
3395636
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9371487
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 A675 2019e
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入