000 03729nam a22005655i 4500
001 u371312
003 SIRSI
005 20160812080121.0
007 cr nn 008mamaa
008 100301s2010 xxu| s |||| 0|eng d
020 _a9781441913258
_9978-1-4419-1325-8
040 _cMX-MeUAM
050 4 _aQA76.9.A25
082 0 4 _a005.8
_223
100 1 _aYang, Christopher C.
_eeditor.
245 1 0 _aSecurity Informatics
_h[recurso electrónico] /
_cedited by Christopher C. Yang, Michael Chau, Jau-Hwang Wang, Hsinchun Chen.
264 1 _aBoston, MA :
_bSpringer US,
_c2010.
300 _aVI, 206p. 120 illus., 60 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAnnals of Information Systems,
_x1934-3221 ;
_v9
505 0 _aFraming Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong Movement -- Patterns of Word Use for Deception in Testimony -- Information Integration for Terrorist or Criminal Social Networks -- Processing Constrained k-Closest Pairs Queries in Crime Databases -- What-If Emergency Response Through Higher Order Voronoi Diagrams -- Identity Management Architecture -- A Game Theoretic Framework for Multi-agent Deployment in Intrusion Detection Systems -- ETKnet: A Distributed Network System for Sharing Event Data and Multi-faceted Knowledge in a Collaboration Federation -- Duplicate Work Reduction in Business Continuity and Risk Management Processes.
520 _aIntelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners. SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field and will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics.
650 0 _aComputer science.
650 0 _aComputer network architectures.
650 0 _aData protection.
650 0 _aData mining.
650 0 _aArtificial intelligence.
650 0 _aManagement information systems.
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
650 2 4 _aBusiness Information Systems.
650 2 4 _aData Mining and Knowledge Discovery.
650 2 4 _aOperations Research/Decision Theory.
650 2 4 _aComputer Systems Organization and Communication Networks.
650 2 4 _aArtificial Intelligence (incl. Robotics).
700 1 _aChau, Michael.
_eeditor.
700 1 _aWang, Jau-Hwang.
_eeditor.
700 1 _aChen, Hsinchun.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781441913241
830 0 _aAnnals of Information Systems,
_x1934-3221 ;
_v9
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-1-4419-1325-8
596 _a19
942 _cLIBRO_ELEC
999 _c199192
_d199192