Automating open source intelligence : algorithms for OSINT / (Record no. 247243)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06138cam a2200589Ii 4500 |
001 - CONTROL NUMBER | |
control field | ocn931534548 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20190328114813.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 151207t20162016mau ob 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
LC control number | 2017288169 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | N$T |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | N$T |
Modifying agency | N$T |
-- | IDEBK |
-- | YDXCP |
-- | OCLCF |
-- | EBLCP |
-- | OPELS |
-- | CDX |
-- | B24X7 |
-- | STF |
-- | TXI |
-- | OCLCO |
-- | D6H |
-- | COO |
-- | IDB |
-- | Z5A |
-- | DEBSZ |
-- | LIV |
-- | OCLCQ |
-- | MERUC |
-- | OCLCQ |
-- | U3W |
-- | WRM |
-- | OCLCQ |
-- | WYU |
-- | LOA |
-- | ZCU |
-- | ICG |
-- | COCUF |
-- | VT2 |
-- | DKC |
019 ## - | |
-- | 932340309 |
-- | 966374388 |
-- | 1066446830 |
-- | 1088963499 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780128029176 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 012802917X |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9780128029169 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0128029161 |
Qualifying information | (paperback) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780128029169 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)931534548 |
Canceled/invalid control number | (OCoLC)932340309 |
-- | (OCoLC)966374388 |
-- | (OCoLC)1066446830 |
-- | (OCoLC)1088963499 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | JF1525.I6 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | POL |
Subject category code subdivision | 040020 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | POL |
Subject category code subdivision | 011000 |
Source | bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 327.120285/4678 |
Edition number | 23 |
245 00 - TITLE STATEMENT | |
Title | Automating open source intelligence : algorithms for OSINT / |
Medium | [electronic resource] |
Statement of responsibility, etc. | edited by Robert Layton, Paul A. Watters. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Waltham, MA : |
Name of producer, publisher, distributor, manufacturer | Elsevier, |
Date of production, publication, distribution, manufacture, or copyright notice | 2016. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | �2016 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
490 1# - SERIES STATEMENT | |
Series statement | Syngress advanced topics in information security |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references and index. |
588 0# - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Vendor-supplied metadata. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cover; Title Page ; Copyright Page; Contents; List of Contributors; Chapter 1 -- The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 -- Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 -- Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Attribution as a ConceptAbsolute Attribution; Relative Attribution; Relative attribution concepts; Inherent versus Learnt Behaviors; Hiding Behavior; Consistency of Behavior; Relative Attribution Techniques; Authorship Analysis; Limitations and Issues; Research Streams; Conclusions; References; Chapter 4 -- Enhancing Privacy to Defeat Open Source Intelligence; Introduction; Scenario; Requirements and Threats; Preliminaries; The PIEMCP; Formal Security Analysis with CPN; Attack Scenarios; Verification Results; Removing Trusted ARM; Performance Analysis of FSSO-PIEMC. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Comparison to Existing ApproachConclusion and future work; References; Chapter 5 -- Preventing Data Exfiltration: Corporate Patterns and Practices; What is Happening Around the World?; What is Happening in New Zealand?; Specifying the Problem; Problems Arising by Implementing Censorship; So, what should be done?; Summary; References; Chapter 6 -- Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground; Introduction; Advertising and risk; The digital millennium copyright act (DMCA); Chilling Effects Database; Google Transparency Report. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Mainstream advertising and how piracy is fundedHigh-Risk Advertising and their links to piracy websites; High-Risk Advertising: Case Studies in Canada; High-risk advertising: case studies in Australia; High-Risk Advertising: Case studies in New Zealand; Research Challenges; References; Chapter 7 -- Graph Creation and Analysis for Linking Actors: Application to Social Data; Introduction; The Social Network Model; A Brief History of Graphs and Social Networks; Conceptual Framework; Graph Creation Techniques; Data Gathering; Defining and Computing Relationships; Disambiguation Techniques. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Graph Analysis for OSINTStructural Observations; Density of a Graph; Neighborhood, Degree, Average Degree, and Degree Distribution; Paths and Average Path Length; Components; Characterizing Position of Nodes; Betweenness Centrality; Closeness Centrality; Structures and Communities of Nodes; Structural Patterns: Cliques and Cores; Communities; Modularity; Twitter Case Study; The Twitter Dataset; General Graph Metrics; Node Metrics and Profiles' Centrality; Communities; Conclusion; References; Chapter 8 -- Ethical Considerations When Using Online Datasets for Research Purposes; Introduction. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This book presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As OSINT has applications in crime fighting, state-based intelligence, and social research, this book provides recent advances in text mining, web crawling, and other algorithms that have led to advances in methods that can largely automate this process. It presents a coherent set of methods and processes for automating OSINT; focuses on algorithms and applications allowing the practitioner to get up and running quickly; includes fully developed case studies on the digital underground and predicting crime through OSINT; discusses the ethical considerations when using publicly available online data. -- |
Assigning source | Edited summary from book. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Open source intelligence. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | POLITICAL SCIENCE |
General subdivision | Government |
-- | International. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | POLITICAL SCIENCE |
General subdivision | International Relations |
-- | General. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Open source intelligence. |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst01739916 |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
655 #7 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
Source of term | lcgft |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Layton, Robert, |
Dates associated with a name | 1986- |
Relator term | editor. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Watters, Paul A., |
Relator term | editor. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | Layton, Robert. |
Title | Automating Open Source Intelligence : Algorithms for OSINT. |
Place, publisher, and date of publication | : Elsevier Science, �2015 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Syngress advanced topics in information security. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | ScienceDirect |
Uniform Resource Identifier | http://www.sciencedirect.com/science/book/9780128029169 |
No items available.