David L. Hicks - Böcker
Visar alla böcker från författaren David L. Hicks. Handla med fri frakt och snabb leverans.
5 produkter
5 produkter
1 064 kr
Skickas inom 10-15 vardagar
Driven by counter-terrorism efforts, marketing analysis and an explosion in online social networking in recent years, data mining has moved to the forefront of information science. This proposed Special Issue on Data Mining for Social Network Data will present a broad range of recent studies in social networking analysis.
1 577 kr
Skickas inom 10-15 vardagar
Terrorism is one of the serious threats to international peace and security that we face in this decade. No nation can consider itself immune from the dangers it poses, and no society can remain disengaged from the efforts to combat it. The termcounterterrorism refers to the techniques, strategies, and tactics used in the ?ght against terrorism. Counterterrorism efforts involve many segments of so- ety, especially governmental agencies including the police, military, and intelligence agencies (both domestic and international). The goal of counterterrorism efforts is to not only detect and prevent potential future acts but also to assist in the response to events that have already occurred. A terrorist cell usually forms very quietly and then grows in a pattern – sp- ning international borders, oceans, and hemispheres. Surprising to many, an eff- tive “weapon”, just as quiet – mathematics – can serve as a powerful tool to combat terrorism, providing the ability to connect the dots and reveal the organizational pattern of something so sinister. The events of 9/11 instantly changed perceptions of the wordsterrorist andn- work, especially in the United States. The international community was confronted with the need to tackle a threat which was not con?ned to a discreet physical - cation. This is a particular challenge to the standard instruments for projecting the legal authority of states and their power to uphold public safety. As demonstrated by the events of the 9/11 attack, we know that terrorist attacks can happen anywhere.
Metainformatics
International Symposium, MIS 2003, Graz, Austria, September 17-20, 2003, Revised Papers
Häftad, Engelska, 2004
551 kr
Skickas inom 10-15 vardagar
This book constitutes the thoroughly refereed post-proceedings of the Metainformatics Symposium, MIS 2003, held in Graz, Austria in September 2003.The 17 revised papers presented were carefully reviewed and selected for inclusion in the book. The topics addressed span the entire range from theoretical considerations of important metainformatics related questions and issues to practical descriptions of approaches and systems that offer assistance in their resolution.
Intelligence and Security Informatics
European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings
Häftad, Engelska, 2008
551 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the First European Conference on Intelligence and Security Informatics, EuroISI 2008, held in Esbjerg, Denmark, in December 2008. The 23 revised full papers and 2 revised poster papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on criminal and social network analysis, intelligence analysis and knowledge discovery, Web-based intelligence monitoring and analysis, privacy protection, access control, and digital rights management, malware and intrusion detection, as well as surveillance and crisis management.
1 577 kr
Skickas inom 10-15 vardagar
Surprising to many, an eff- tive “weapon”, just as quiet – mathematics – can serve as a powerful tool to combat terrorism, providing the ability to connect the dots and reveal the organizational pattern of something so sinister.