2001, ISBN: 9783642011405
[ED: Buch], [PU: Springer-Verlag GmbH], Neuware - Modern terrorist networks pose an unprecedented threat to international security. The question of how to neutralize that threat is compli… Mehr…
booklooker.de |
2009, ISBN: 9783642011405
[ED: Hardcover], [PU: Springer / Springer, Berlin], Modern terrorist networks pose an unprecedented threat to international security. The question of how to neutralize that threat is comp… Mehr…
booklooker.de buecher.de GmbH & Co. KG Versandkosten:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) Details... |
Computational Methods for Counterterrorism / Shlomo Argamon (u. a.) / Buch / Englisch / 2009 - gebunden oder broschiert
2009, ISBN: 9783642011405
[ED: Gebunden], [PU: Springer Berlin], Modern terrorist networks pose an unprecedented threat to international security. The question of how to neutralize that threat is complicated radic… Mehr…
booklooker.de |
ISBN: 9783642011405
Modern terrorist networks pose an unprecedented threat to international security. The question of how to neutralize that threat is complicated radically by their fluid, non-hierarchical s… Mehr…
Springer.com Nr. 978-3-642-01140-5. Versandkosten:Worldwide free shipping, , DE. (EUR 0.00) Details... |
2009, ISBN: 9783642011405
[PU: Springer Berlin], Neubindung, Buchschnitt verkürzt, Ausgabe 2009 5207579/12, DE, [SC: 0.00], gebraucht; sehr gut, gewerbliches Angebot, 2009, PayPal, Klarna-Sofortüberweisung, Intern… Mehr…
booklooker.de |
2001, ISBN: 9783642011405
[ED: Buch], [PU: Springer-Verlag GmbH], Neuware - Modern terrorist networks pose an unprecedented threat to international security. The question of how to neutralize that threat is compli… Mehr…
Argamon, Shlomo / Howard, Newton (ed.):
Computational Methods for Counterterrorism - gebunden oder broschiert2009, ISBN: 9783642011405
[ED: Hardcover], [PU: Springer / Springer, Berlin], Modern terrorist networks pose an unprecedented threat to international security. The question of how to neutralize that threat is comp… Mehr…
Computational Methods for Counterterrorism / Shlomo Argamon (u. a.) / Buch / Englisch / 2009 - gebunden oder broschiert
2009
ISBN: 9783642011405
[ED: Gebunden], [PU: Springer Berlin], Modern terrorist networks pose an unprecedented threat to international security. The question of how to neutralize that threat is complicated radic… Mehr…
ISBN: 9783642011405
Modern terrorist networks pose an unprecedented threat to international security. The question of how to neutralize that threat is complicated radically by their fluid, non-hierarchical s… Mehr…
2009, ISBN: 9783642011405
[PU: Springer Berlin], Neubindung, Buchschnitt verkürzt, Ausgabe 2009 5207579/12, DE, [SC: 0.00], gebraucht; sehr gut, gewerbliches Angebot, 2009, PayPal, Klarna-Sofortüberweisung, Intern… Mehr…
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Computational Methods for Counterterrorism
EAN (ISBN-13): 9783642011405
ISBN (ISBN-10): 3642011403
Gebundene Ausgabe
Erscheinungsjahr: 2009
Herausgeber: Springer-Verlag GmbH
306 Seiten
Gewicht: 0,708 kg
Sprache: eng/Englisch
Buch in der Datenbank seit 2008-04-26T18:32:22+02:00 (Zurich)
Detailseite zuletzt geändert am 2023-09-05T20:04:00+02:00 (Zurich)
ISBN/EAN: 9783642011405
ISBN - alternative Schreibweisen:
3-642-01140-3, 978-3-642-01140-5
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: newton, howard, shlomo
Titel des Buches: counterterrorism
Daten vom Verlag:
Autor/in: Shlomo Argamon; Newton Howard
Titel: Computational Methods for Counterterrorism
Verlag: Springer; Springer Berlin
306 Seiten
Erscheinungsjahr: 2009-07-15
Berlin; Heidelberg; DE
Gedruckt / Hergestellt in Niederlande.
Sprache: Englisch
106,99 € (DE)
109,99 € (AT)
118,00 CHF (CH)
POD
XVIII, 306 p.
BB; Hardcover, Softcover / Informatik, EDV/Informatik; Data Mining; Verstehen; Access; Counterterrorism; Terrorist; artificial intelligence; data mining; formal concept analysis; information retrieval; knowledge discovery; networks; security; terrorism; text analyis; text mining; text search; Data Mining and Knowledge Discovery; Data and Information Security; Criminology; Natural Language Processing (NLP); Information Storage and Retrieval; Computers and Society; Wissensbasierte Systeme, Expertensysteme; Computersicherheit; Netzwerksicherheit; Verbrechen und Kriminologie (Kriminalistik); Natürliche Sprachen und maschinelle Übersetzung; Informationsrückgewinnung, Information Retrieval; Data Warehousing; Digital- und Informationstechnologien: soziale und ethische Aspekte; EA; BC
Modern terrorist networks pose an unprecedented threat to international security. Their fluid and non-hierarchical structures, their religious and ideological motivations, and their predominantly non-territorial objectives all radically complicate the question of how to neutralize them. As governments and militaries work to devise new policies and doctrines to combat terror, new technologies are desperately needed to make these efforts effective. This book collects a wide range of the most current computational research addressing critical issues for counterterrorism in a dynamic and complex threat environment: finding, summarizing, and evaluating relevant information from large and dynamic data stores; simulation and prediction of likely enemy actions and the effects of proposed counter-efforts; and producing actionable intelligence by finding meaningful patterns hidden in masses of noisy data items. The contributions are organized thematically into four sections. The first section concerns efforts to provide effective access to small amounts of relevant information buried in enormous amounts of diverse unstructured data. The second section discusses methods for the key problem of extracting meaningful information from digitized documents in various languages. The third section presents research on analyzing graphs and networks, offering new ways of discovering hidden structures in data and profiles of adversaries’ goals and intentions. Finally, the fourth section of the book describes software systems that enable analysts to model, simulate, and predict the effects of real-world conflicts. The models and methods discussed in this book are invaluable reading for governmental decision-makers designing new policies to counter terrorist threats, for members of the military, intelligence, and law enforcement communities devising counterterrorism strategiesbased on new technologies, and for academic and industrial researchers devising more effective methods for knowledge discovery in complicated and diverse datasets.Includes supplementary material: sn.pub/extras
Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783642426131 Computational Methods for Counterterrorism (Newton Howard)
< zum Archiv...