|
|
|
|
LEADER |
03088nam a22005655i 4500 |
001 |
6072 |
003 |
DE-He213 |
005 |
20130725192719.0 |
007 |
cr nn 008mamaa |
008 |
100301s2009 au | s |||| 0|eng d |
020 |
# |
# |
|a 9783211094426
|9 978-3-211-09442-6
|
024 |
7 |
# |
|a 10.1007/978-3-211-09442-6
|2 doi
|
050 |
# |
4 |
|a QA276-280
|
072 |
# |
7 |
|a UYAM
|2 bicssc
|
072 |
# |
7 |
|a UFM
|2 bicssc
|
072 |
# |
7 |
|a COM077000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.55
|2 23
|
100 |
1 |
# |
|a Memon, Nasrullah.
|e editor.
|
245 |
1 |
0 |
|a Mathematical Methods in Counterterrorism
|c edited by Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben Rosenorn.
|h [electronic resource] /
|
250 |
# |
# |
|a 1.
|
264 |
# |
1 |
|a Vienna :
|b Springer Vienna,
|c 2009.
|
300 |
# |
# |
|a XIII, 389 p., 124 Figs.
|b online resource.
|
336 |
# |
# |
|a text
|b txt
|2 rdacontent
|
337 |
# |
# |
|a computer
|b c
|2 rdamedia
|
338 |
# |
# |
|a online resource
|b cr
|2 rdacarrier
|
347 |
# |
# |
|a text file
|b PDF
|2 rda
|
505 |
0 |
# |
|a Mathematical Methods in Counterterrorism: Tools and Techniques for a New Challenge -- Network Analysis -- Forecasting -- Communication/Interpretation -- Behavior -- Game Theory -- History of the Conference on Mathematical Methods in Counterterrorism.
|
520 |
# |
# |
|a The present work presents the most current research from mathematicians and computer scientists from around the world to develop strategies for counterterrorism and homeland security to the broader public. New mathematical and computational technique concepts are applied to counterterrorism and computer security problems. Topics covered include strategies for disrupting terrorist cells, border penetration and security, terrorist cell formation and growth, data analysis of terrorist activity, terrorism deterrence strategies, information security, emergency response and planning. Since 2001, tremendous amounts of information have been gathered regarding terrorist cells and individuals potentially planning future attacks. This book addresses this need to develop new countermeasures. Interested readers include researchers, policy makers, politicians, and the members of intelligence and law enforcement agencies.
|
650 |
# |
0 |
|a Computer science.
|
650 |
# |
0 |
|a Algebra
|x Data processing.
|
650 |
# |
0 |
|a Algebra.
|
650 |
# |
0 |
|a Criminology.
|
650 |
# |
0 |
|a Political science.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Probability and Statistics in Computer Science.
|
650 |
2 |
4 |
|a Political Science.
|
650 |
2 |
4 |
|a Criminology & Criminal Justice.
|
650 |
2 |
4 |
|a Math Applications in Computer Science.
|
650 |
2 |
4 |
|a Order, Lattices, Ordered Algebraic Structures.
|
650 |
2 |
4 |
|a Symbolic and Algebraic Manipulation.
|
700 |
1 |
# |
|a David Farley, Jonathan.
|e editor.
|
700 |
1 |
# |
|a Hicks, David L.
|e editor.
|
700 |
1 |
# |
|a Rosenorn, Torben.
|e editor.
|
710 |
2 |
# |
|a SpringerLink (Online service)
|
773 |
0 |
# |
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783211094419
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-211-09442-6
|
912 |
# |
# |
|a ZDB-2-SCS
|
950 |
# |
# |
|a Computer Science (Springer-11645)
|