0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Mathematical Methods in Counterterrorism (Hardcover, 2009 ed.): Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben... Mathematical Methods in Counterterrorism (Hardcover, 2009 ed.)
Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben Rosenorn
R4,069 Discovery Miles 40 690 Ships in 18 - 22 working days

Terrorism is one of the serious threats to international peace and security that we face in this decade. No nation can consider itself immune from the dangers it poses, and no society can remain disengaged from the efforts to combat it. The termcounterterrorism refers to the techniques, strategies, and tactics used in the ?ght against terrorism. Counterterrorism efforts involve many segments of so- ety, especially governmental agencies including the police, military, and intelligence agencies (both domestic and international). The goal of counterterrorism efforts is to not only detect and prevent potential future acts but also to assist in the response to events that have already occurred. A terrorist cell usually forms very quietly and then grows in a pattern - sp- ning international borders, oceans, and hemispheres. Surprising to many, an eff- tive "weapon," just as quiet - mathematics - can serve as a powerful tool to combat terrorism, providing the ability to connect the dots and reveal the organizational pattern of something so sinister. The events of 9/11 instantly changed perceptions of the wordsterrorist andn- work, especially in the United States. The international community was confronted with the need to tackle a threat which was not con?ned to a discreet physical - cation. This is a particular challenge to the standard instruments for projecting the legal authority of states and their power to uphold public safety. As demonstrated by the events of the 9/11 attack, we know that terrorist attacks can happen anywhere.

From Sociology to Computing in Social Networks - Theory, Foundations and Applications (Hardcover, Edition.): Nasrullah Memon,... From Sociology to Computing in Social Networks - Theory, Foundations and Applications (Hardcover, Edition.)
Nasrullah Memon, Reda Alhajj
R4,081 Discovery Miles 40 810 Ships in 18 - 22 working days

Important aspects of social networking analysis are covered in this work by combining experimental and theoretical research. A specific focus is devoted to emerging trends and the industry needs associated with utilizing data mining techniques. Some of the techniques covered include data mining advances in the discovery and analysis of communities, in the personalization of solitary activities (like searches) and social activities (like discovering potential friends), in the analysis of user behavior in open fora (like conventional sites, blogs and fora) and in commercial platforms (like e-auctions), and in the associated security and privacy-preservation challenges; as well as social network modeling, scalable, customizable social network infrastructure construction, and the identification and discovery of dynamic growth and evolution patterns using machine learning approaches or multi-agent based simulation. These topics will be of interest to practitioners and researchers alike in this dynamic and growing field.

Mathematical Methods in Counterterrorism (Paperback, 2009 ed.): Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben... Mathematical Methods in Counterterrorism (Paperback, 2009 ed.)
Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben Rosenorn
R4,041 Discovery Miles 40 410 Ships in 18 - 22 working days

Terrorism is one of the serious threats to international peace and security that we face in this decade. No nation can consider itself immune from the dangers it poses, and no society can remain disengaged from the efforts to combat it. The termcounterterrorism refers to the techniques, strategies, and tactics used in the ?ght against terrorism. Counterterrorism efforts involve many segments of so- ety, especially governmental agencies including the police, military, and intelligence agencies (both domestic and international). The goal of counterterrorism efforts is to not only detect and prevent potential future acts but also to assist in the response to events that have already occurred. A terrorist cell usually forms very quietly and then grows in a pattern - sp- ning international borders, oceans, and hemispheres. Surprising to many, an eff- tive "weapon", just as quiet - mathematics - can serve as a powerful tool to combat terrorism, providing the ability to connect the dots and reveal the organizational pattern of something so sinister. The events of 9/11 instantly changed perceptions of the wordsterrorist andn- work, especially in the United States. The international community was confronted with the need to tackle a threat which was not con?ned to a discreet physical - cation. This is a particular challenge to the standard instruments for projecting the legal authority of states and their power to uphold public safety. As demonstrated by the events of the 9/11 attack, we know that terrorist attacks can happen anywhere.

Data Mining for Social Network Data (Paperback, 2010): Nasrullah Memon, Jennifer Jie Xu, David L. Hicks, Hsinchun Chen Data Mining for Social Network Data (Paperback, 2010)
Nasrullah Memon, Jennifer Jie Xu, David L. Hicks, Hsinchun Chen
R2,701 Discovery Miles 27 010 Ships in 18 - 22 working days

Driven by counter-terrorism efforts, marketing analysis and an explosion in online social networking in recent years, data mining has moved to the forefront of information science. This proposed Special Issue on Data Mining for Social Network Data will present a broad range of recent studies in social networking analysis. It will focus on emerging trends and needs in discovery and analysis of communities, solitary and social activities, activities in open for a and commercial sites as well. It will also look at network modeling, infrastructure construction, dynamic growth and evolution pattern discovery using machine learning approaches and multi-agent based simulations. Editors are three rising stars in world of data mining, knowledge discovery, social network analysis, and information infrastructures, and are anchored by Springer author/editor Hsinchun Chen (Terrorism Informatics; Medical Informatics; Digital Government), who is one of the most prominent intelligence analysis and data mining experts in the world.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Being Black - A South African Story That…
Theo Mayekiso Paperback R305 Discovery Miles 3 050
Ethics in Information Technology
George Reynolds Paperback R1,245 R1,160 Discovery Miles 11 600
1 Recce: Volume 3 - Onsigbaarheid Is Ons…
Alexander Strachan Paperback R380 R339 Discovery Miles 3 390
Kismet Hacking
Frank Thornton, Michael J. Schearer, … Paperback R1,154 Discovery Miles 11 540
Exploring Personal Genomics
Joel T. Dudley, Konrad J. Karczewski Hardcover R4,218 Discovery Miles 42 180
Prisoner 913 - The Release Of Nelson…
Riaan de Villiers, Jan-Ad Stemmet Paperback R542 Discovery Miles 5 420
Nautilus - The Biology and Paleobiology…
W. Bruce Saunders, Neil Landman Hardcover R5,306 Discovery Miles 53 060
Better Choices - Ensuring South Africa's…
Greg Mills, Mcebisi Jonas, … Paperback R350 R317 Discovery Miles 3 170
Freezing Order - A True Story Of Russian…
Bill Browder Paperback  (4)
R344 Discovery Miles 3 440
Turning tide - The settlement beyond the…
Rune Odegaard Hardcover R882 Discovery Miles 8 820

 

Partners