Cantitate/Preț
Produs

National Security: Handbooks in Information Systems, cartea 2

Autor H.h. Chen, Raghu Santanam, R. Ramesh, Ajay S. Vinze, Daniel D. Zeng
en Limba Engleză Hardback – 30 mai 2007
This edited volume is intended to address in a comprehensive and integrated manner three major areas of national and international security research from an information systems-centric perspective: legal and policy frameworks; intelligence and security informatics; and emergency preparedness and infrastructure protection. The discussions are replete with real-world case studies and examples that present the concepts using an integrated, action-oriented and theory-based approach to validate the frameworks presented and to provide specific insights on the technical approaches and organizational issues under investigation.

This book is intended to be used as both a textbook and a comprehensive research handbook. The contributors to this edited volume are renowned experts in their respective fields. Most of the chapters contained in this book provide an updated comprehensive survey of the related field and also specific findings from cutting-edging innovative research. To facilitate its adoption as a textbook, all the authors have included specific discussion questions that could be utilized to stimulate discussions and potentially further research in the area.

*Addresses three major areas of national and international security research from an information systems-centric perspective
*Focuses on legal and policy frameworks, intelligence and security informatics, and emergency preparedness and infrastructure protection
*Real-world case studies are used as examples to provide specific insights
Citește tot Restrânge

Preț: 168700 lei

Preț vechi: 219091 lei
-23% Nou

Puncte Express: 2531

Preț estimativ în valută:
32289 33582$ 27058£

Carte tipărită la comandă

Livrare economică 13-27 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780444519962
ISBN-10: 0444519963
Pagini: 444
Dimensiuni: 156 x 234 x 27 mm
Greutate: 0.79 kg
Editura: Emerald Publishing
Seria Handbooks in Information Systems


Public țintă

The intended audience for this book includes:
• Graduate and advanced undergraduate level students in Information Sciences, Information Systems, Computer Science, Systems Engineering, Social Studies, and Public Policy.
• Researchers engaged in national security-related research from a wide range of perspectives including but not limited to informatics, decision sciences, organizational behavior and social studies, and public administration.
• Public officials in all security-related areas such as law enforcement, public health, anti-terrorism, and policy-making.
• Private sector practitioners engaged in on-going relationships with federal, state and local agencies on projects related to national security.

Cuprins

Preface
Part I: Legal and Policy Frameworks.
Chapter 1: Should commercial misuse of private data be a crime?
Chapter 2: National Information Technology security policies: an overview of issues.
Chapter 3: Economics of the information security investment.
Part II: Intelligence and Security Informatics.
Chapter 4: State of 3D face biometrics for homeland security applications.
Chapter 5: The necessity of fuzzy logic for identity matching.
Chapter 6: Managing real-time bioterrorism surveillance data.
Chapter 7: Spatio-Temporal Data Analysis in Security Informatics.
Chapter 8: Deception and Intention Detection.
Chapter 9: Identification of hidden groups in communications.
Chapter 10: Social network analysis for terrorism research.
Part III: Emergency Preparedness &Infrastructure Protection.
Chapter 11: Disaster response and the local public health department.
Chapter 12: Challenges of bioterrorism preparedness for organizational processes and resources.
Chapter 13: PulseNet: A secure network for real-time global sharing of critical public health information to provide early warning on foodborne disease outbreaks and emergency foodborne pathogens.
Chapter 14: Government agency interoperability in security applications.
Chapter 15: Process-centric risk management framework for information security.
Chapter 16: Intrusion detection and information infrastructure protection.
Chapter 17: Anomaly Based Security Framework for Network Centric Systems.