National Security: Handbooks in Information Systems, cartea 2
Autor H.h. Chen, Raghu Santanam, R. Ramesh, Ajay S. Vinze, Daniel D. Zengen Limba Engleză Hardback – 30 mai 2007
This book is intended to be used as both a textbook and a comprehensive research handbook. The contributors to this edited volume are renowned experts in their respective fields. Most of the chapters contained in this book provide an updated comprehensive survey of the related field and also specific findings from cutting-edging innovative research. To facilitate its adoption as a textbook, all the authors have included specific discussion questions that could be utilized to stimulate discussions and potentially further research in the area.
*Addresses three major areas of national and international security research from an information systems-centric perspective
*Focuses on legal and policy frameworks, intelligence and security informatics, and emergency preparedness and infrastructure protection
*Real-world case studies are used as examples to provide specific insights
Preț: 1687.00 lei
Preț vechi: 2190.91 lei
-23% Nou
Puncte Express: 2531
Preț estimativ în valută:
322.89€ • 335.82$ • 270.58£
322.89€ • 335.82$ • 270.58£
Carte tipărită la comandă
Livrare economică 13-27 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780444519962
ISBN-10: 0444519963
Pagini: 444
Dimensiuni: 156 x 234 x 27 mm
Greutate: 0.79 kg
Editura: Emerald Publishing
Seria Handbooks in Information Systems
ISBN-10: 0444519963
Pagini: 444
Dimensiuni: 156 x 234 x 27 mm
Greutate: 0.79 kg
Editura: Emerald Publishing
Seria Handbooks in Information Systems
Public țintă
The intended audience for this book includes:• Graduate and advanced undergraduate level students in Information Sciences, Information Systems, Computer Science, Systems Engineering, Social Studies, and Public Policy.
• Researchers engaged in national security-related research from a wide range of perspectives including but not limited to informatics, decision sciences, organizational behavior and social studies, and public administration.
• Public officials in all security-related areas such as law enforcement, public health, anti-terrorism, and policy-making.
• Private sector practitioners engaged in on-going relationships with federal, state and local agencies on projects related to national security.
Cuprins
Preface
Part I: Legal and Policy Frameworks.
Chapter 1: Should commercial misuse of private data be a crime?
Chapter 2: National Information Technology security policies: an overview of issues.
Chapter 3: Economics of the information security investment.
Part II: Intelligence and Security Informatics.
Chapter 4: State of 3D face biometrics for homeland security applications.
Chapter 5: The necessity of fuzzy logic for identity matching.
Chapter 6: Managing real-time bioterrorism surveillance data.
Chapter 7: Spatio-Temporal Data Analysis in Security Informatics.
Chapter 8: Deception and Intention Detection.
Chapter 9: Identification of hidden groups in communications.
Chapter 10: Social network analysis for terrorism research.
Part III: Emergency Preparedness &Infrastructure Protection.
Chapter 11: Disaster response and the local public health department.
Chapter 12: Challenges of bioterrorism preparedness for organizational processes and resources.
Chapter 13: PulseNet: A secure network for real-time global sharing of critical public health information to provide early warning on foodborne disease outbreaks and emergency foodborne pathogens.
Chapter 14: Government agency interoperability in security applications.
Chapter 15: Process-centric risk management framework for information security.
Chapter 16: Intrusion detection and information infrastructure protection.
Chapter 17: Anomaly Based Security Framework for Network Centric Systems.
Part I: Legal and Policy Frameworks.
Chapter 1: Should commercial misuse of private data be a crime?
Chapter 2: National Information Technology security policies: an overview of issues.
Chapter 3: Economics of the information security investment.
Part II: Intelligence and Security Informatics.
Chapter 4: State of 3D face biometrics for homeland security applications.
Chapter 5: The necessity of fuzzy logic for identity matching.
Chapter 6: Managing real-time bioterrorism surveillance data.
Chapter 7: Spatio-Temporal Data Analysis in Security Informatics.
Chapter 8: Deception and Intention Detection.
Chapter 9: Identification of hidden groups in communications.
Chapter 10: Social network analysis for terrorism research.
Part III: Emergency Preparedness &Infrastructure Protection.
Chapter 11: Disaster response and the local public health department.
Chapter 12: Challenges of bioterrorism preparedness for organizational processes and resources.
Chapter 13: PulseNet: A secure network for real-time global sharing of critical public health information to provide early warning on foodborne disease outbreaks and emergency foodborne pathogens.
Chapter 14: Government agency interoperability in security applications.
Chapter 15: Process-centric risk management framework for information security.
Chapter 16: Intrusion detection and information infrastructure protection.
Chapter 17: Anomaly Based Security Framework for Network Centric Systems.