Counterintelligence in a Cyber World (Record no. 178895)

MARC details
000 -LEADER
fixed length control field 03794nam a22005175i 4500
001 - CONTROL NUMBER
control field 978-3-031-35287-4
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240423125526.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230626s2023 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031352874
-- 978-3-031-35287-4
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-031-35287-4
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM043050
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Watters, Paul A.
Relator term author.
Relator code aut
-- http://id.loc.gov/vocabulary/relators/aut
245 10 - TITLE STATEMENT
Title Counterintelligence in a Cyber World
Medium [electronic resource] /
Statement of responsibility, etc by Paul A. Watters.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2023.
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2023.
300 ## - PHYSICAL DESCRIPTION
Extent XIX, 145 p.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter. 1. Counterintelligence Theory -- Chapter. 2. The Cyber Operational Environment -- Chapter. 3. Cyber Threats (and Opportunities) -- Chapter. 4. Psychology and Criminal Profiling -- Chapter. 5. Counterespionage -- Chapter. 6. Technical Surveillance -- Chapter. 7. Physical Surveillance -- Chapter. 8. Data Analysis -- Chapter. 9. Attack Attribution -- Chapter. 10. Practical Deception -- Chapter. 11. Legal Issues in Cyber Counterintelligence -- Chapter. 12. Ethical Issues in Cyber Counterintelligence.
520 ## - SUMMARY, ETC.
Summary, etc This book provides an outline of the major challenges and methodologies for applying classic counterintelligence theory into the cybersecurity domain. This book also covers operational security approaches to cyber, alongside detailed descriptions of contemporary cybersecurity threats, in the context of psychological and criminal profiling of cybercriminals. Following an analysis of the plethora of counterespionage techniques that can be mapped to the cyber realm, the mechanics of undertaking technical surveillance are reviewed. A range of approaches to web and forum surveillance are outlined as a virtual addition to traditional video and audio surveillance captured regarding targets. This includes a description of the advances in Artificial Intelligence, predictive analysis, support for the disciplines of digital forensics, behavioural analysis and Open Source Intelligence (OSINT). The rise of disinformation and misinformation and the veracity of widespread false flag claims are discussed at length, within the broader context of legal and ethical issues in cyber counterintelligence. This book is designed for professionals working in the intelligence, law enforcement or cybersecurity domains to further explore and examine the contemporary intersection of these disciplines. Students studying cybersecurity, justice, law, intelligence, criminology or related fields may also find the book useful as a reference volume, while instructors could utilise the whole volume or individual chapters as a secondary textbook or required reading.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Security, International.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Mobile and Network Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cybercrime.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element International Security Studies.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783031352867
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783031352881
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783031352898
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-031-35287-4">https://doi.org/10.1007/978-3-031-35287-4</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-CSE-Springer

No items available.

© 2024 IIIT-Delhi, library@iiitd.ac.in