|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn827935868 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
130218s2013 enk ob 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d E7B
|d CDX
|d N$T
|d IDEBK
|d B24X7
|d COO
|d YDXCP
|d UMC
|d OCLCF
|d UMI
|d UPM
|d DEBBG
|d GGVRL
|d DEBSZ
|d UIU
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d LIV
|d OCLCQ
|d OCLCA
|d U3W
|d D6H
|d CEF
|d UWO
|d LEAUB
|d ESU
|d REDDC
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 828247149
|a 868597681
|a 1069651470
|a 1229061797
|
020 |
|
|
|a 9780124059023
|q (electronic bk.)
|
020 |
|
|
|a 0124059023
|q (electronic bk.)
|
020 |
|
|
|z 9780124047020
|
020 |
|
|
|z 0124047025
|
029 |
1 |
|
|a AU@
|b 000050661738
|
029 |
1 |
|
|a CHBIS
|b 009942846
|
029 |
1 |
|
|a CHNEW
|b 000605193
|
029 |
1 |
|
|a CHVBK
|b 302881158
|
029 |
1 |
|
|a DEBBG
|b BV041778425
|
029 |
1 |
|
|a DEBBG
|b BV042315116
|
029 |
1 |
|
|a DEBSZ
|b 404329152
|
029 |
1 |
|
|a DEBSZ
|b 405346948
|
029 |
1 |
|
|a NLGGC
|b 357333551
|
029 |
1 |
|
|a NZ1
|b 15026445
|
029 |
1 |
|
|a NZ1
|b 15190931
|
029 |
1 |
|
|a CHNEW
|b 001011010
|
029 |
1 |
|
|a AU@
|b 000067101106
|
029 |
1 |
|
|a AU@
|b 000068473021
|
035 |
|
|
|a (OCoLC)827935868
|z (OCoLC)828247149
|z (OCoLC)868597681
|z (OCoLC)1069651470
|z (OCoLC)1229061797
|
037 |
|
|
|a CL0500000362
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b I58 2013
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Intelligent systems for security informatics /
|c Christopher C. Yang [and others].
|
260 |
|
|
|a Oxford ;
|a Waltham, MA :
|b Academic Press,
|c ©2013.
|
300 |
|
|
|a 1 online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Intelligent systems series
|
520 |
|
|
|a The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text. Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Chapter 1. Revealing the hidden world of the dark web : social media forums and videos -- chapter 2. Proactive cyber defense -- chapter 3. Privacy-preserving social network integration, analysis, and mining -- chapter 4. A digraph model for risk identification and management in SCADA systems -- chapter 5. High-level architecture and design of a decision engine for marine safety and security -- chapter 6. Criminal identity resolution using personal and social identity attributes : a collective resolution approach -- chapter 7. Al Qaeda terrorist financing -- chapter 8. Study on covert networks of terrorists based on interactive relationship hypothesis -- chapter 9. Incorporating data and methodologies for knowledge discovery for crime.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Information technology
|x Security measures
|2 fast
|
700 |
1 |
|
|a Yang, Christopher C.
|
776 |
0 |
8 |
|i Print version:
|t Intelligent systems for security informatics.
|b 1st ed.
|d Amsterdam ; Boston : Elsevier/Academic Press ; [Hangzhou, China] : Zhejiang University Press, 2013
|z 9780124047020
|w (DLC) 2012277621
|w (OCoLC)802322418
|
830 |
|
0 |
|a Intelligent systems series.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780124047020/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00051030
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 24652928
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10653100
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 486538
|
938 |
|
|
|a Cengage Learning
|b GVRL
|n GVRL6ZTX
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis24652928
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 9998586
|
994 |
|
|
|a 92
|b IZTAP
|