語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Emergent information technologies an...
~
Popp, Robert L.
Emergent information technologies and enabling policies for counter-terrorism
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Emergent information technologies and enabling policies for counter-terrorism/ edited by Robert L. Popp, John Yen.
其他作者:
Popp, Robert L.
出版者:
Hoboken, N.J. :Wiley-Interscience ; : c2006.,
面頁冊數:
1 online resource (xv, 468 p.) :ill., port. :
標題:
Terrorism - Prevention. - United States -
電子資源:
http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5444075
ISBN:
047178656X
Emergent information technologies and enabling policies for counter-terrorism
Emergent information technologies and enabling policies for counter-terrorism
[electronic resource] /edited by Robert L. Popp, John Yen. - Hoboken, N.J. :Wiley-Interscience ;c2006. - 1 online resource (xv, 468 p.) :ill., port. - IEEE Press series on computational intelligence. - IEEE series on computational intelligence..
Includes bibliographical references and index.
Utilizing information and social science technology to understand and counter the twenty-first century strategic threat / Robert L. Popp, David Allen, and Claudio Cioffi-Revilla -- Hidden Markov models and Bayesian networks for counter-terrorism / Krishna Pattipati ... [et al.] -- Anticipatory models for counter-terrorism / Mark Lazaroff and David Snowden -- Information processing at very high speed data ingestion rates / J. Brian Sharkey ... [et al.] -- Analysis of heterogeneous data in ultrahigh dimensions / R.A. Ammar ... [et al.] -- Sematic web technologies for terrorist network analysis / Jennifer Golbeck, Aaron Mannes, and James Hendler -- Improving national and homeland security through context knowledge representation and reasoning technologies / Nazli Choucri, Stuart E. Madnick, and Michael D. Siegel -- Anonymized semantic directories and a privacy-enhancing architecture for enterprise discovery / Jeff Jonas and John Karat -- Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies / Brian Kettler, Gary Edwards, and Mark Hoffman -- Applying semantic web reasoning to counter-terrorism / Paul Kogut ... [et al.] -- Schemer : consensus-based knowledge validation and collaboration services for virtual teams of intelligence experts / Clifford Behrens, Hyong-Sop Shim, and Davaisis Bassu -- Sharing intelligence using information supply chains / Shuang Sun, Xiaocong Fan, and John Yen -- Supporting knowledge management in emergency crisis management domains : envisioned designs for collaborative work / Michael D. McNeese .. [et al.] -- Agent-based simulations for disaster rescue using the DEFACTO coordination system / Janusz Marecki, Nathan Schurr, and Milind Tambe -- Transcending the tower of Babel : supporting access to multilingual information with cross-language information retrieval / Douglas W. Oard -- Journey from analysis to inquiry : technology and transformation of counter-terrorism analysis / Aaron B. Frank and Desmond Saunders-Newton -- Behavioral network analysis for terrorist detection / Seth A. Greenblatt, Thayne Coffman, and Sherry E. Marcus -- Detecting terrorist activities in the twenty-first century : a theory of detection for transactional networks / Tom Mifflin ... [et al.] -- Social network analysis via matrix decompositions / D.B. Skillicorn -- Legal standards for data mining / Fred H. Cate -- Privacy and consequences : legal and policy structures for implementing new counter-terrorism technologies and protecting civil liberty / Paul Rosenzweig -- Designing technical systems to support policy : enterprise architecture, policy appliances and civil liberties / K.A. Taipale.
Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national securityAfter the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks.
ISBN: 047178656X
Standard No.: 10.1002/047178656Xdoi
Source: 112100957Wiley InterSciencehttp://www3.interscience.wiley.com
UkSubjects--Topical Terms:
650115
Terrorism
--Prevention.--United StatesIndex Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: HV6431 / .E487 2006eb
Dewey Class. No.: 363.3202854
Emergent information technologies and enabling policies for counter-terrorism
LDR
:05137cam 2200541Ia 4500
001
670329
003
OCoLC
005
20121225141804.0
006
m o d
007
cr cn|
008
130624s2006 njuac ob 001 0 eng d
016
7
$z
013326278
$2
Uk
019
$a
74174814
$a
85899323
$a
225356712
$a
647800413
$a
654684443
$a
657639616
$a
669008721
$a
712984176
020
$a
047178656X
020
$a
9780471786566
020
$a
0471786551 (electronic bk.)
020
$a
9780471786559 (electronic bk.)
