|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocn164864207 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
070816s2007 ne a ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d YDXCP
|d OCLCQ
|d N$T
|d OCLCQ
|d EBLCP
|d MERUC
|d UBY
|d E7B
|d OCLCQ
|d IDEBK
|d OCLCQ
|d MHW
|d OCLCQ
|d N$T
|d OCLCF
|d NLGGC
|d OCLCQ
|d OCLCO
|d OCLCQ
|d AGLDB
|d OTZ
|d OCLCQ
|d VTS
|d XOS
|d OCLCQ
|d M8D
|d OCLCQ
|d VLY
|d UCW
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d UKAHL
|d OCLCQ
|d INARC
|d OCLCO
|
015 |
|
|
|a GBA744429
|2 bnb
|
016 |
7 |
|
|a 013662078
|2 Uk
|
019 |
|
|
|a 212428000
|a 441806426
|a 648299397
|a 700706631
|a 994939356
|a 1064114125
|a 1162534674
|a 1196345477
|a 1300614805
|a 1392383986
|
020 |
|
|
|a 9780080479613
|q (electronic bk.)
|
020 |
|
|
|a 0080479618
|q (electronic bk.)
|
020 |
|
|
|a 1281051039
|
020 |
|
|
|a 9781281051035
|
020 |
|
|
|a 9786611051037
|
020 |
|
|
|a 6611051031
|
020 |
|
|
|z 0444519963
|q (Cloth)
|
020 |
|
|
|z 9780444519962
|q (hbk.)
|
029 |
1 |
|
|a DEBBG
|b BV043087199
|
029 |
1 |
|
|a DEBSZ
|b 422199354
|
029 |
1 |
|
|a NLGGC
|b 304022454
|
035 |
|
|
|a (OCoLC)164864207
|z (OCoLC)212428000
|z (OCoLC)441806426
|z (OCoLC)648299397
|z (OCoLC)700706631
|z (OCoLC)994939356
|z (OCoLC)1064114125
|z (OCoLC)1162534674
|z (OCoLC)1196345477
|z (OCoLC)1300614805
|z (OCoLC)1392383986
|
050 |
|
4 |
|a QA76.9.A25
|b N275 2007eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a National security /
|c edited by H. Chen [and others].
|
260 |
|
|
|a Amsterdam ;
|a Oxford :
|b Elsevier,
|c 2007.
|
300 |
|
|
|a 1 online resource (xxii, 419 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Handbooks in information systems ;
|v v. 2
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Cover -- Copyright page -- Contents -- Preface -- Part I: Legal and Policy Frameworks -- Chapter 1. Should Commercial Misuse of Private Data be a Crime? -- 1. Introduction -- 2. The need for privacy in an era of ubiquitous information technology -- 3. Relation-based shared privacy -- 4. Criminal liability -- 5. Conclusion -- 6. Questions on the material -- 7. Questions for further research -- References -- Chapter 2. National Information Technology (IT) Security Policies: An Overview of Issues -- 1. Introduction -- 2. National information technology security policies -- 3. Internationalization -- 4. Conclusion -- 5. Questions -- Acknowledgments -- References -- Chapter 3. Economics of Information Security Investment -- 1. Introduction -- 2. Characteristics of information security investment -- 3. Economics of information security investment -- 4. Management of information security investment -- 5. Conclusion -- 6. Questions for discussion -- Acknowledgement -- References -- Glossary of terms -- Part II: Intelligence and Security Informatics -- Chapter 4. State of 3D Face Biometrics for Homeland Security Applications -- 1. The need: biometric access control -- 2. 2D methods -- 3. 3D methods -- 4. Biometric databases -- 5. Face recognition grand challenge (FRGC, 2005) -- 6. Future directions -- 7. Questions for classroom discussion -- Acknowledgments -- References -- Chapter 5. The Necessity of Fuzzy Logic for Identity Matching -- 1. Introduction -- 2. Characteristics of biometrics -- 3. Fusion of results, the answer -- 4. Why traditional database queries do not work? -- 5. What is fuzzy matching? -- 6. Case study-border security -- 7. Conclusion -- 8. Questions for further research and debate -- Appendix-An overview of common biometrics -- Biography -- References -- Chapter 6. Managing Real-Time Bioterrorism Surveillance Data -- 1. The threat of bioterrorism -- 2. Bioterrorism surveillance systems -- 3. Multidimensional data: sources of healthcare information -- 4. Timeliness: real-time information -- 5. Histories of indicator data: real-time data warehousing -- 6. Data analytics: algorithmic and exploratory pattern recognition -- 7. Summary and conclusions -- 8. Questions for discussion -- References -- Chapter 7. Spatio-Temporal Data Analysis in Security Informatics -- 1. Introduction -- 2. Literature review -- 3. Support vector clustering-based spatio-temporal data analysis -- 4. Experimental studies -- 5. Case studies: public health surveillance and crime analysis -- 6. Conclusions and future work -- 7. Questions for Discussion -- Acknowledgment -- References -- Chapter 8. Deception and Intention Detection -- 1. Introduction -- 2. Deception, intentions, and behavior -- 3. Existing methods of deception detection -- 4. Application of methods in screening scenarios -- 5. Model for unobtrusive deception and intention detection -- 6. Automatic detection of.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a This edited volume is intended to address in a comprehensive and integrated manner three major areas of national and international security research from an information systems-centric perspective: legal and policy frameworks; intelligence and security informatics; and emergency preparedness and infrastructure protection. The discussions are replete with real-world case studies and examples that present the concepts using an integrated, action-oriented and theory-based approach to validate the frameworks presented and to provide specific insights on the technical approaches and organizational.
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Expert systems (Computer science)
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a National security.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Systèmes experts (Informatique)
|
650 |
|
6 |
|a Exploration de données (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Data mining
|2 fast
|
650 |
|
7 |
|a Expert systems (Computer science)
|2 fast
|
650 |
|
7 |
|a National security
|2 fast
|
700 |
1 |
|
|a Chen, Hsinchun.
|
776 |
0 |
8 |
|i Print version:
|t National security.
|d Amsterdam ; Oxford : Elsevier, 2007
|z 9780444519962
|z 0444519963
|w (OCoLC)144548573
|
830 |
|
0 |
|a Handbooks in information systems ;
|v v. 2.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196229
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH23083646
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL648459
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10185883
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 196229
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 105103
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2605662
|
938 |
|
|
|a Internet Archive
|b INAR
|n nationalsecurity0002unse
|
994 |
|
|
|a 92
|b IZTAP
|