Books > Social sciences > Sociology, social studies > Emergency services > Police & security services
|
Buy Now
Intelligence and Security Informatics - Techniques and Applications (Hardcover, 2008 ed.)
Loot Price: R4,363
Discovery Miles 43 630
You Save: R1,413
(24%)
|
|
Intelligence and Security Informatics - Techniques and Applications (Hardcover, 2008 ed.)
Series: Studies in Computational Intelligence, 135
Expected to ship within 12 - 17 working days
|
The IEEE International Conference on Intelligence and Security
Informatics (ISI) and Pacific Asia Workshop on Intelligence and
Security Informatics (PAISI) conference series (http: //www.
isiconference. org) have drawn significant attention in the recent
years. Intelligence and Security Informatics is concerned with the
study of the dev- opment and use of advanced information
technologies and systems for national, int- national, and societal
security-related applications. The ISI conference series have
brought together academic researchers, law enforcement and
intelligence experts, - formation technology consultant and
practitioners to discuss their research and pr- tice related to
various ISI topics including ISI data management, data and text
mining for ISI applications, terrorism informatics, deception and
intent detection, terrorist and criminal social network analysis,
public health and bio-security, crime analysis, -
ber-infrastructure protection, transportation infrastructure
security, policy studies and evaluation, information assurance,
among others. In this book, we collect the work of the most active
researchers in the area. Topics include data and text mining in
terr- ism, information sharing, social network analysis, Web-based
intelligence monitoring and analysis, crime data analysis,
infrastructure protection, deception and intent det- tion and more.
Scope and Organization The book is organized in four major areas.
The first unit focuses on the terrorism - formatics and data
mining. The second unit discusses the intelligence and crime
analysis. The third unit covers access control, infrastructure
protection, and privacy. The forth unit presents surveillance and
emergency response
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.