Investigative Data Mining for Security and Criminal Detection
Autor Jesus Menaen Limba Engleză Paperback – 6 apr 2003
The groundbreaking book reviews the latest data mining technologies including intelligent agents, link analysis, text mining, decision trees, self-organizing maps, machine learning, and neural networks. Using clear, understandable language, it explains the application of these technologies in such areas as computer and network security, fraud prevention, law enforcement, and national defense. International case studies throughout the book further illustrate how these technologies can be used to aid in crime prevention.
Investigative Data Mining for Security and Criminal Detection will also serve as an indispensable resource for software developers and vendors as they design new products for the law enforcement and intelligence communities.
Key Features:
* Covers cutting-edge data mining technologies available to use in evidence gathering and collection
* Includes numerous case studies, diagrams, and screen captures to illustrate real-world applications of data mining
* Easy-to-read format illustrates current and future data mining uses in preventative law enforcement, criminal profiling, counter-terrorist initiatives, and forensic science
* Introduces cutting-edge technologies in evidence gathering and collection, using clear non-technical language
* Illustrates current and future applications of data mining tools in preventative law enforcement, homeland security, and other areas of crime detection and prevention
* Shows how to construct predictive models for detecting criminal activity and for behavioral profiling of perpetrators
* Features numerous Web links, vendor resources, case studies, and screen captures illustrating the use of artificial intelligence (AI) technologies
Preț: 489.69 lei
Preț vechi: 635.95 lei
-23% Nou
Puncte Express: 735
Preț estimativ în valută:
93.87€ • 98.52$ • 77.42£
93.87€ • 98.52$ • 77.42£
Carte tipărită la comandă
Livrare economică 23 ianuarie-06 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780750676137
ISBN-10: 0750676132
Pagini: 472
Ilustrații: Approx. 100 illustrations
Dimensiuni: 178 x 235 x 21 mm
Greutate: 0.75 kg
Ediția:New.
Editura: ELSEVIER SCIENCE
ISBN-10: 0750676132
Pagini: 472
Ilustrații: Approx. 100 illustrations
Dimensiuni: 178 x 235 x 21 mm
Greutate: 0.75 kg
Ediția:New.
Editura: ELSEVIER SCIENCE
Public țintă
Government data analysts, law enforcement, investigators, counter-intelligence agents, IT security professionals, fraud specialists in government and private industryCuprins
1) Pre-Crime Data Mining
2) Investigative Data Warehousing
3) Link Analysis: Visualizing Associations
4) Intelligent Agents: Software Detectives
5) Text Mining: Clustering Concepts
6) Neural Networks: Classifying Patterns
7) Machine Learning: Developing Profiles
8) NetFraud: A Case Study
9) Criminal Patterns: Detection Techniques
10) Intrusion Detection: Techniques and Systems
11) An Entity Validation System (EVS): A Conceptual Architecture
12) Mapping Crime: Clustering CaseWork
Appendix A: 1,000 Online Sources for the Forensic Data Miner
Appendix B: Intrusion Detection Systems (IDS) Products, Services, Freeware and Projects
Glossary
2) Investigative Data Warehousing
3) Link Analysis: Visualizing Associations
4) Intelligent Agents: Software Detectives
5) Text Mining: Clustering Concepts
6) Neural Networks: Classifying Patterns
7) Machine Learning: Developing Profiles
8) NetFraud: A Case Study
9) Criminal Patterns: Detection Techniques
10) Intrusion Detection: Techniques and Systems
11) An Entity Validation System (EVS): A Conceptual Architecture
12) Mapping Crime: Clustering CaseWork
Appendix A: 1,000 Online Sources for the Forensic Data Miner
Appendix B: Intrusion Detection Systems (IDS) Products, Services, Freeware and Projects
Glossary
Recenzii
“It shows how myriad distributed data streams can be harnessed to fight crime. Through easy-to-read prose, the reader learns how to use both public and private databases and networks to find threats and minimize risks. Besides explaining how data mining is done, the book introduces the reader to such techniques as intelligent agents (software that performs user-delegated tasks autonomously), link analysis (a process involving the mapping of the associations between suspects and locations), and text mining (a process used to identify a document's content based on linguistic analysis) and how they can aid law enforcement.
For example, law enforcement in the United Kingdom use text mining to "institutionalize the knowledge of criminal perpetrators and organized gangs and groups," author Jesús Mena writes. Case studies buttress these points. This work is one of the first books to show security professionals the power of data mining as an investigative tool. As such, it is itself a powerful tool for the industry.
— Security Management
“an eye-opening and powerful book on the newest weapons in criminal and terrorist detection and deterrence. Adult readers desiring an overview can scan the introductory sections to the chapters. More detail-minded and technical readers will enjoy the challenging complexity found in follow-up case studies.
— The Chicago Sun
“The book is cleanly presented and includes screenshots of software used for data mining and analysis. Charts are used to explain how pieces of information link together in a descriptive manner, and are also used as examples of what some data analysis software can produce when used correctly.
— Security Forums
For example, law enforcement in the United Kingdom use text mining to "institutionalize the knowledge of criminal perpetrators and organized gangs and groups," author Jesús Mena writes. Case studies buttress these points. This work is one of the first books to show security professionals the power of data mining as an investigative tool. As such, it is itself a powerful tool for the industry.
— Security Management
“an eye-opening and powerful book on the newest weapons in criminal and terrorist detection and deterrence. Adult readers desiring an overview can scan the introductory sections to the chapters. More detail-minded and technical readers will enjoy the challenging complexity found in follow-up case studies.
— The Chicago Sun
“The book is cleanly presented and includes screenshots of software used for data mining and analysis. Charts are used to explain how pieces of information link together in a descriptive manner, and are also used as examples of what some data analysis software can produce when used correctly.
— Security Forums