020
$a
9780470874103
020
$a
0470874104
020
$z
0471776157
020
$z
9780471776154
024
7
$a
10.1002/047178656X
$2
doi
029
1
$a
AU@
$b
000041524287
029
1
$a
YDXCP
$b
2483183
029
1
$a
AU@
$b
000042132981
029
1
$a
GBVCP
$b
714992585
035
$a
(OCoLC)85784221
$z
(OCoLC)74174814
$z
(OCoLC)85899323
$z
(OCoLC)225356712
$z
(OCoLC)647800413
$z
(OCoLC)654684443
$z
(OCoLC)657639616
$z
(OCoLC)669008721
$z
(OCoLC)712984176
035
$a
ocm85784221
037
$a
112100957
$b
Wiley InterScience
$n
http://www3.interscience.wiley.com
040
$a
DG1
$b
eng
$c
DG1
$d
OKU
$d
BTCTA
$d
DG1
$d
OCLCQ
$d
IEEEE
$d
OCLCQ
$d
CDN
$d
N$T
$d
YDXCP
$d
TEFOD
$d
IDEBK
$d
E7B
$d
OCLCE
$d
CUS
$d
DG1
$d
OCLCQ
$d
MHW
$d
OCLCQ
$d
B24X7
$d
AU@
$d
SNK
$d
OCLCQ
043
$a
n-us---
049
$a
HISA
050
4
$a
HV6431
$b
.E487 2006eb
072
7
$a
POL
$x
014000
$2
bisacsh
082
0 4
$a
363.3202854
$2
22
245
0 0
$a
Emergent information technologies and enabling policies for counter-terrorism
$h
[electronic resource] /
$c
edited by Robert L. Popp, John Yen.
260
$a
Hoboken, N.J. :
$a
Chichester :
$b
Wiley-Interscience ;
$c
c2006.
$b
John Wiley [distributor],
300
$a
1 online resource (xv, 468 p.) :
$b
ill., port.
490
1
$a
IEEE Press series on computational intelligence
504
$a
Includes bibliographical references and index.
505
0
$a
Utilizing information and social science technology to understand and counter the twenty-first century strategic threat / Robert L. Popp, David Allen, and Claudio Cioffi-Revilla -- Hidden Markov models and Bayesian networks for counter-terrorism / Krishna Pattipati ... [et al.] -- Anticipatory models for counter-terrorism / Mark Lazaroff and David Snowden -- Information processing at very high speed data ingestion rates / J. Brian Sharkey ... [et al.] -- Analysis of heterogeneous data in ultrahigh dimensions / R.A. Ammar ... [et al.] -- Sematic web technologies for terrorist network analysis / Jennifer Golbeck, Aaron Mannes, and James Hendler -- Improving national and homeland security through context knowledge representation and reasoning technologies / Nazli Choucri, Stuart E. Madnick, and Michael D. Siegel -- Anonymized semantic directories and a privacy-enhancing architecture for enterprise discovery / Jeff Jonas and John Karat -- Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies / Brian Kettler, Gary Edwards, and Mark Hoffman -- Applying semantic web reasoning to counter-terrorism / Paul Kogut ... [et al.] -- Schemer : consensus-based knowledge validation and collaboration services for virtual teams of intelligence experts / Clifford Behrens, Hyong-Sop Shim, and Davaisis Bassu -- Sharing intelligence using information supply chains / Shuang Sun, Xiaocong Fan, and John Yen -- Supporting knowledge management in emergency crisis management domains : envisioned designs for collaborative work / Michael D. McNeese .. [et al.] -- Agent-based simulations for disaster rescue using the DEFACTO coordination system / Janusz Marecki, Nathan Schurr, and Milind Tambe -- Transcending the tower of Babel : supporting access to multilingual information with cross-language information retrieval / Douglas W. Oard -- Journey from analysis to inquiry : technology and transformation of counter-terrorism analysis / Aaron B. Frank and Desmond Saunders-Newton -- Behavioral network analysis for terrorist detection / Seth A. Greenblatt, Thayne Coffman, and Sherry E. Marcus -- Detecting terrorist activities in the twenty-first century : a theory of detection for transactional networks / Tom Mifflin ... [et al.] -- Social network analysis via matrix decompositions / D.B. Skillicorn -- Legal standards for data mining / Fred H. Cate -- Privacy and consequences : legal and policy structures for implementing new counter-terrorism technologies and protecting civil liberty / Paul Rosenzweig -- Designing technical systems to support policy : enterprise architecture, policy appliances and civil liberties / K.A. Taipale.
520
$a
Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national securityAfter the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks.
650
0
$a
Terrorism
$z
United States
$x
Prevention.
$3
650115
650
0
$a
Terrorism
$x
Government policy
$z
United States.
$3
564747
650
0
$a
Terrorism
$z
United States
$x
Technological innovations.
$3
771635
650
0
$a
Information technology
$x
Government policy
$z
United States.
$3
771636
650
7
$a
POLITICAL SCIENCE
$x
Political Freedom & Security
$x
Law Enforcement.
$2
bisacsh
$3
771637
650
0 7
$a
Informationstechnik.
$2
swd
$3
771638
650
0 7
$a
Terrorismus.
$2
swd
$3
771639
650
0 7
$a
Bek�ampfung.
$2
swd
$3
771640
655
4
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Popp, Robert L.
$3
771633
700
1
$a
Yen, John.
$3
771634
830
0
$a
IEEE series on computational intelligence.
$3
643983
856
4 0
$3
IEEE Xplore
$u
http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5444075
938
$a
Baker and Taylor
$b
BTCP
$n
BK0007440186
938
$a
YBP Library Services
$b
YANK
$n
2483183
938
$a
ebrary
$b
EBRY
$n
ebr10305005
938
$a
Books 24x7
$b
B247
$n
bkg00016843
938
$a
EBSCOhost
$b
EBSC
$n
158136
994
$a
92
$b
TWHIS
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入