did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540692072

Intelligence and Security Informatics

by ;
  • ISBN13:

    9783540692072

  • ISBN10:

    354069207X

  • Format: Hardcover
  • Copyright: 2008-05-01
  • Publisher: Springer Verlag

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $249.99 Save up to $62.50
  • Buy Used
    $187.49
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

The book is organized in four major areas. The first unit focuses on the terrorism informatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The fourth unit presents surveillance and emergency response. Readers will find the book valuable and useful in their study or work, especially the ISI community. The researchers and practitioners in this community will continue to grow and share research findings to contribute to national safety around the world.

Table of Contents

Terrorism Informatics and Data Mining
Assured Information Sharing: Technologies, Challenges and Directionsp. 1
Automating Event Extraction for the Security Domainp. 17
Knowledge Discovery and Information Visualization for Terrorist Social Networksp. 45
Understanding the Nexus of Terrorist Web Sitesp. 65
Multi-lingual Detection of Web Terrorist Contentp. 79
Modeling Anticipatory Event Transitionsp. 97
Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwanp. 121
Intelligence and Crime Analysis
Identifying Interesting Networks of Criminal Activityp. 135
Name Matching in Law Enforcement Databasep. 151
Discovering Investigation Clues through Mining Criminal Databasesp. 173
Automated Filtering on Data Streaming for Intelligence Analysisp. 199
Personal Information Management for Intelligence Tasksp. 215
A Data Miner's Approach to Country Corruption Analysisp. 227
Access Control, Infrastructure Protection and Privacy
Protecting Private Information in Online Social Networksp. 249
Protection of Database Security Via Collaborative Inference Detectionp. 275
Suspect Vehicle Identification for Border Safetyp. 305
Optimization Problems for Port-of-Entry Detection Systemsp. 319
Modeling and Validation of Aviation Securityp. 337
Surveillance and Emergency Response
Anomaly Detection in Moving Objectp. 357
Intelligent Face Recognitionp. 383
Video Analysis of Vehicles and Persons for Surveillancep. 407
Video-Based Deception Detectionp. 425
Subject Indexp. 443
Author Indexp. 449
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program