...

NIRU LIBRARY

Amazon cover image
Image from Amazon.com

Strategic intelligence management : national security imperatives and information and communications technologies / edited by Babak Akhgar, Simeon Yates.

By: Contributor(s): Material type: TextPublisher: Waltham, MA : Elsevier/Butterworth-Heinmann, [2013]Copyright date: ©2013Edition: 1st editionDescription: xxiv, 316 p, : col, ill ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9780124071919
Subject(s): DDC classification:
  • 353.1/7234 23
LOC classification:
  • UA 10.5 . A34 2013
Contents:
Introduction : strategy formation in the a globalised and networked age : a review of the concept and its definition -- National security strategies and issues -- Securing the state : strategic responses for an interdependent world -- We have met the enemy and they are us : insider threat and its challenge to national security -- An age of asymmetric challenges--4th generation warfare at sea -- Port and border security - the first and last line of national security defence -- The public, communication, risk and national security -- Risk communication, risk perception and behaviour as foundations of effective national security practices -- Promoting public resilience against CBRN terrorism -- From local to global : policing and national security -- The role of social media in crisis : a European holistic approach to the adoption of online and mobile communications in crisis response and search and rescue efforts -- Emerging technologies and the human rights challenge of rapidly expanding -- State surveillance capacities -- Technologies, information and knowledge for national security -- User requirements and training needs within security applications : methods for capture and communication -- Exploring the crisis management/knowledge management nexus -- A semantic approach to security policy reasoning -- The Athena project : using formal concept analysis to facilitate the actions of responders in a crisis situation -- Exploiting intelligence for national security -- Re-thinking standardization for interagency information sharing -- Future threats and cyber security -- Securing cyberspace : strategic responses for a digital age -- National cyber defense strategy -- From cyber terrorism to state actors : covert cyber operations -- Cybersecurity countermeasures to combat cyberterrorism -- Developing a model to reduce and/or prevent cyber crime victimization among the user individuals -- Conclusion.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Cover image Item type Current library Home library Collection Shelving location Call number Materials specified Vol info URL Copy number Status Notes Date due Barcode Item holds Item hold queue priority Course reserves
Books NIRU LIBRARY On display UA10. 5A34 2013 (Browse shelf(Opens below)) Available 2023-0866
Books NIRU LIBRARY On display UA10. 5A34 2013 (Browse shelf(Opens below)) Available 2023-0867
Books NIRU LIBRARY On display UA10. 5A34 2013 (Browse shelf(Opens below)) Available 2023-0733
Books NIRU LIBRARY On display UA10. 5A34 2013 (Browse shelf(Opens below)) Available 2023-0734
Books NIRU LIBRARY On display UA10. 5A34 2013 (Browse shelf(Opens below)) Available 2023-0737

Includes bibliographical references (pages 273-295) and index.

Introduction : strategy formation in the a globalised and networked age : a review of the concept and its definition -- National security strategies and issues -- Securing the state : strategic responses for an interdependent world -- We have met the enemy and they are us : insider threat and its challenge to national security -- An age of asymmetric challenges--4th generation warfare at sea -- Port and border security - the first and last line of national security defence -- The public, communication, risk and national security -- Risk communication, risk perception and behaviour as foundations of effective national security practices -- Promoting public resilience against CBRN terrorism -- From local to global : policing and national security -- The role of social media in crisis : a European holistic approach to the adoption of online and mobile communications in crisis response and search and rescue efforts -- Emerging technologies and the human rights challenge of rapidly expanding -- State surveillance capacities -- Technologies, information and knowledge for national security -- User requirements and training needs within security applications : methods for capture and communication -- Exploring the crisis management/knowledge management nexus -- A semantic approach to security policy reasoning -- The Athena project : using formal concept analysis to facilitate the actions of responders in a crisis situation -- Exploiting intelligence for national security -- Re-thinking standardization for interagency information sharing -- Future threats and cyber security -- Securing cyberspace : strategic responses for a digital age -- National cyber defense strategy -- From cyber terrorism to state actors : covert cyber operations -- Cybersecurity countermeasures to combat cyberterrorism -- Developing a model to reduce and/or prevent cyber crime victimization among the user individuals -- Conclusion.

There are no comments on this title.

to post a comment.
Copyright © 2025&6. National Intelligence and Research University. All Rights Reserved.