Mathematical Methods in Counterterrorism

The present work presents the most current research from mathematicians and computer scientists from around the world to develop strategies for counterterrorism and homeland security to the broader public. New mathematical and computational technique concepts are applied to counterterrorism and comp...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Memon, Nasrullah. (Editor), David Farley, Jonathan. (Editor), Hicks, David L. (Editor), Rosenorn, Torben. (Editor)
Format: Electronic
Language:English
Published: Vienna : Springer Vienna, 2009.
Edition:1.
Subjects:
Online Access:https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-211-09442-6
LEADER 03088nam a22005655i 4500
001 6072
003 DE-He213
005 20130725192719.0
007 cr nn 008mamaa
008 100301s2009 au | s |||| 0|eng d
020 # # |a 9783211094426  |9 978-3-211-09442-6 
024 7 # |a 10.1007/978-3-211-09442-6  |2 doi 
050 # 4 |a QA276-280 
072 # 7 |a UYAM  |2 bicssc 
072 # 7 |a UFM  |2 bicssc 
072 # 7 |a COM077000  |2 bisacsh 
082 0 4 |a 005.55  |2 23 
100 1 # |a Memon, Nasrullah.  |e editor. 
245 1 0 |a Mathematical Methods in Counterterrorism  |c edited by Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben Rosenorn.  |h [electronic resource] / 
250 # # |a 1. 
264 # 1 |a Vienna :  |b Springer Vienna,  |c 2009. 
300 # # |a XIII, 389 p., 124 Figs.  |b online resource. 
336 # # |a text  |b txt  |2 rdacontent 
337 # # |a computer  |b c  |2 rdamedia 
338 # # |a online resource  |b cr  |2 rdacarrier 
347 # # |a text file  |b PDF  |2 rda 
505 0 # |a Mathematical Methods in Counterterrorism: Tools and Techniques for a New Challenge -- Network Analysis -- Forecasting -- Communication/Interpretation -- Behavior -- Game Theory -- History of the Conference on Mathematical Methods in Counterterrorism. 
520 # # |a The present work presents the most current research from mathematicians and computer scientists from around the world to develop strategies for counterterrorism and homeland security to the broader public. New mathematical and computational technique concepts are applied to counterterrorism and computer security problems. Topics covered include strategies for disrupting terrorist cells, border penetration and security, terrorist cell formation and growth, data analysis of terrorist activity, terrorism deterrence strategies, information security, emergency response and planning. Since 2001, tremendous amounts of information have been gathered regarding terrorist cells and individuals potentially planning future attacks. This book addresses this need to develop new countermeasures. Interested readers include researchers, policy makers, politicians, and the members of intelligence and law enforcement agencies. 
650 # 0 |a Computer science. 
650 # 0 |a Algebra  |x Data processing. 
650 # 0 |a Algebra. 
650 # 0 |a Criminology. 
650 # 0 |a Political science. 
650 1 4 |a Computer Science. 
650 2 4 |a Probability and Statistics in Computer Science. 
650 2 4 |a Political Science. 
650 2 4 |a Criminology & Criminal Justice. 
650 2 4 |a Math Applications in Computer Science. 
650 2 4 |a Order, Lattices, Ordered Algebraic Structures. 
650 2 4 |a Symbolic and Algebraic Manipulation. 
700 1 # |a David Farley, Jonathan.  |e editor. 
700 1 # |a Hicks, David L.  |e editor. 
700 1 # |a Rosenorn, Torben.  |e editor. 
710 2 # |a SpringerLink (Online service) 
773 0 # |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783211094419 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-211-09442-6 
912 # # |a ZDB-2-SCS 
950 # # |a Computer Science (Springer-11645)