Applications of information systems to homeland security and defense

A range of threats in the areas of safety and security, from natural disasters to terrorism to conventional warfare, involve complex interactions that are beyond the scope and capabilities of traditional problem solving techniques. Applications of Information Systems to Homeland Security and Defense...

Full description

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Abbass, Hussein A., Essam, Daryl, 1969-
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2006.
Subjects:
Online Access:View fulltext via EzAccess
LEADER 03526nam a2200505 a 4500
001 29164
003 IGIG
005 20100526134412.0
006 m e d
007 cr cn||||m|||a
008 100518s2006 pauab sb 001 0 eng d
010 # # |z 2005013549 
020 # # |a 9781591406433 (PDF) 
020 # # |a 1591406439 (PDF) 
020 # # |z 9781591406402 (hardcover) 
020 # # |z 1591406404 (hardcover) 
020 # # |z 9781591406419 (softcover) 
020 # # |z 1591406412 (softcover) 
024 7 # |a 10.4018/978-1-59140-640-2  |2 doi 
035 # # |a (CaBNVSL)gtp00540320 
035 # # |a (OCoLC)707617025 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
043 # # |a n-us--- 
050 # 4 |a UG479  |b .A67 2006e 
082 0 4 |a 363.32/0285  |2 22 
245 0 0 |a Applications of information systems to homeland security and defense  |c Hussein A. Abbass, Daryl Essam [editors].  |h [electronic resource] / 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c c2006. 
300 # # |a electronic texts (xii, 257 p. : ill. (some col.), col. maps) :  |b digital files. 
504 # # |a Includes bibliographical references and index. 
505 0 # |a 1. All hazards analysis : a complexity perspective / Daryl Essam, Hussein A. Abbass -- 2. Small & simple : application-specific multi-agent systems / Michael Barlow, Robert Cox -- 3. How hard is it to red team? / Ang Yang, Hussein A. Abbass, Ruhul Sarker -- 4. Network robustness for critical infrastructure networks / Anthony H. Dekker, Bernard Colbert -- 5. Distributed intrusion detection systems : a computational intelligence approach / Ajith Abraham, Johnson Thomas -- 6. The game of defense and security / Michael Barlow -- 7. Realized applications of positioning technologies in defense intelligence / Katina Michael, Amelia Masters -- 8. The advancement of positioning technologies in defense intelligence / Katina Michael, Amelia Masters -- 9. Simulating complexity-based ethics for crucial decision making in counter terrorism / Cecilia Andrews, Edward Lewis. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 # # |a A range of threats in the areas of safety and security, from natural disasters to terrorism to conventional warfare, involve complex interactions that are beyond the scope and capabilities of traditional problem solving techniques. Applications of Information Systems to Homeland Security and Defense provides an overview of complex systems' techniques and presents both guidelines and specific instances of how they can be applied to security and defense applications. In today's uncertain times, these techniques can provide a breakthrough in the capability to model, plan and respond to critical events in modern society. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Title from PDF t.p. (viewed on May 18, 2010). 
650 # 0 |a Artificial intelligence  |x Military applications. 
650 # 0 |a Information storage and retrieval systems. 
650 # 0 |a National security  |x Technological innovations  |z United States. 
650 # 0 |a Military art and science  |x Data processing. 
650 # 0 |a Terrorism  |x Prevention  |x Technological innovations  |z United States. 
700 1 # |a Abbass, Hussein A. 
700 1 # |a Essam, Daryl,  |d 1969- 
710 2 # |a IGI Global. 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-640-2  |z View fulltext via EzAccess