| 000 | 03609cam a2200433 i 4500 | ||
|---|---|---|---|
| 001 | 17505752 | ||
| 003 | OSt | ||
| 005 | 20230630055608.0 | ||
| 008 | 121023t20132013maua b 001 0 eng | ||
| 010 | _a 2012043042 | ||
| 020 |
_a9780124071919 _qHard cover |
||
| 040 |
_beng _cNIRUC _dNIRUC |
||
| 042 | _apcc | ||
| 050 | 0 | 0 |
_aUA 10.5 _b. A34 2013 |
| 082 | 0 | 0 |
_a353.1/7234 _223 |
| 100 | 1 |
_aAkhgar, Babak. _eeditor. |
|
| 245 | 1 | 0 |
_aStrategic intelligence management : _bnational security imperatives and information and communications technologies / _cedited by Babak Akhgar, Simeon Yates. |
| 250 | _a1st edition. | ||
| 260 |
_aWaltham, MA: _bButterworth-Heinmann, _c2013. |
||
| 264 | 1 |
_aWaltham, MA : _bElsevier/Butterworth-Heinmann, _c[2013] |
|
| 264 | 4 | _c©2013 | |
| 300 |
_axxiv, 316 p, : _bcol, ill ; _c24 cm. |
||
| 336 |
_atext _2rdacontent |
||
| 337 |
_aunmediated _2rdamedia |
||
| 338 |
_avolume _2rdacarrier |
||
| 504 | _aIncludes bibliographical references (pages 273-295) and index. | ||
| 505 | 0 | _aIntroduction : strategy formation in the a globalised and networked age : a review of the concept and its definition -- National security strategies and issues -- Securing the state : strategic responses for an interdependent world -- We have met the enemy and they are us : insider threat and its challenge to national security -- An age of asymmetric challenges--4th generation warfare at sea -- Port and border security - the first and last line of national security defence -- The public, communication, risk and national security -- Risk communication, risk perception and behaviour as foundations of effective national security practices -- Promoting public resilience against CBRN terrorism -- From local to global : policing and national security -- The role of social media in crisis : a European holistic approach to the adoption of online and mobile communications in crisis response and search and rescue efforts -- Emerging technologies and the human rights challenge of rapidly expanding -- State surveillance capacities -- Technologies, information and knowledge for national security -- User requirements and training needs within security applications : methods for capture and communication -- Exploring the crisis management/knowledge management nexus -- A semantic approach to security policy reasoning -- The Athena project : using formal concept analysis to facilitate the actions of responders in a crisis situation -- Exploiting intelligence for national security -- Re-thinking standardization for interagency information sharing -- Future threats and cyber security -- Securing cyberspace : strategic responses for a digital age -- National cyber defense strategy -- From cyber terrorism to state actors : covert cyber operations -- Cybersecurity countermeasures to combat cyberterrorism -- Developing a model to reduce and/or prevent cyber crime victimization among the user individuals -- Conclusion. | |
| 650 | 0 |
_aTelecommunication _xSecurity measures. |
|
| 650 | 0 |
_aNational security _xTecnological innovations _xGovernment policy. |
|
| 650 | 0 |
_aEmergency management _xTechnological innovations _xGovernment policy. |
|
| 650 | 0 |
_aCyberterrorism _xPrevention _xTechnological innovations _xGovernment policy. |
|
| 650 | 0 |
_aInformation technology _xManagement. |
|
| 650 | 0 |
_aInformation technology _xStrategic aspects. |
|
| 650 | 0 | _aKnowledge management. | |
| 700 | 1 |
_aYates, Simeon. _eeditor. |
|
| 906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
| 942 |
_2lcc _cBK _n0 |
||
| 999 |
_c313 _d313 |
||