0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Computational Analysis of Terrorist Groups: Lashkar-e-Taiba (Paperback): V.S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana... Computational Analysis of Terrorist Groups: Lashkar-e-Taiba (Paperback)
V.S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana Shakarian, John P. Dickerson
R2,703 Discovery Miles 27 030 Ships in 10 - 15 working days

Computational Analysis of Terrorist Groups: Lashkar-e-Taiba provides an in-depth look at Web intelligence, and how advanced mathematics and modern computing technology can influence the insights we have on terrorist groups. This book primarily focuses on one famous terrorist group known as Lashkar-e-Taiba (or LeT), and how it operates. After 10 years of counter Al Qaeda operations, LeT is considered by many in the counter-terrorism community to be an even greater threat to the US and world peace than Al Qaeda. Computational Analysis of Terrorist Groups: Lashkar-e-Taiba is the first book that demonstrates how to use modern computational analysis techniques including methods for "big data" analysis. This book presents how to quantify both the environment in which LeT operate, and the actions it took over a 20-year period, and represent it as a relational database table. This table is then mined using sophisticated data mining algorithms in order to gain detailed, mathematical, computational and statistical insights into LeT and its operations. This book also provides a detailed history of Lashkar-e-Taiba based on extensive analysis conducted by using open source information and public statements. Each chapter includes a case study, as well as a slide describing the key results which are available on the authors' web sites. Computational Analysis of Terrorist Groups: Lashkar-e-Taiba is designed for a professional market composed of government or military workers, researchers and computer scientists working in the web intelligence field. Advanced-level students in computer science will also find this valuable as a reference book.

Computational Analysis of Terrorist Groups: Lashkar-e-Taiba (Hardcover, 2013 ed.): V.S. Subrahmanian, Aaron Mannes, Amy Sliva,... Computational Analysis of Terrorist Groups: Lashkar-e-Taiba (Hardcover, 2013 ed.)
V.S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana Shakarian, John P. Dickerson
R3,485 Discovery Miles 34 850 Ships in 10 - 15 working days

"Computational Analysis of Terrorist Groups: Lashkar-e-Taiba "provides an in-depth look at Web intelligence, and how advanced mathematics and modern computing technology can influence the insights we have on terrorist groups. This book primarily focuses on one famous terrorist group known as Lashkar-e-Taiba (or LeT), and how it operates.After 10 years of counter Al Qaeda operations, LeT is considered by many in the counter-terrorism community to be an even greater threat to the US and world peace than Al Qaeda.

"Computational Analysis of Terrorist Groups: Lashkar-e-Taiba "is the first book that demonstrates how to use modern computational analysis techniques including methods for "big data" analysis. This book presents how to quantify both the environment in which LeT operate, and the actions it took over a 20-year period, and represent it as a relational database table. This table is then mined using sophisticated data mining algorithms in order to gain detailed, mathematical, computational and statistical insights into LeT and its operations.This book also provides a detailed history of Lashkar-e-Taiba based on extensive analysis conducted by using open source information and public statements. Each chapter includes a case study, as well as a slide describing the key results which are available on the authors' web sites.

"Computational Analysis of Terrorist Groups: Lashkar-e-Taiba "is designed for a professional market composed of government or military workers, researchers and computer scientists working in the web intelligence field. Advanced-level students in computer science will also find this valuable as a reference book."

Introduction to Cyber-Warfare - A Multidisciplinary Approach (Paperback): Paulo Shakarian, Jana Shakarian, Andrew Ruef Introduction to Cyber-Warfare - A Multidisciplinary Approach (Paperback)
Paulo Shakarian, Jana Shakarian, Andrew Ruef
R1,079 Discovery Miles 10 790 Ships in 12 - 17 working days

"Introduction to Cyber-Warfare: A Multidisciplinary Approach, "written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.
Provides a multi-disciplinary approach to cyber-warfare, analyzing the information technology, military, policy, social, and scientific issues that are in playPresents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah, ) and cyber-attack as a tool against dissidents within a state (Russia, Iran)Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec Covers cyber-attacks directed against infrastructure, such as water treatment plants and power-grids, with a detailed account of Stuxent

Exploring Malicious Hacker Communities - Toward Proactive Cyber-Defense (Hardcover): Ericsson Marin, Mohammed Almukaynizi,... Exploring Malicious Hacker Communities - Toward Proactive Cyber-Defense (Hardcover)
Ericsson Marin, Mohammed Almukaynizi, Soumajyoti Sarkar, Eric Nunes, Jana Shakarian, …
R1,678 Discovery Miles 16 780 Ships in 9 - 15 working days

Malicious hackers utilize the World Wide Web to share knowledge. Analyzing the online communication of these threat actors can help reduce the risk of attacks. This book shifts attention from the defender environment to the attacker environment, offering a new security paradigm of 'proactive cyber threat intelligence' that allows defenders of computer networks to gain a better understanding of their adversaries by analyzing assets, capabilities, and interest of malicious hackers. The authors propose models, techniques, and frameworks based on threat intelligence mined from the heart of the underground cyber world: the malicious hacker communities. They provide insights into the hackers themselves and the groups they form dynamically in the act of exchanging ideas and techniques, buying or selling malware, and exploits. The book covers both methodology - a hybridization of machine learning, artificial intelligence, and social network analysis methods - and the resulting conclusions, detailing how a deep understanding of malicious hacker communities can be the key to designing better attack prediction systems.

Darkweb Cyber Threat Intelligence Mining (Hardcover): John Robertson, Ahmad Diab, Ericsson Marin, Eric Nunes, Vivin Paliath,... Darkweb Cyber Threat Intelligence Mining (Hardcover)
John Robertson, Ahmad Diab, Ericsson Marin, Eric Nunes, Vivin Paliath, …
R2,016 Discovery Miles 20 160 Ships in 10 - 15 working days

The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Multi Colour Jungle Stripe Neckerchief
R119 Discovery Miles 1 190
Sharp EL-W506T Scientific Calculator…
R599 R560 Discovery Miles 5 600
Mellerware Swiss - Plastic Floor Fan…
R371 Discovery Miles 3 710
Philips TAUE101 Wired In-Ear Headphones…
R124 Discovery Miles 1 240
Bostik Glu Dots - Removable (64 Dots)
 (3)
R55 Discovery Miles 550
Medalist Mini American Football (Blue)
R122 Discovery Miles 1 220
Multi-Functional Bamboo Standing Laptop…
R1,399 R739 Discovery Miles 7 390
Jurassic Park Trilogy Collection
Sam Neill, Laura Dern, … Blu-ray disc  (1)
R311 Discovery Miles 3 110
Great Johannesburg - What Happened? How…
Nickolaus Bauer Paperback R330 R240 Discovery Miles 2 400
Jeronimo Walkie Talkie Game
 (2)
R360 R328 Discovery Miles 3 280

 

Partners