did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781586038489

Security Informatics and Terrorism

by ; ;
  • ISBN13:

    9781586038489

  • ISBN10:

    1586038486

  • Format: Hardcover
  • Copyright: 2008-06-15
  • Publisher: Ios Pr Inc

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $161.00 Save up to $53.93
  • Rent Book $107.07
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    IN STOCK USUALLY SHIPS IN 24 HOURS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

This work is intended to be of interest to counter-terrorism experts and professionals, to academic researchers in information systems, computer science, political science and public policy, and to graduate students in these areas. The goal of this book is to highlight several aspects of patrolling the Web that were raised and discussed by experts from different disciplines. The book includes academic studies from related technical fields, namely, computer science and information technology, the strategic point of view as presented by intelligence experts, and finally the practical point of view by experts from related industry describing lessons learned from practical efforts to tackle these problems. This volume is organized into four major parts: definition and analysis of the subject, data-mining techniques for terrorism informatics, other theoretical methods to detect terrorists on the Web, and practical relevant industrial experience on patrolling the Web.

Table of Contents

Editors' Introduction
The Social and Political Environment
The Internet and Terrorismp. 3
Understanding International "Cyberterrorism": A Law Enforcement Perspectivep. 8
Global Threats - Local Challenges. Current Issues of Intelligence Tasking and Coordination in the Rapidly Changing Threat Environmentp. 17
Cybercrime and Cyberterrorism as a New Security Threatp. 20
The Enemy Within: Where Are the Islamist/Jihadist Websites Hosted, and What Can Be Done About It?p. 26
Discovering Hidden Patterns of Activity
Mining Users' Web Navigation Patterns and Predicting Their Next Stepp. 45
Data Mining for Security and Crime Detectionp. 56
Enhancement to the Advanced Terrorist Detection System (ATDS)p. 71
Discovering Hidden Groups in Communication Networksp. 82
Knowledge Discovery in Texts and Images
Authorship Attribution in Law Enforcement Scenariosp. 111
Bayesian Models, Prior Knowledge, and Data Fusion for Monitoring Messages and Identifying Actorsp. 120
Entity and Relation Extraction in Texts with Semi-Supervised Extensionsp. 132
Data Compression Models for Prediction and Classificationp. 142
Security Informatics in Complex Documentsp. 156
Visual Recognition: How Can We Learn Complex Models?p. 166
Approaches for Learning Classifiers of Drifting Conceptsp. 176
Some Contemporary Technologies and Applications
Techno-Intelligence Signatures Analysisp. 193
Web Harvesting Intelligent Anti-Terror System - Technology and Methodologyp. 202
How to Protect Critical Infrastructure from Cyber-Terrorist Attacksp. 224
Conference Participantsp. 233
Author Indexp. 237
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program