Coverart for item
The Resource Security informatics, edited by Christopher C. Yang [and others]

Security informatics, edited by Christopher C. Yang [and others]

Label
Security informatics
Title
Security informatics
Statement of responsibility
edited by Christopher C. Yang [and others]
Contributor
Subject
Language
eng
Summary
Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners. SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field and will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics
Member of
Cataloging source
GW5XE
Dewey number
005.8
Illustrations
illustrations
Index
no index present
Language note
English
LC call number
QA76.9.A25
LC item number
S434 2010
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Yang, Christopher C
Series statement
Annals of information systems
Series volume
v. 9
http://library.link/vocab/subjectName
  • Computer security
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • Affaires
  • Science économique
  • Economie de l'entreprise
  • Computer security
Label
Security informatics, edited by Christopher C. Yang [and others]
Instantiates
Publication
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
mixed
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Framing social movement Iidentity with cyber-artifacts: a case study of the International Falun Gong Movement / Yi-Da Chen, Ahmed Abbasi, and Hsinchun Chen -- Patterns of word use for deception in testimony / David B. Skillicorn and Ayron Little -- Information integration for terrorist or criminal social networks / Christopher C. Yang and Xuning Tang -- Processing constrained k-closest pairs queries in crime databases / Shaojie Qiao [and others] -- Emergency response through higher order voronoi diagrams / Ickjai Lee [and others] -- Identity management architecture / Uwe Glässer and Mona Vajihollahi -- A game theoretic framework for multi-agent deployment in intrusion detection systems / Yi-Ming Chen, Dachrahn Wu, and Cheng-Kuang Wu -- ETKnet: a distributed network system for sharing event data and multi-facted knowledge in a collaboration federation / Stanley Y.W. Su [and others] -- Duplicate work reduction in business continuity and risk management processes / Shi-Cho Cha [and others]
Control code
663093823
Dimensions
unknown
Extent
1 online resource (vii, 170 pages)
Form of item
online
Isbn
9781441913258
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-1-4419-1325-8
Other physical details
illustrations (some color)
http://library.link/vocab/ext/overdrive/overdriveId
978-1-4419-1324-1
Specific material designation
remote
System control number
(OCoLC)663093823
Label
Security informatics, edited by Christopher C. Yang [and others]
Publication
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
mixed
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Framing social movement Iidentity with cyber-artifacts: a case study of the International Falun Gong Movement / Yi-Da Chen, Ahmed Abbasi, and Hsinchun Chen -- Patterns of word use for deception in testimony / David B. Skillicorn and Ayron Little -- Information integration for terrorist or criminal social networks / Christopher C. Yang and Xuning Tang -- Processing constrained k-closest pairs queries in crime databases / Shaojie Qiao [and others] -- Emergency response through higher order voronoi diagrams / Ickjai Lee [and others] -- Identity management architecture / Uwe Glässer and Mona Vajihollahi -- A game theoretic framework for multi-agent deployment in intrusion detection systems / Yi-Ming Chen, Dachrahn Wu, and Cheng-Kuang Wu -- ETKnet: a distributed network system for sharing event data and multi-facted knowledge in a collaboration federation / Stanley Y.W. Su [and others] -- Duplicate work reduction in business continuity and risk management processes / Shi-Cho Cha [and others]
Control code
663093823
Dimensions
unknown
Extent
1 online resource (vii, 170 pages)
Form of item
online
Isbn
9781441913258
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-1-4419-1325-8
Other physical details
illustrations (some color)
http://library.link/vocab/ext/overdrive/overdriveId
978-1-4419-1324-1
Specific material designation
remote
System control number
(OCoLC)663093823

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...