What is included with this book?
Framing Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong Movement | p. 1 |
Patterns of Word Use for Deception in Testimony | p. 25 |
Information Integration for Terrorist or Criminal Social Networks | p. 41 |
Processing Constrained k-Closest Pairs Queries in Crime Databases | p. 59 |
Emergency Response Through Higher Order Voronoi Diagrams | p. 77 |
Identity Management Architecture | p. 97 |
A Game Theoretic Framework for Multi-agent Deployment in Intrusion Detection Systems | p. 117 |
ETKnet: A Distributed Network System for Sharing Event Data and Multi-faceted Knowledge in a Collaboration Federation | p. 135 |
Duplicate Work Reduction in Business Continuity and Risk Management Processes | p. 155 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.