<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>     cam a22        4500</leader>
  <controlfield tag="001">528871129</controlfield>
  <controlfield tag="003">CHVBK</controlfield>
  <controlfield tag="005">20201014111126.0</controlfield>
  <controlfield tag="006">m        d        </controlfield>
  <controlfield tag="007">cr |n ||||||||</controlfield>
  <controlfield tag="008">170308s2016    ne a    sb    001 0 eng d</controlfield>
  <datafield tag="010" ind1=" " ind2=" ">
   <subfield code="a">  2017288169</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">978-0-12-802916-9</subfield>
   <subfield code="q">(paperback)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">0-12-802916-1</subfield>
   <subfield code="q">(paperback)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="z">978-0-12-802917-6 (PDF ebook)</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(SERSOL)ssj0001777174</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(WaSeSS)ssj0001777174</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">VYR</subfield>
   <subfield code="b">eng</subfield>
   <subfield code="c">VYR</subfield>
   <subfield code="d">OCLCO</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">YDXCP</subfield>
   <subfield code="d">BTCTA</subfield>
   <subfield code="d">MUU</subfield>
   <subfield code="d">OCLCF</subfield>
   <subfield code="d">CDX</subfield>
   <subfield code="d">BDX</subfield>
   <subfield code="d">IG$</subfield>
   <subfield code="d">AU@</subfield>
   <subfield code="d">DLC</subfield>
   <subfield code="d">WaSeSS</subfield>
   <subfield code="e">rda</subfield>
  </datafield>
  <datafield tag="050" ind1="0" ind2="0">
   <subfield code="a">JF1525.I6</subfield>
   <subfield code="b">A88 2016</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="0">
   <subfield code="a">Automating open source intelligence</subfield>
   <subfield code="b">algorithms for OSINT</subfield>
   <subfield code="c">edited by Robert Layton, Paul A. Watters</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
   <subfield code="a">Amsterdam</subfield>
   <subfield code="a">Boston</subfield>
   <subfield code="b">Elsevier/Syngress</subfield>
   <subfield code="c">[2016]</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="4">
   <subfield code="c">©2016</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource (x, 211 pages)</subfield>
   <subfield code="b">illustrations</subfield>
  </datafield>
  <datafield tag="336" ind1=" " ind2=" ">
   <subfield code="a">text</subfield>
   <subfield code="b">txt</subfield>
   <subfield code="2">rdacontent/eng</subfield>
  </datafield>
  <datafield tag="337" ind1=" " ind2=" ">
   <subfield code="a">computer</subfield>
   <subfield code="b">c</subfield>
   <subfield code="2">rdamedia/eng</subfield>
  </datafield>
  <datafield tag="338" ind1=" " ind2=" ">
   <subfield code="a">online resource</subfield>
   <subfield code="b">cr</subfield>
   <subfield code="2">rdacarrier/eng</subfield>
  </datafield>
  <datafield tag="490" ind1="0" ind2=" ">
   <subfield code="a">Syngress Advanced Topics in Information Security</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
   <subfield code="a">Includes bibliographical references and index.</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">Machine generated contents note: ch. 1 The Automating of Open Source Intelligence / Agate M. Ponder-Sutton -- The commercial angle -- Algorithms -- References -- ch. 2 Named Entity Resolution in Social Media / Paul A. Watters -- Introduction -- Discussion -- References -- ch. 3 Relative Cyberattack Attribution / Robert Layton -- Introduction -- Basic attack structure -- Anonymization on the internet -- Weaknesses in anonymization -- Attribution as a concept -- Absolute attribution -- Relative attribution -- Relative attribution concepts -- Inherent versus learnt behaviors -- Hiding behavior -- Consistency of behavior -- Relative attribution techniques -- Authorship analysis -- Limitations and issues -- Research streams -- Conclusions -- References -- ch. 4 Enhancing Privacy to Defeat Open Source Intelligence / Jason Smith -- Introduction -- Requirements and threats -- Preliminaries -- The PIEMCP -- Formal security analysis with CPN -- Performance analysis of FSSO-PIEMC --</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">Note continued: Conclusion and future work -- References -- ch. 5 Preventing Data Exfiltration: Corporate Patterns and Practices / Brenda Chawner -- What is happening around the world? -- What is happening in New Zealand? -- Specifying the problem -- Problems arising by implementing censorship -- So, what should be done? -- Summary -- References -- ch. 6 Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground / Paul A. Watters -- Introduction -- Advertising and risk -- The digital millennium copyright act (DMCA) -- Chilling effects database -- Google transparency report -- Mainstream advertising and how piracy is funded -- High-risk advertising and their links to piracy websites -- High-risk advertising: Case studies in Canada -- High-risk advertising: Case studies in Australia -- High-risk advertising: Case studies in New Zealand -- Research challenges -- References --</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">Note continued: ch. 7 Graph Creation and Analysis for Linking Actors: Application to Social Data / Rony Germon -- Introduction -- The social network model -- Graph creation techniques -- Graph analysis for OSINT -- Twitter case study -- Conclusion -- References -- ch. 8 Ethical Considerations When Using Online Datasets for Research Purposes / Jim Sillitoe -- Introduction -- Existing guidelines -- Interpretation of existing guidelines for online purposes -- The three proposed principles applied to online research -- Autonomy -- Obtaining consent -- Benefits against risks -- Justice -- Summary -- References -- ch. 9 The Limitations of Automating OSINT: Understanding the Question, Not the Answer / George R.S. Weir -- Introduction -- Finding answers to questions -- Credibility and the quality of results -- Relevance -- The limitations of automating osint -- Conclusions -- References -- ch. 10 Geospatial Reasoning With Open Data / Hans Guesgen -- Introduction --</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">Note continued: The open geospatial data environment -- Review of reasoning methods with geospatial data -- Case studies in geospatial reasoning -- Conclusions -- References.</subfield>
  </datafield>
  <datafield tag="506" ind1=" " ind2=" ">
   <subfield code="a">Lizenzbedingungen können den Zugang einschränken. License restrictions may limit access.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Open source intelligence</subfield>
   <subfield code="x">Data processing</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Intelligence service</subfield>
   <subfield code="x">Technological innovations</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Layton</subfield>
   <subfield code="D">Robert</subfield>
   <subfield code="d">1986-</subfield>
   <subfield code="e">editor</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Watters</subfield>
   <subfield code="D">Paul A.</subfield>
   <subfield code="e">editor</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="u">https://ebookcentral.proquest.com/lib/unibern/detail.action?docID=4186519</subfield>
   <subfield code="z">Uni Bern: Volltext</subfield>
  </datafield>
  <datafield tag="898" ind1=" " ind2=" ">
   <subfield code="a">BK020053</subfield>
   <subfield code="b">XK020053</subfield>
   <subfield code="c">XK020000</subfield>
  </datafield>
  <datafield tag="909" ind1=" " ind2="4">
   <subfield code="f">Ebook Central All Subscribed Titles</subfield>
  </datafield>
  <datafield tag="909" ind1=" " ind2="4">
   <subfield code="a">E-Books von 360MarcUpdates</subfield>
  </datafield>
  <datafield tag="949" ind1=" " ind2=" ">
   <subfield code="B">IDSBB</subfield>
   <subfield code="F">B405</subfield>
   <subfield code="b">B405</subfield>
   <subfield code="c">405VT</subfield>
   <subfield code="x">NELB4051809</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">IDSBB</subfield>
   <subfield code="P">490</subfield>
   <subfield code="E">0-</subfield>
   <subfield code="a">Syngress Advanced Topics in Information Security</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">IDSBB</subfield>
   <subfield code="P">700</subfield>
   <subfield code="E">1-</subfield>
   <subfield code="a">Layton</subfield>
   <subfield code="D">Robert</subfield>
   <subfield code="d">1986-</subfield>
   <subfield code="e">editor</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">IDSBB</subfield>
   <subfield code="P">700</subfield>
   <subfield code="E">1-</subfield>
   <subfield code="a">Watters</subfield>
   <subfield code="D">Paul A.</subfield>
   <subfield code="e">editor</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">IDSBB</subfield>
   <subfield code="P">856</subfield>
   <subfield code="E">40</subfield>
   <subfield code="u">https://ebookcentral.proquest.com/lib/unibern/detail.action?docID=4186519</subfield>
   <subfield code="z">Uni Bern: Volltext</subfield>
  </datafield>
  <datafield tag="986" ind1=" " ind2=" ">
   <subfield code="a">SWISSBIB</subfield>
   <subfield code="b">528871129</subfield>
  </datafield>
 </record>
</collection>
