|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
SCIDIR_ocn903531520 |
003 |
OCoLC |
005 |
20231120111941.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
150217s2015 mau ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d EBLCP
|d N$T
|d UIU
|d E7B
|d TEFOD
|d OCLCF
|d YDXCP
|d VRC
|d DEBSZ
|d UMI
|d DEBBG
|d COO
|d TEFOD
|d REB
|d IDB
|d LIV
|d MERUC
|d NLE
|d VT2
|d OCLCA
|d KIJ
|d UUM
|d WRM
|d U3W
|d D6H
|d CEF
|d H9Z
|d OCLCQ
|d AU@
|d AUD
|d OCLCQ
|d OCLCO
|d OCL
|d OCLCQ
|d PWQ
|d OCLCQ
|
019 |
|
|
|a 910165559
|a 1008952402
|a 1050537488
|a 1107459077
|
020 |
|
|
|a 9780128019733
|q (electronic bk.)
|
020 |
|
|
|a 0128019735
|q (electronic bk.)
|
020 |
|
|
|a 0128019670
|
020 |
|
|
|a 9780128019672
|
020 |
|
|
|z 9780128019672
|
035 |
|
|
|a (OCoLC)903531520
|z (OCoLC)910165559
|z (OCoLC)1008952402
|z (OCoLC)1050537488
|z (OCoLC)1107459077
|
043 |
|
|
|a n-us---
|
050 |
|
4 |
|a UA23
|
072 |
|
7 |
|a POL
|x 017000
|2 bisacsh
|
082 |
0 |
4 |
|a 353.10973
|
245 |
0 |
0 |
|a Application of big data for national security :
|b a practitioner's guide to emerging technologies /
|c edited by Babak Akhgar [and five others].
|
264 |
|
1 |
|a Oxford, UK :
|b Butterworth-Heinemann, an imprint of Elsevier Ltd.,
|c [2015]
|
264 |
|
4 |
|c �2015
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical referencesa and index.
|
588 |
0 |
|
|a Vendor-supplied metadata.
|
520 |
8 |
|
|a Annotation
|b 'Mining Big Data to Improve National Security' introduces state-of-the-art concepts and technologies surrounding big data, providing users with a strategic framework that can be used to combat terrorism and reduce crime.
|
505 |
0 |
|
|a Front Cover -- Application of Big Data for National Security: A Practitioner's Guide to Emerging Technologies -- Copyright -- Contents -- List of Contributors -- About the Editors -- Foreword by Lord Carlile of Berriew -- Preface by Edwin Meese III -- Acknowledgments -- Section 1 -- INTRODUCTION TO BIG DATA -- Chapter 1 -- An Introduction to Big Data -- WHAT IS BIG DATA? -- HOW DIFFERENT IS BIG DATA? -- MORE ON BIG DATA: TYPES AND SOURCES -- THE FIVE V'S OF BIG DATA -- BIG DATA IN THE BIG WORLD -- ANALYTICAL CAPABILITIES OF BIG DATA -- STREAMING ANALYTICS -- AN OVERVIEW OF BIG DATA SOLUTIONS -- CONCLUSIONS -- REFERENCES -- CHAPTER 2 -- DRILLING INTO THE BIG DATA GOLD MINE: DATA FUSION AND HIGH-PERFORMANCE ANALYTICS FOR INTELLIGENCE PROFESSIONALS -- INTRODUCTION -- THE AGE OF BIG DATA AND HIGH-PERFORMANCE ANALYTICS -- TECHNOLOGY CHALLENGES -- EXAMPLES -- CONCLUSION -- REFERENCE -- Section 2 -- CORE CONCEPTS AND APPLICATION SCENARIOS -- CHAPTER 3 -- HARNESSING THE POWER OF BIG DATA TO COUNTER INTERNATIONAL TERRORISM -- INTRODUCTION -- A NEW TERROR -- CHANGING THREAT LANDSCAPE -- EMBRACING BIG DATA -- CONCLUSION -- REFERENCES -- CHAPTER 4 -- BIG DATA AND LAW ENFORCEMENT: ADVANCES, IMPLICATIONS, AND LESSONS FROM AN ACTIVE SHOOTER CASE STUDY -- THE INTERSECTION OF BIG DATA AND LAW ENFORCEMENT -- CASE EXAMPLE AND WORKSHOP OVERVIEW -- SITUATIONAL AWARENESS -- TWITTER AS A SOCIAL MEDIA SOURCE OF BIG DATA -- SOCIAL MEDIA DATA ANALYZED FOR THE WORKSHOP -- TOOLS AND CAPABILITIES PROTOTYPES DURING THE WORKSHOP -- LAW ENFORCEMENT FEEDBACK FOR THE SESSIONS -- DISCUSSION -- ACKNOWLEDGMENTS -- REFERENCES -- CHAPTER 5 -- INTERPRETATION AND INSIDER THREAT: REREADING THE ANTHRAX MAILINGS OF 2001 THROUGH A "BIG DATA" LENS -- INTRODUCTION -- IMPORTANCE OF THE CASE -- THE ADVANCEMENT OF BIG DATA ANALYTICS AFTER 2001 -- RELEVANT EVIDENCE.
