|
|
|
|
LEADER |
03526nam a2200505 a 4500 |
001 |
29164 |
003 |
IGIG |
005 |
20100526134412.0 |
006 |
m e d |
007 |
cr cn||||m|||a |
008 |
100518s2006 pauab sb 001 0 eng d |
010 |
# |
# |
|z 2005013549
|
020 |
# |
# |
|a 9781591406433 (PDF)
|
020 |
# |
# |
|a 1591406439 (PDF)
|
020 |
# |
# |
|z 9781591406402 (hardcover)
|
020 |
# |
# |
|z 1591406404 (hardcover)
|
020 |
# |
# |
|z 9781591406419 (softcover)
|
020 |
# |
# |
|z 1591406412 (softcover)
|
024 |
7 |
# |
|a 10.4018/978-1-59140-640-2
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00540320
|
035 |
# |
# |
|a (OCoLC)707617025
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
043 |
# |
# |
|a n-us---
|
050 |
# |
4 |
|a UG479
|b .A67 2006e
|
082 |
0 |
4 |
|a 363.32/0285
|2 22
|
245 |
0 |
0 |
|a Applications of information systems to homeland security and defense
|c Hussein A. Abbass, Daryl Essam [editors].
|h [electronic resource] /
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c c2006.
|
300 |
# |
# |
|a electronic texts (xii, 257 p. : ill. (some col.), col. maps) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references and index.
|
505 |
0 |
# |
|a 1. All hazards analysis : a complexity perspective / Daryl Essam, Hussein A. Abbass -- 2. Small & simple : application-specific multi-agent systems / Michael Barlow, Robert Cox -- 3. How hard is it to red team? / Ang Yang, Hussein A. Abbass, Ruhul Sarker -- 4. Network robustness for critical infrastructure networks / Anthony H. Dekker, Bernard Colbert -- 5. Distributed intrusion detection systems : a computational intelligence approach / Ajith Abraham, Johnson Thomas -- 6. The game of defense and security / Michael Barlow -- 7. Realized applications of positioning technologies in defense intelligence / Katina Michael, Amelia Masters -- 8. The advancement of positioning technologies in defense intelligence / Katina Michael, Amelia Masters -- 9. Simulating complexity-based ethics for crucial decision making in counter terrorism / Cecilia Andrews, Edward Lewis.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
# |
# |
|a A range of threats in the areas of safety and security, from natural disasters to terrorism to conventional warfare, involve complex interactions that are beyond the scope and capabilities of traditional problem solving techniques. Applications of Information Systems to Homeland Security and Defense provides an overview of complex systems' techniques and presents both guidelines and specific instances of how they can be applied to security and defense applications. In today's uncertain times, these techniques can provide a breakthrough in the capability to model, plan and respond to critical events in modern society.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Title from PDF t.p. (viewed on May 18, 2010).
|
650 |
# |
0 |
|a Artificial intelligence
|x Military applications.
|
650 |
# |
0 |
|a Information storage and retrieval systems.
|
650 |
# |
0 |
|a National security
|x Technological innovations
|z United States.
|
650 |
# |
0 |
|a Military art and science
|x Data processing.
|
650 |
# |
0 |
|a Terrorism
|x Prevention
|x Technological innovations
|z United States.
|
700 |
1 |
# |
|a Abbass, Hussein A.
|
700 |
1 |
# |
|a Essam, Daryl,
|d 1969-
|
710 |
2 |
# |
|a IGI Global.
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-640-2
|z View fulltext via EzAccess
|