Intelligence and Security Informatics (Record no. 3060)

000 -LEADER
fixed length control field 05175nam a22005895i 4500
001 - CONTROL NUMBER
control field 978-3-540-69209-6
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20141014113520.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100301s2008 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783540692096
-- 978-3-540-69209-6
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-540-69209-6
Source of number or code doi
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TA329-348
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TA640-643
072 #7 - SUBJECT CATEGORY CODE
Subject category code TBJ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code MAT003000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 519
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Chen, Hsinchun.
Relator term editor.
245 10 - TITLE STATEMENT
Title Intelligence and Security Informatics
Medium [electronic resource] :
Remainder of title Techniques and Applications /
Statement of responsibility, etc edited by Hsinchun Chen, Christopher C. Yang.
260 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Berlin, Heidelberg :
Name of publisher, distributor, etc Springer Berlin Heidelberg,
Date of publication, distribution, etc 2008.
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg,
-- 2008.
300 ## - PHYSICAL DESCRIPTION
Extent XIII, 460 p.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Studies in Computational Intelligence,
International Standard Serial Number 1860-949X ;
Volume number/sequential designation 135
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Terrorism Informatics and Data Mining -- Assured Information Sharing: Technologies, Challenges and Directions -- Automating Event Extraction for the Security Domain -- Knowledge Discovery and Information Visualization for Terrorist Social Networks -- Understanding the Nexus of Terrorist Web Sites -- Multi-lingual Detection of Web Terrorist Content -- Modeling Anticipatory Event Transitions -- Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan -- Intelligence and Crime Analysis -- Identifying Interesting Networks of Criminal Activity -- Name Matching in Law Enforcement Database -- Discovering Investigation Clues through Mining Criminal Databases -- Automated Filtering on Data Streaming for Intelligence Analysis -- Personal Information Management for Intelligence Tasks -- A Data Miner’s Approach to Country Corruption Analysis -- Access Control, Infrastructure Protection and Privacy -- Protecting Private Information in Online Social Networks -- Protection of Database Security Via Collaborative Inference Detection -- Suspect Vehicle Identification for Border Safety -- Optimization Problems for Port-of-Entry Detection Systems -- Modeling and Validation of Aviation Security -- Surveillance and Emergency Response -- Anomaly Detection in Moving Object -- Intelligent Face Recognition -- Video Analysis of Vehicles and Persons for Surveillance -- Video-Based Deception Detection.
520 ## - SUMMARY, ETC.
Summary, etc Intelligence and Security Informatics (ISI) has become an important research field after the tragic event of September 11, 2001. Researchers in computer and information science have a unique opportunity (and obligation) to contribute to international security via advanced IT research. A series of conferences on ISI has been organized in US since 2003, in Pacific Asia since 2006, and in Europe since 2008. More details about this series of conferences can be found at http://www.isiconference.org/. These activities have brought together researchers, practitioners, and policy-makers to support counterterrorism and homeland security mission. This book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence and crime analysis, infrastructure protection, privacy protection, information surveillance, and emergency response. The authors come from nine different countries and contribute a total of twenty-two chapters of advanced and high-impact ISI research. The audiences of this book include: (1) public and private sector practitioners in the national/international and homeland security area; (2) consultants and contractors engaging in on-going relationships with federal, state, local, and international agencies on projects related to national security; (3) graduate level students in computer science, information science, public policy, information security, criminology, and terrorism study; and (4) researchers engaging in security informatics, homeland security, information policy, knowledge management, public policy, and counterterrorism research.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Artificial intelligence.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic commerce.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering mathematics.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Management information systems.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Appl.Mathematics/Computational Methods of Engineering.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Encryption.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Artificial Intelligence (incl. Robotics).
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic Commerce/e-business.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Business Information Systems.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Yang, Christopher C.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783540692072
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Studies in Computational Intelligence,
-- 1860-949X ;
Volume number/sequential designation 135
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-540-69209-6
912 ## -
-- ZDB-2-ENG
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-Books

No items available.


Implemented and Maintained by Biju Patnaik Central Library.
For any Suggestions/Query Contact to library or Email: library@nitrkl.ac.in OR bpcl-cir@nitrkl.ac.in. Ph:91+6612462103
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha