Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security [NOOK Book]

Overview

A groundbreaking exploration of how to identify and fight security threats at every level

This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with intelligence officer experience who invented the technology, it explores the keys to understanding the dark side of human nature, various types of security threats (current and ...

See more details below
Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security

Available on NOOK devices and apps  
  • NOOK Devices
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK Study
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$31.49
BN.com price
(Save 42%)$54.99 List Price
Note: This NOOK Book can be purchased in bulk. Please email us for more information.

Overview

A groundbreaking exploration of how to identify and fight security threats at every level

This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with intelligence officer experience who invented the technology, it explores the keys to understanding the dark side of human nature, various types of security threats (current and potential), and how to construct a methodology to predict and combat malicious behavior. The companion CD demonstrates available detection and prediction systems and presents a walkthrough on how to conduct a predictive analysis that highlights proactive security measures.

  • Guides you through the process of predicting malicious behavior, using real world examples and how malicious behavior may be prevented in the future
  • Illustrates ways to understand malicious intent, dissect behavior, and apply the available tools and methods for enhancing security
  • Covers the methodology for predicting malicious behavior, how to apply a predictive methodology, and tools for predicting the likelihood of domestic and global threats
  • CD includes a series of walkthroughs demonstrating how to obtain a predictive analysis and how to use various available tools, including Automated Behavior Analysis

Predicting Malicious Behavior fuses the behavioral and computer sciences to enlighten anyone concerned with security and to aid professionals in keeping our world safer.

Read More Show Less

Product Details

  • ISBN-13: 9781118239568
  • Publisher: Wiley
  • Publication date: 5/25/2012
  • Sold by: Barnes & Noble
  • Format: eBook
  • Edition number: 1
  • Pages: 528
  • File size: 10 MB

Meet the Author

Gary M. Jackson is an Assistant Vice President and Technical Lead within Cyber Operations at Science Applications International Corporation (SAIC). He is the inventor of the CheckMate intrusion protection system and automated behavior analysis (AuBA) methods and tools for predicting malicious behavior. As a former CIA intelligence officer, he has a unique behavior analysis perspective. He has also designed applications for the Secret Service and CIA.

Read More Show Less

Table of Contents

Foreword xxvii

Introduction xxix

Part I Understanding the Dark Side: Malicious Intent 1

Chapter 1 Analyzing the Malicious Individual 3

Chapter 2 Analyzing the Malicious Group 35

Chapter 3 Analyzing Country-Level Threats 63

Chapter 4 Threats and Security Nightmares: Our Current Reactive State of Security 91

Chapter 5 Current Network Security 113

Chapter 6 Future Threats to Our National Security 137

Part II Dissecting Malicious Behavior 161

Chapter 7 Applying Behavior Principles: Predicting Individual Malicious Behavior 163

Chapter 8 Applying Behavior Principles: Predicting Group Malicious Behavior 183

Chapter 9 Applying a Predictive Methodology: From Principles to Practice 203

Chapter 10 Predicting Domestic Threat 231

Chapter 11 Computer Networks: Protection from External Threat 255

Chapter 12 Computer Networks: Protection from Internal Threat 277

Chapter 13 Predicting Global Threat 299

Part III Applying Tools and Methods 329

Chapter 14 Predictive Capability in Software: Tools for a New Approach 331

Chapter 15 Predictive Behavioral Modeling: Automated Tools of the Trade 357

Chapter 16 Developing AuBA Applications 383

Chapter 17 Mastering AuBA Tools for Real-World Use 405

Chapter 18 Analyzing Future Malicious Behavior 425

Part IV Predicting Malicious Behavior: Tools and Methods to Support a Paradigm Shift in Security 449

Chapter 19 AuBA Future Extensions Today 451

Chapter 20 How to Predict Malicious Behavior: A Walkthrough 471

Appendix What's on the DVD? 497

Index 501

Read More Show Less

Customer Reviews

Average Rating 5
( 1 )
Rating Distribution

5 Star

(1)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Posted July 1, 2012

    The book is excellent, with clarity, content, and the informatio

    The book is excellent, with clarity, content, and the information presented is easy reading.  The behavioral concepts and technology are clearly explained.  Each chapter builds on the knowledge base with clear descriptions of  individual, group, domestic, global considerations, example variables, and case analysis integrating the technical fields of computer science, internet, and behavior analysis.    
    Dr. Jackson points out in this book, the methods he presents are applicable to increase appropriate social behavior as well as  the prediction of malicious behavior.   Dr Jackson has taken the  technology to the next level as stated by Dr. Cole  and i am so thankful Dr. Jackson was cleared to release his work.   I have always contended that the  disabled of our society will benefit  with the release of new technology, and advances in medical and behavioral science.
     I encourage professionals learn to apply Dr. Jacksons work  in the fields of psychology, neurology, psychiatry, medicine and law enforcement.   The analytic approaches described in this book provide a method for  precise individual analysis, group analysis, and modification of physical and social environments  to strengthen, maintain adaptive skills and positive behavior. Additionally the technology is more precise in identifying  factors  which  may not appear significant, but  actually encourage  or maintain difficult long term maladaptive, malicious behavior, and mental illness.   Dr Jackson's methods offer technology and direction to the professionals who are working to protect our nation, citizens, and additionally to clinical therapist.   
     In conclusion Dr. Jacksons  technology and analysis will demonstrate which clinical treatments are the factor having a significant positive effect on someones life, and in the national/ global setting,  predict and signal intervention to  protect our  citizens, nation from criminal actions within our borders, and globally.
    This opinion offered with Respect and Honor to the author
    Charles J. Antonelli

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)