Intelligence and security informatics : techniques and applications (Record no. 9270)

MARC details
000 -LEADER
fixed length control field 02130nam a22001577a 4500
003 - CONTROL NUMBER IDENTIFIER
control field RRU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220517144803.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220517b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783540692072
Printed Price 17350.55
040 ## - CATALOGING SOURCE
Original cataloging agency RRU
Language of cataloging English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Class No. 006.33
Item number CHE
245 ## - TITLE STATEMENT
Title Intelligence and security informatics : techniques and applications
Statement of responsibility Hsinchun Chen and Christopher C Yang
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Name of publisher, distributor, etc. Springer
Date of publication, distribution, etc. 2008
520 ## - SUMMARY, ETC.
Summary, etc. Intelligence and Security Informatics (ISI) has become an important research field after the tragic event of September 11, 2001. Researchers in computer and information science have a unique opportunity (and obligation) to contribute to international security via advanced IT research. A series of conferences on ISI has been organized in US since 2003, in Pacific Asia since 2006, and in Europe since 2008. More details about this series of conferences can be found at http://www.isiconference.org/. These activities have brought together researchers, practitioners, and policy-makers to support counterterrorism and homeland security mission. This book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence and crime analysis, infrastructure protection, privacy protection, information surveillance, and emergency response. The authors come from nine different countries and contribute a total of twenty-two chapters of advanced and high-impact ISI research.<br/><br/>The audiences of this book include: (1) public and private sector practitioners in the national/international and homeland security area; (2) consultants and contractors engaging in on-going relationships with federal, state, local, and international agencies on projects related to national security; (3) graduate level students in computer science, information science, public policy, information security, criminology, and terrorism study; and (4) researchers engaging in security informatics, homeland security, information policy, knowledge management, public policy, and counterterrorism research.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan (e.g. reference copy) Home library Current library Date acquired Purchase price (after disc. etc) Total Checkouts Full call number Accession No Date last seen Item MRP (printed price) Price effective from Koha item type
    Dewey Decimal Classification     Rashtriya Raksha University Rashtriya Raksha University 07/02/2022 12145.38   006.33 CHE 11847 17/05/2022 17350.55 17/05/2022 Books
© 2024 Rashtriya Raksha University, All Rights Reserved.