Using Social Media for Global Security
By Ravi Gupta and Hugh Brooks
()
Currently unavailable
Currently unavailable
About this ebook
Essential reading for cybersecurity professionals, securityanalysts, policy experts, decision-makers, activists, and lawenforcement!
During the Arab Spring movements, the world witnessed the powerof social media to dramatically shape events. Now this timely bookshows government decision-makers, security analysts, and activistshow to use the social world to improve security locally,nationally, and globally--and cost-effectively. Authored by twotechnology/behavior/security professionals, Using Social Mediafor Global Security offers pages of instruction and detail oncutting-edge social media technologies, analyzing social mediadata, and building crowdsourcing platforms.
The book teaches how to collect social media data and analyze itto map the social networks of terrorists and sex traffickers, andforecast attacks and famines. You will learn how to coalescecommunities through social media to help catch murderers,coordinate disaster relief, and collect intelligence about drugsmuggling from hard-to-reach areas. Also highlighting dramatic casestudies drawn from the headlines, this crucial book is amust-read.
- Illustrates linguistic, correlative, and network analysis ofOSINT
- Examines using crowdsourcing technologies to work and engagewith populations globally to solve security problems
- Explores how to ethically deal with social media data withoutcompromising people’s rights to privacy and freedom ofexpression
- Shows activists fighting against oppressive regimes how theycan protect their identities online
If you're responsible for maintaining local, national or globalsecurity, you'll want to read Using Social Media for GlobalSecurity.
Related to Using Social Media for Global Security
Related ebooks
CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsRootkits For Dummies Rating: 0 out of 5 stars0 ratingsStrategies for Protecting National Critical Infrastructure Assets: A Focus on Problem-Solving Rating: 0 out of 5 stars0 ratingsTribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity Rating: 0 out of 5 stars0 ratingsCrowdfund Investing For Dummies Rating: 0 out of 5 stars0 ratingsWe Have Root: Even More Advice from Schneier on Security Rating: 5 out of 5 stars5/5Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code Rating: 0 out of 5 stars0 ratingsAVIEN Malware Defense Guide for the Enterprise Rating: 0 out of 5 stars0 ratingsIT Disaster Recovery Planning For Dummies Rating: 2 out of 5 stars2/5CompTIA CySA+ Practice Tests: Exam CS0-003 Rating: 1 out of 5 stars1/5RFID For Dummies Rating: 4 out of 5 stars4/5Steps to Safety Culture Excellence Rating: 0 out of 5 stars0 ratingsThe Official (ISC)2 Guide to the CISSP CBK Reference Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide: Exam SY0-501 Rating: 4 out of 5 stars4/5CompTIA Security+ Practice Tests: Exam SY0-501 Rating: 0 out of 5 stars0 ratingsSSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide: Exam 500-285 Rating: 0 out of 5 stars0 ratingsOnline Security for the Business Traveler Rating: 0 out of 5 stars0 ratingsCEH v9: Certified Ethical Hacker Version 9 Study Guide Rating: 0 out of 5 stars0 ratingsThe Designer's Guide to Doing Research: Applying Knowledge to Inform Design Rating: 5 out of 5 stars5/5International Finance For Dummies Rating: 0 out of 5 stars0 ratingsActive Shooter: Preparing for and Responding to a Growing Threat Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 4 out of 5 stars4/5Cybersecurity Program Development for Business: The Essential Planning Guide Rating: 0 out of 5 stars0 ratingsThe Extended Reality Blueprint: Demystifying the AR/VR Production Process Rating: 0 out of 5 stars0 ratingsThe Maker Revolution: Building a Future on Creativity and Innovation in an Exponential World Rating: 0 out of 5 stars0 ratingsBuild a Security Culture Rating: 0 out of 5 stars0 ratingsThe Mac Hacker's Handbook Rating: 0 out of 5 stars0 ratingsSecurity 2020: Reduce Security Risks This Decade Rating: 0 out of 5 stars0 ratingsPersonal Safety and Security Playbook: Risk Mitigation Guidance for Individuals, Families, Organizations, and Communities Rating: 0 out of 5 stars0 ratings
Security For You
How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsMike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratings(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws Rating: 3 out of 5 stars3/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Real-World Cryptography Rating: 4 out of 5 stars4/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5
Reviews for Using Social Media for Global Security
0 ratings0 reviews