Total Information Awareness
Buch, Englisch, 627 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 1127 g
ISBN: 978-3-031-63125-2
Verlag: Springer International Publishing
Counterterrorism and cybersecurity are the top two priorities at the Federal Bureau of Investigation (FBI). Graduated from the FBI Citizens Academy in 2021, Prof. Newton Lee offers a broad survey of counterterrorism and cybersecurity history, strategies, and technologies in the 3rd edition of his riveting book that examines the role of the intelligence community, cures for terrorism, war and peace, cyber warfare, and quantum computing security.
From September 11 attacks and Sony-pocalypse to Israel’s 9/11 and MOAB (Mother of All Breaches), the author shares insights from Hollywood such as , , , and . In real life, the unsung heroes at the FBI have thwarted a myriad of terrorist attacks and cybercrimes. The FBI has worked diligently to improve its public image and build trust through community outreach and pop culture.
Imagine Sherlock Holmes meets James Bond in crime fighting, FBI Director Christopher Wray says, “We’ve got technically trained personnel—with cutting-edge tools and skills you might never have imagined seeing outside of a James Bond movie—covering roughly 400 offices around the country.”
This book is indispensable for anyone who is contemplating a career at the FBI, think tanks, or law enforcement agencies worldwide. It is also a must-read for every executive to safeguard their organization against cyberattacks that have caused more than $10 billion in damages. In the spirit of President John F. Kennedy, one may proclaim: “Ask not what counterterrorism and cybersecurity can do for you, ask what you can do for counterterrorism and cybersecurity.”
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Fachgebiete
- Sozialwissenschaften Politikwissenschaft Politische Gewalt Terrorismus, Religiöser Fundamentalismus
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Computerkriminalität & Hacking
Weitere Infos & Material
Part I Counterterrorism History: Then and Now.- From September 11 Attacks to Israel’s 9/11.- FBI and U.S. Intelligence Community.- Part II Counterterrorism Strategies: Causes and Cures, War and Peace.- Cures for Terrorism.- War and Peace.- Part III Counterterrorism Technologies: Total Information Awareness.- Reincarnation of Total Information Awareness and Edward Snowden’s NSA Leaks.- Two-Way Street of Total Information Awareness.- Part IV Cybersecurity: History, Strategies, and Technologies.- Cyber Warfare: Weapon of Mass Disruption.- Cyberattacks, Prevention, and Countermeasures.- Cybersecurity Training in Medical Centers: Leveraging Every Opportunity to Convey the Message (by Ray Balut and Jean C. Stanford).- Plan X and Generation Z.- Part V Cybersecurity: Applications and Challenges.- Artificial Intelligence and Data Mining.- Gamification of Penetration Testing (by Darren Manners).- USB Write Blocking and Forensics (by Philip Polstra).- Team DESCARTES and DARPA’s Cyber Grand Challenge.- The Quantum Computing Threat (by Skip Sanzeri).- Secure Communications for Quantum and Beyond: Orchestrated Cryptography for Agility and Policy (by Chris Cap, Scott Kawaguchi, Joey Lupo, Chris Trinidad).- Index.