語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Counterintelligence in a cyber world
~
Watters, Paul A.
FindBook
Google Book
Amazon
博客來
Counterintelligence in a cyber world
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Counterintelligence in a cyber world/ by Paul A. Watters.
作者:
Watters, Paul A.
出版者:
Cham :Springer International Publishing : : 2023.,
面頁冊數:
xix, 145 p. :ill., digital ;24 cm.
內容註:
Chapter. 1. Counterintelligence Theory -- Chapter. 2. The Cyber Operational Environment -- Chapter. 3. Cyber Threats (and Opportunities) -- Chapter. 4. Psychology and Criminal Profiling -- Chapter. 5. Counterespionage -- Chapter. 6. Technical Surveillance -- Chapter. 7. Physical Surveillance -- Chapter. 8. Data Analysis -- Chapter. 9. Attack Attribution -- Chapter. 10. Practical Deception -- Chapter. 11. Legal Issues in Cyber Counterintelligence -- Chapter. 12. Ethical Issues in Cyber Counterintelligence.
Contained By:
Springer Nature eBook
標題:
Cyberterrorism. -
電子資源:
https://doi.org/10.1007/978-3-031-35287-4
ISBN:
9783031352874
Counterintelligence in a cyber world
Watters, Paul A.
Counterintelligence in a cyber world
[electronic resource] /by Paul A. Watters. - Cham :Springer International Publishing :2023. - xix, 145 p. :ill., digital ;24 cm.
Chapter. 1. Counterintelligence Theory -- Chapter. 2. The Cyber Operational Environment -- Chapter. 3. Cyber Threats (and Opportunities) -- Chapter. 4. Psychology and Criminal Profiling -- Chapter. 5. Counterespionage -- Chapter. 6. Technical Surveillance -- Chapter. 7. Physical Surveillance -- Chapter. 8. Data Analysis -- Chapter. 9. Attack Attribution -- Chapter. 10. Practical Deception -- Chapter. 11. Legal Issues in Cyber Counterintelligence -- Chapter. 12. Ethical Issues in Cyber Counterintelligence.
This book provides an outline of the major challenges and methodologies for applying classic counterintelligence theory into the cybersecurity domain. This book also covers operational security approaches to cyber, alongside detailed descriptions of contemporary cybersecurity threats, in the context of psychological and criminal profiling of cybercriminals. Following an analysis of the plethora of counterespionage techniques that can be mapped to the cyber realm, the mechanics of undertaking technical surveillance are reviewed. A range of approaches to web and forum surveillance are outlined as a virtual addition to traditional video and audio surveillance captured regarding targets. This includes a description of the advances in Artificial Intelligence, predictive analysis, support for the disciplines of digital forensics, behavioural analysis and Open Source Intelligence (OSINT) The rise of disinformation and misinformation and the veracity of widespread false flag claims are discussed at length, within the broader context of legal and ethical issues in cyber counterintelligence. This book is designed for professionals working in the intelligence, law enforcement or cybersecurity domains to further explore and examine the contemporary intersection of these disciplines. Students studying cybersecurity, justice, law, intelligence, criminology or related fields may also find the book useful as a reference volume, while instructors could utilise the whole volume or individual chapters as a secondary textbook or required reading.
ISBN: 9783031352874
Standard No.: 10.1007/978-3-031-35287-4doiSubjects--Topical Terms:
781846
Cyberterrorism.
LC Class. No.: JF1525.I6 / W38 2023
Dewey Class. No.: 355.3433
Counterintelligence in a cyber world
LDR
:03022nmm a2200325 a 4500
001
2332042
003
DE-He213
005
20230626174906.0
006
m d
007
cr nn 008maaau
008
240402s2023 sz s 0 eng d
020
$a
9783031352874
$q
(electronic bk.)
020
$a
9783031352867
$q
(paper)
024
7
$a
10.1007/978-3-031-35287-4
$2
doi
035
$a
978-3-031-35287-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
JF1525.I6
$b
W38 2023
072
7
$a
UTN
$2
bicssc
072
7
$a
COM043050
$2
bisacsh
072
7
$a
UTN
$2
thema
082
0 4
$a
355.3433
$2
23
090
$a
JF1525.I6
$b
W346 2023
100
1
$a
Watters, Paul A.
$3
816475
245
1 0
$a
Counterintelligence in a cyber world
$h
[electronic resource] /
$c
by Paul A. Watters.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2023.
300
$a
xix, 145 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter. 1. Counterintelligence Theory -- Chapter. 2. The Cyber Operational Environment -- Chapter. 3. Cyber Threats (and Opportunities) -- Chapter. 4. Psychology and Criminal Profiling -- Chapter. 5. Counterespionage -- Chapter. 6. Technical Surveillance -- Chapter. 7. Physical Surveillance -- Chapter. 8. Data Analysis -- Chapter. 9. Attack Attribution -- Chapter. 10. Practical Deception -- Chapter. 11. Legal Issues in Cyber Counterintelligence -- Chapter. 12. Ethical Issues in Cyber Counterintelligence.
520
$a
This book provides an outline of the major challenges and methodologies for applying classic counterintelligence theory into the cybersecurity domain. This book also covers operational security approaches to cyber, alongside detailed descriptions of contemporary cybersecurity threats, in the context of psychological and criminal profiling of cybercriminals. Following an analysis of the plethora of counterespionage techniques that can be mapped to the cyber realm, the mechanics of undertaking technical surveillance are reviewed. A range of approaches to web and forum surveillance are outlined as a virtual addition to traditional video and audio surveillance captured regarding targets. This includes a description of the advances in Artificial Intelligence, predictive analysis, support for the disciplines of digital forensics, behavioural analysis and Open Source Intelligence (OSINT) The rise of disinformation and misinformation and the veracity of widespread false flag claims are discussed at length, within the broader context of legal and ethical issues in cyber counterintelligence. This book is designed for professionals working in the intelligence, law enforcement or cybersecurity domains to further explore and examine the contemporary intersection of these disciplines. Students studying cybersecurity, justice, law, intelligence, criminology or related fields may also find the book useful as a reference volume, while instructors could utilise the whole volume or individual chapters as a secondary textbook or required reading.
650
0
$a
Cyberterrorism.
$3
781846
650
0
$a
Intelligence service.
$3
595030
650
0
$a
Computer crimes.
$3
583792
650
1 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Cybercrime.
$3
2195714
650
2 4
$a
International Security Studies.
$3
3222152
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-031-35287-4
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9458247
電子資源
11.線上閱覽_V
電子書
EB JF1525.I6 W38 2023
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入