0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (1)
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

Mathematical Methods in Counterterrorism (Paperback, 2009 ed.): Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben... Mathematical Methods in Counterterrorism (Paperback, 2009 ed.)
Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben Rosenorn
R4,519 Discovery Miles 45 190 Ships in 10 - 15 working days

Terrorism is one of the serious threats to international peace and security that we face in this decade. No nation can consider itself immune from the dangers it poses, and no society can remain disengaged from the efforts to combat it. The termcounterterrorism refers to the techniques, strategies, and tactics used in the ?ght against terrorism. Counterterrorism efforts involve many segments of so- ety, especially governmental agencies including the police, military, and intelligence agencies (both domestic and international). The goal of counterterrorism efforts is to not only detect and prevent potential future acts but also to assist in the response to events that have already occurred. A terrorist cell usually forms very quietly and then grows in a pattern - sp- ning international borders, oceans, and hemispheres. Surprising to many, an eff- tive "weapon", just as quiet - mathematics - can serve as a powerful tool to combat terrorism, providing the ability to connect the dots and reveal the organizational pattern of something so sinister. The events of 9/11 instantly changed perceptions of the wordsterrorist andn- work, especially in the United States. The international community was confronted with the need to tackle a threat which was not con?ned to a discreet physical - cation. This is a particular challenge to the standard instruments for projecting the legal authority of states and their power to uphold public safety. As demonstrated by the events of the 9/11 attack, we know that terrorist attacks can happen anywhere.

Mathematical Methods in Counterterrorism (Hardcover, 2009 ed.): Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben... Mathematical Methods in Counterterrorism (Hardcover, 2009 ed.)
Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben Rosenorn
R4,552 Discovery Miles 45 520 Ships in 10 - 15 working days

Terrorism is one of the serious threats to international peace and security that we face in this decade. No nation can consider itself immune from the dangers it poses, and no society can remain disengaged from the efforts to combat it. The termcounterterrorism refers to the techniques, strategies, and tactics used in the ?ght against terrorism. Counterterrorism efforts involve many segments of so- ety, especially governmental agencies including the police, military, and intelligence agencies (both domestic and international). The goal of counterterrorism efforts is to not only detect and prevent potential future acts but also to assist in the response to events that have already occurred. A terrorist cell usually forms very quietly and then grows in a pattern - sp- ning international borders, oceans, and hemispheres. Surprising to many, an eff- tive "weapon," just as quiet - mathematics - can serve as a powerful tool to combat terrorism, providing the ability to connect the dots and reveal the organizational pattern of something so sinister. The events of 9/11 instantly changed perceptions of the wordsterrorist andn- work, especially in the United States. The international community was confronted with the need to tackle a threat which was not con?ned to a discreet physical - cation. This is a particular challenge to the standard instruments for projecting the legal authority of states and their power to uphold public safety. As demonstrated by the events of the 9/11 attack, we know that terrorist attacks can happen anywhere.

Intelligence and Security Informatics - European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings... Intelligence and Security Informatics - European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings (Paperback, 2008 ed.)
Daniel Ortiz-Arroyo, Henrik Legind Larsen, Daniel Zeng, David L. Hicks, Gerhard Wagner
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This volume constitutes the proceedings of the First European Conference on Intelligence and Security Informatics, EuroISI 2008, held in Esbjerg Denmark, December 3-5, 2008. Intelligence and security informatics (ISI) is a multidisciplinary ?eld enc- passing methodologies, models, algorithms, and advanced tools for intelligence analysis, homeland security, terrorism research as well as security-related public policies. EuroISI 2008 was the ?rst European edition of the series of ISI sym- siums that have been held annually in the USA since 2003, and more recently in Asia. These meetings gather together people from previously disparate c- munities to provide a stimulating forum for the exchange of ideas and results. Participantshave included academic researchers(especially in the ?elds of inf- mation technologies, computer science, public policy, and social and behavioral studies), law enforcement and intelligence experts, as well as information te- nology companies, industry consultants and practitioners in the relevant ?elds. These proceedings contain 25 originalpapers, out of 48 submissions received, related to the topics of intelligence and security informatics. The papers cover a broad range of ?elds such as: social network analysis, knowledge discovery, web-based intelligence and analysis, privacy protection, access control, digital rights management, malware and intrusion detection, surveillance, crisis m- agement, andcomputationalintelligence, amongothers.Additionallytothemain conference, a poster section was organize

