Intelligence and security informatics : techniques and applications (Record no. 9270)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02130nam a22001577a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | RRU |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220517144803.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 220517b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783540692072 |
Printed Price | 17350.55 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | RRU |
Language of cataloging | English |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Class No. | 006.33 |
Item number | CHE |
245 ## - TITLE STATEMENT | |
Title | Intelligence and security informatics : techniques and applications |
Statement of responsibility | Hsinchun Chen and Christopher C Yang |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Name of publisher, distributor, etc. | Springer |
Date of publication, distribution, etc. | 2008 |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Intelligence and Security Informatics (ISI) has become an important research field after the tragic event of September 11, 2001. Researchers in computer and information science have a unique opportunity (and obligation) to contribute to international security via advanced IT research. A series of conferences on ISI has been organized in US since 2003, in Pacific Asia since 2006, and in Europe since 2008. More details about this series of conferences can be found at http://www.isiconference.org/. These activities have brought together researchers, practitioners, and policy-makers to support counterterrorism and homeland security mission. This book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence and crime analysis, infrastructure protection, privacy protection, information surveillance, and emergency response. The authors come from nine different countries and contribute a total of twenty-two chapters of advanced and high-impact ISI research.<br/><br/>The audiences of this book include: (1) public and private sector practitioners in the national/international and homeland security area; (2) consultants and contractors engaging in on-going relationships with federal, state, local, and international agencies on projects related to national security; (3) graduate level students in computer science, information science, public policy, information security, criminology, and terrorism study; and (4) researchers engaging in security informatics, homeland security, information policy, knowledge management, public policy, and counterterrorism research. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan (e.g. reference copy) | Home library | Current library | Date acquired | Purchase price (after disc. etc) | Total Checkouts | Full call number | Accession No | Date last seen | Item MRP (printed price) | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Rashtriya Raksha University | Rashtriya Raksha University | 07/02/2022 | 12145.38 | 006.33 CHE | 11847 | 17/05/2022 | 17350.55 | 17/05/2022 | Books |