Programming Books C Java PHP Python Learn more Browse Programming Books

Sorry, this item is not available in
Image not available for
Color:
Image not available

To view this video download Flash Player

 


or
Sign in to turn on 1-Click ordering
More Buying Choices
Have one to sell? Sell yours here
Tell the Publisher!
I'd like to read this book on Kindle

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security (Integrated Series in Information Systems) [Hardcover]

Hsinchun Chen , Edna Reid , Joshua Sinai , Andrew Silke , Boaz Ganor
1.0 out of 5 stars  See all reviews (1 customer review)

List Price: $229.00
Price: $217.55 & FREE Shipping. Details
You Save: $11.45 (5%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 1 left in stock.
Ships from and sold by Amazon.com. Gift-wrap available.
Want it Monday, July 14? Choose One-Day Shipping at checkout. Details
Free Two-Day Shipping for College Students with Amazon Student

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Book Description

July 30, 2008 1402065841 978-1402065842 2008

This book is nothing less than a complete and comprehensive survey of the state-of-the-art of terrorism informatics. It covers the application of advanced methodologies and information fusion and analysis. It also lays out techniques to acquire, integrate, process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The book details three major areas of terrorism research: prevention, detection, and established governmental responses to terrorism. It systematically examines the current and ongoing research, including recent case studies and application of terrorism informatics techniques. The coverage then presents the critical and relevant social/technical areas to terrorism research including social, privacy, data confidentiality, and legal challenges.


Editorial Reviews

Review

From the reviews:

"The title of this book might imply, at first sight, a US-centric approach to the topic, but in fact, the contributions are not only from the US, but also from Canada … India, and Israel. … A particularly good feature of this book is the back matter included at the end of each chapter: suggested readings, online resources, and discussion questions … . This edited volume should appeal to the growing terrorism informatics research community, graduate students, and readers in the wider community … ." (John Fulcher, ACM Computing Reviews, May, 2009)

From the Back Cover

Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are derived from Computer Science, Informatics, Statistics, Mathematics, Linguistics, Social Sciences, and Public Policy and these methods are involved in the collection of huge amounts of information from varied and multiple sources and of many types in numerous languages. Information fusion and information technology analysis techniques—which include data mining, data integration, language translation technologies, and image and video processing—play central roles in the prevention, detection, and remediation of terrorism.

 

Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security will provide an interdisciplinary and comprehensive survey of the state-of-the-art in the terrorism informatics domain along three basic dimensions: methodological issues in terrorism research; information infusion techniques to support terrorism prevention, detection, and response; and legal, social, privacy, and data confidentiality challenges and approaches. Featuring contributions by leading researchers and practitioners, illustrative case studies, and applications of terrorism informatics techniques, the book will be an essential resource for scientists, security professionals, counterterrorism experts, and policy makers.


Product Details

  • Series: Integrated Series in Information Systems (Book 18)
  • Hardcover: 558 pages
  • Publisher: Springer; 2008 edition (July 30, 2008)
  • Language: English
  • ISBN-10: 1402065841
  • ISBN-13: 978-1402065842
  • ASIN: 0387716122
  • Product Dimensions: 9.4 x 5.9 x 1.2 inches
  • Shipping Weight: 2.5 pounds (View shipping rates and policies)
  • Average Customer Review: 1.0 out of 5 stars  See all reviews (1 customer review)
  • Amazon Best Sellers Rank: #2,667,765 in Books (See Top 100 in Books)

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

1.0 out of 5 stars
(1)
1.0 out of 5 stars
5 star
0
4 star
0
3 star
0
2 star
0
Share your thoughts with other customers
Most Helpful Customer Reviews
1 of 6 people found the following review helpful
1.0 out of 5 stars BLA BLA BLA BLA BLA BLA BLA BLA BLA February 5, 2012
Format:Hardcover
nothing that you can code, just researcher's bla bla bla . The reference to Data Mining is extremely basic ..why is Amazon selling this ?
Comment | 
Was this review helpful to you?
Search Customer Reviews
Search these reviews only

Sell a Digital Version of This Book in the Kindle Store

If you are a publisher or author and hold the digital rights to a book, you can sell a digital version of it in our Kindle Store. Learn more

Forums

There are no discussions about this product yet.
Be the first to discuss this product with the community.
Start a new discussion
Topic:
First post:
Prompts for sign-in
 



Look for Similar Items by Category