|
505 |
8 |
|
|a POTENTIAL FOR STYLOMETRIC AND SENTIMENT ANALYSIS -- POTENTIAL FOR FURTHER PATTERN ANALYSIS AND VISUALIZATION -- FINAL WORDS: INTERPRETATION AND INSIDER THREAT -- REFERENCES -- CHAPTER 6 -- CRITICAL INFRASTRUCTURE PROTECTION BY HARNESSING BIG DATA -- INTRODUCTION -- UNDERSTANDING THE STRATEGIC LANDSCAPE INTO WHICH BIG DATA MUST BE APPLIED -- WHAT IS MEANT BY AN OVERARCHING ARCHITECTURE? -- UNDERPINNING THE SCR -- STRATEGIC COMMUNITY ARCHITECTURE FRAMEWORK -- CONCLUSIONS -- REFERENCES -- CHAPTER 7 -- MILITARY AND BIG DATA REVOLUTION -- RISK OF COLLAPSE -- INTO THE BIG DATA ARENA -- SIMPLE TO COMPLEX USE CASES -- CANONIC USE CASES -- MORE ON THE DIGITAL VERSION OF THE REAL WORLD (SEE THE WORLD AS EVENTS) -- REAL-TIME BIG DATA SYSTEMS -- IMPLEMENTING THE REAL-TIME BIG DATA SYSTEM -- INSIGHT INTO DEEP DATA ANALYTICS TOOLS AND REAL-TIME BIG DATA SYSTEMS -- VERY SHORT LOOP AND BATTLEFIELD BIG DATA DATACENTERS -- CONCLUSIONS -- FURTHER READING -- CHAPTER 8 -- CYBERCRIME: ATTACK MOTIVATIONS AND IMPLICATIONS FOR BIG DATA AND NATIONAL SECURITY -- INTRODUCTION -- DEFINING CYBERCRIME AND CYBERTERRORISM -- ATTACK CLASSIFICATION AND PARAMETERS -- WHO PERPETRATES THESE ATTACKS? -- TOOLS USED TO FACILITATE ATTACKS -- MOTIVATIONS -- ATTACK MOTIVATIONS TAXONOMY -- DETECTING MOTIVATIONS IN OPEN-SOURCE INFORMATION -- CONCLUSION -- REFERENCES -- Section 3 -- METHODS AND TECHNOLOGICAL SOLUTIONS -- CHAPTER 9 -- REQUIREMENTS AND CHALLENGES FOR BIG DATA ARCHITECTURES -- WHAT ARE THE CHALLENGES INVOLVED IN BIG DATA PROCESSING? -- TECHNOLOGICAL UNDERPINNING -- PLANNING FOR A BIG DATA PLATFORM -- CONCLUSIONS -- REFERENCES -- CHAPTER 10 -- TOOLS AND TECHNOLOGIES FOR THE IMPLEMENTATION OF BIG DATA -- INTRODUCTION -- TECHNIQUES -- Analysis -- COMPUTATIONAL TOOLS -- IMPLEMENTATION -- PROJECT INITIATION AND LAUNCH -- DATA SOURCES AND ANALYTICS -- ANALYTICS PHILOSOPHY: ANALYSIS OR SYNTHESIS.
