Table of contents
About this book
From 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from thought leaders and the make-believe of Hollywood such as 24, Homeland and The Americans. President Barack Obama also said in his 2015 State of the Union address, "We are making sure our government integrates intelligence to combat cyber threats, just as we have done to combat terrorism.
In this new edition, there are seven completely new chapters, including three new contributed chapters by healthcare chief information security officer Ray Balut and Jean C. Stanford, DEF CON speaker Philip Polstra and security engineer and Black Hat speaker Darren Manners, as well as new commentaries by communications expert Andy Marken and DEF CON speaker Emily Peed.
The book offers practical advice for businesses, governments and individuals to better secure the world and protect cyberspace.
- Book Title Counterterrorism and Cybersecurity
- Book Subtitle Total Information Awareness
- DOI https://doi.org/10.1007/978-3-319-17244-6
- Copyright Information Springer International Publishing Switzerland 2015
- Publisher Name Springer, Cham
- eBook Packages Computer Science Computer Science (R0)
- Hardcover ISBN 978-3-319-17243-9
- Softcover ISBN 978-3-319-37460-4
- eBook ISBN 978-3-319-17244-6
- Edition Number 2
- Number of Pages XV, 489
- Number of Illustrations 120 b/w illustrations, 0 illustrations in colour
Systems and Data Security
Data Mining and Knowledge Discovery
Information Systems Applications (incl. Internet)
Multimedia Information Systems
- Buy this book on publisher's site
“The second edition of this book … presents a comprehensive account of past and current initiatives in the field of total information awareness, examining history, strategies, and technologies with a thought-provoking approach that will appeal to both technical and nontechnical readers. … This is a very rich, accurate, and well-documented book, full of references to press sources, which can help in getting a sense of how many initiatives, concerns, and approaches exist in the field of counterterrorism and cybersecurity.” (Alessandro Berni, Computing Reviews, October, 2015)