Metainformatics - International Symposium, MIS 2003, Graz, Austria, September 17-20, 2003, Revised Papers (Paperback, 2004... Metainformatics - International Symposium, MIS 2003, Graz, Austria, September 17-20, 2003, Revised Papers (Paperback, 2004 ed.)
David L. Hicks
R1,615 Discovery Miles 16 150 Ships in 10 - 15 working days

This volume contains the ?nal proceedings of the MetaInformatics Symposium 2003 (MIS 2003). The event was held September 17 20 on the campus of the Graz University of Technology in Graz, Austria. As with previous events in the MIS series, MIS 2003 brought together - searchers and practitioners from a wide variety of ?elds to discuss a broad range of topics and ideas related to the ?eld of computer science. The contributions that were accepted to and presented at the symposium are of a wide variety. Theyrangefromtheoreticalconsiderationsofimportantmetainformatics-related questions and issues to practical descriptions of approaches and systems that - fer assistance in their resolution. I hope you will ?nd the papers contained in this volume as interesting as the other members of the program committee and Ihave. These proceedings would not have been possible without the help and ass- tance of many people. In particular I would like to acknowledge the assistance of Springer-Verlag in Heidelberg, Germany, especially Anna Kramer, the computer science editor, and Alfred Hofmann, the executive editor for the LNCS series."

Data Mining for Social Network Data (Paperback, 2010): Nasrullah Memon, Jennifer Jie Xu, David L. Hicks, Hsinchun Chen Data Mining for Social Network Data (Paperback, 2010)
Nasrullah Memon, Jennifer Jie Xu, David L. Hicks, Hsinchun Chen
R3,576 R2,097 Discovery Miles 20 970 Save R1,479 (41%) Ships in 9 - 15 working days

Driven by counter-terrorism efforts, marketing analysis and an explosion in online social networking in recent years, data mining has moved to the forefront of information science. This proposed Special Issue on Data Mining for Social Network Data will present a broad range of recent studies in social networking analysis. It will focus on emerging trends and needs in discovery and analysis of communities, solitary and social activities, activities in open for a and commercial sites as well. It will also look at network modeling, infrastructure construction, dynamic growth and evolution pattern discovery using machine learning approaches and multi-agent based simulations. Editors are three rising stars in world of data mining, knowledge discovery, social network analysis, and information infrastructures, and are anchored by Springer author/editor Hsinchun Chen (Terrorism Informatics; Medical Informatics; Digital Government), who is one of the most prominent intelligence analysis and data mining experts in the world.

Some Assembly Required (Paperback): David L. Hicks Some Assembly Required (Paperback)
David L. Hicks
R391 R322 Discovery Miles 3 220 Save R69 (18%) Ships in 10 - 15 working days
Fish'n Naked (Paperback): David L. Hicks Fish'n Naked (Paperback)
David L. Hicks
R267 R221 Discovery Miles 2 210 Save R46 (17%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Flash
Ezra Miller, Michael Keaton, … DVD R264 Discovery Miles 2 640
Poor Things
Emma Stone, Mark Ruffalo, … DVD R449 R329 Discovery Miles 3 290
Sudocrem Skin & Baby Care Barrier Cream…
R210 Discovery Miles 2 100
Tommy EDC Spray for Men (30ml…
R479 Discovery Miles 4 790
Cellphone Ring & Stand [Black]
R22 Discovery Miles 220
Cricut Joy Machine
 (6)
R3,787 Discovery Miles 37 870
Snappy Tritan Bottle (1.5L)(Blue)
R229 R179 Discovery Miles 1 790
Mediabox NEO TV Stick (Black) - Netflix…
R1,189 Discovery Miles 11 890
Bibby's - More Good Food
Dianne Bibby Hardcover R480 R340 Discovery Miles 3 400
Birds Of Greater Southern Africa
Keith Barnes, Terry Stevenson, … Paperback  (5)
R450 R299 Discovery Miles 2 990

 

Partners