|
505 |
8 |
|
|a GOVERNANCE AND COMPLIANCE -- REFERENCES -- CHAPTER 11 -- MINING SOCIAL MEDIA: ARCHITECTURE, TOOLS, AND APPROACHES TO DETECTING CRIMINAL ACTIVITY -- INTRODUCTION -- MINING OF SOCIAL NETWORKS FOR CRIME -- TEXT MINING -- NATURAL LANGUAGE METHODS -- GENERAL ARCHITECTURE AND VARIOUS COMPONENTS OF TEXT MINING -- AUTOMATIC EXTRACTION OF BNS FROM TEXT -- BNS AND CRIME DETECTION -- CONCLUSIONS -- REFERENCES -- CHAPTER 12 -- MAKING SENSE OF UNSTRUCTURED NATURAL LANGUAGE INFORMATION -- INTRODUCTION -- BIG DATA AND UNSTRUCTURED DATA -- ASPECTS OF UNCERTAINTY IN SENSE MAKING -- SITUATION AWARENESS AND INTELLIGENCE -- PROCESSING NATURAL LANGUAGE DATA -- STRUCTURING NATURAL LANGUAGE DATA -- TWO SIGNIFICANT WEAKNESSES -- AN ALTERNATIVE REPRESENTATION FOR FLEXIBILITY -- CONCLUSIONS -- REFERENCES -- CHAPTER 13 -- LITERATURE MINING AND ONTOLOGY MAPPING APPLIED TO BIG DATA -- INTRODUCTION -- BACKGROUND -- ARIANA: ADAPTIVE ROBUST INTEGRATIVE ANALYSIS FOR FINDING NOVEL ASSOCIATIONS -- CONCEPTUAL FRAMEWORK OF ARIANA -- IMPLEMENTATION OF ARIANA FOR BIOMEDICAL APPLICATIONS -- CASE STUDIES -- DISCUSSION -- CONCLUSIONS -- ACKNOWLEDGMENT -- REFERENCES -- CHAPTER 14 -- BIG DATA CONCERNS IN AUTONOMOUS AI SYSTEMS -- INTRODUCTION -- ARTIFICIALLY INTELLIGENT SYSTEM MEMORY MANAGEMENT -- ARTIFICIAL MEMORY PROCESSING AND ENCODING -- CONSTRUCTIVIST LEARNING -- PRACTICAL SOLUTIONS FOR SECURE KNOWLEDGE DEVELOPMENT IN BIG DATA ENVIRONMENTS -- CONCLUSIONS -- REFERENCES -- Section 4 -- LEGAL AND SOCIAL CHALLENGES -- CHAPTER 15 -- THE LEGAL CHALLENGES OF BIG DATA APPLICATION IN LAW ENFORCEMENT -- INTRODUCTION -- LEGAL FRAMEWORK -- CONCLUSIONS -- REFERENCES -- CHAPTER 16 -- BIG DATA AND THE ITALIAN LEGAL FRAMEWORK: OPPORTUNITIES FOR POLICE FORCES -- INTRODUCTION -- EUROPEAN LEGAL FRAMEWORK -- THE ITALIAN LEGAL FRAMEWORK -- OPPORTUNITIES AND CONSTRAINTS FOR POLICE FORCES AND INTELLIGENCE -- REFERENCES.
|
505 |
8 |
|
|a CHAPTER 17 -- ACCOUNTING FOR CULTURAL INFLUENCES IN BIG DATA ANALYTICS -- INTRODUCTION -- CONSIDERATIONS FROM CROSS-CULTURAL PSYCHOLOGY FOR BIG DATA ANALYTICS -- CULTURAL DEPENDENCE IN THE SUPPLY AND DEMAND SIDES OF BIG DATA ANALYTICS -- (MIS)MATCHES AMONG PRODUCER, PRODUCTION, INTERPRETER, AND INTERPRETATION CONTEXTS -- INTEGRATING CULTURAL INTELLIGENCE INTO BIG DATA ANALYTICS: SOME RECOMMENDATIONS -- CONCLUSIONS -- REFERENCES -- CHAPTER 18 -- MAKING SENSE OF THE NOISE: AN ABC APPROACH TO BIG DATA AND SECURITY -- HOW HUMANS NATURALLY DEAL WITH BIG DATA -- THE THREE STAGES OF DATA PROCESSING EXPLAINED -- THE PUBLIC ORDER POLICING MODEL AND THE COMMON OPERATIONAL PICTURE -- APPLICATIONS TO BIG DATA AND SECURITY -- APPLICATION TO BIG DATA AND NATIONAL SECURITY -- A FINAL CAVEAT FROM THE FBI BULLETIN -- REFERENCES -- Glossary -- Index.
|
650 |
|
0 |
|a National security
|z United States.
|
650 |
|
0 |
|a Big data.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Science and state.
|
650 |
|
0 |
|a Technology and state.
|
650 |
|
6 |
|a Donn�ees volumineuses.
|0 (CaQQLa)000284673
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|0 (CaQQLa)201-0061151
|
650 |
|
6 |
|a Politique scientifique et technique.
|0 (CaQQLa)201-0009888
|
650 |
|
7 |
|a POLITICAL SCIENCE
|x Public Affairs & Administration.
|2 bisacsh
|
650 |
|
7 |
|a Technology and state.
|2 fast
|0 (OCoLC)fst01145265
|
650 |
|
7 |
|a Big data.
|2 fast
|0 (OCoLC)fst01892965
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
650 |
|
7 |
|a National security.
|2 fast
|0 (OCoLC)fst01033711
|
650 |
|
7 |
|a Science and state.
|2 fast
|0 (OCoLC)fst01108536
|
651 |
|
7 |
|a United States.
|2 fast
|0 (OCoLC)fst01204155
|
655 |
|
4 |
|a Electronic books.
|
700 |
1 |
|
|a Akhgar, Babak,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|t Application of big data for national security.
|d Oxford, UK : Butterworth-Heinemann, an imprint of Elsevier Ltd., [2015]
|z 0128019670
|w (OCoLC)898052443
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780128019672
|z Texto completo
|