did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781441913241

Security Informatics

by ; ; ;
  • ISBN13:

    9781441913241

  • ISBN10:

    1441913246

  • Format: Paperback
  • Copyright: 2009-11-24
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $169.00 Save up to $135.59
  • Digital
    $72.39
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. ISI topics include ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, and other related topics. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners. SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field; the volume will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics. The volume features high-quality contributions from worldwide leading experts across a variety of discipline domains. Each contribution follows a uniform structure and has undergone a thorough peer-review process.

Table of Contents

Framing Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong Movementp. 1
Patterns of Word Use for Deception in Testimonyp. 25
Information Integration for Terrorist or Criminal Social Networksp. 41
Processing Constrained k-Closest Pairs Queries in Crime Databasesp. 59
Emergency Response Through Higher Order Voronoi Diagramsp. 77
Identity Management Architecturep. 97
A Game Theoretic Framework for Multi-agent Deployment in Intrusion Detection Systemsp. 117
ETKnet: A Distributed Network System for Sharing Event Data and Multi-faceted Knowledge in a Collaboration Federationp. 135
Duplicate Work Reduction in Business Continuity and Risk Management Processesp. 155
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program