Chen / Santanam / Ramesh | National Security | Buch | 978-0-444-51996-2 | sack.de

Buch, Englisch, Band 2, 442 Seiten, HC gerader Rücken kaschiert, Format (B × H): 161 mm x 240 mm, Gewicht: 830 g

Reihe: Handbooks in Information Systems

Chen / Santanam / Ramesh

National Security

Buch, Englisch, Band 2, 442 Seiten, HC gerader Rücken kaschiert, Format (B × H): 161 mm x 240 mm, Gewicht: 830 g

Reihe: Handbooks in Information Systems

ISBN: 978-0-444-51996-2
Verlag: Elsevier Science Ltd


This edited volume is intended to address in a comprehensive and integrated manner three major areas of national and international security research from an information systems-centric perspective: legal and policy frameworks; intelligence and security informatics; and emergency preparedness and infrastructure protection. The discussions are replete with real-world case studies and examples that present the concepts using an integrated, action-oriented and theory-based approach to validate the frameworks presented and to provide specific insights on the technical approaches and organizational issues under investigation.

This book is intended to be used as both a textbook and a comprehensive research handbook. The contributors to this edited volume are renowned experts in their respective fields. Most of the chapters contained in this book provide an updated comprehensive survey of the related field and also specific findings from cutting-edging innovative research. To facilitate its adoption as a textbook, all the authors have included specific discussion questions that could be utilized to stimulate discussions and potentially further research in the area.

- Addresses three major areas of national and international security research from an information systems-centric perspective
- Focuses on legal and policy frameworks, intelligence and security informatics, and emergency preparedness and infrastructure protection
- Real-world case studies are used as examples to provide specific insights
Chen / Santanam / Ramesh National Security jetzt bestellen!

Weitere Infos & Material


Preface
Part I: Legal and Policy Frameworks.
Chapter 1: Should commercial misuse of private data be a crime.
Chapter 2: National Information Technology security policies: an overview of issues.
Chapter 3: Economics of the information security investment.
Part II: Intelligence and Security Informatics.
Chapter 4: State of 3D face biometrics for homeland security applications.
Chapter 5: The necessity of fuzzy logic for identity matching.
Chapter 6: Managing real-time bioterrorism surveillance data.
Chapter 7: Spatio-Temporal Data Analysis in Security Informatics.
Chapter 8: Deception and Intention Detection.
Chapter 9: Identification of hidden groups in communications.
Chapter 10: Social network analysis for terrorism research.
Part III: Emergency Preparedness & Infrastructure Protection.
Chapter 11: Disaster response and the local public health department.
Chapter 12: Challenges of bioterrorism preparedness for organizational processes and resources.
Chapter 13: PulseNet: A secure network for real-time global sharing of critical public health information to provide early warning on foodborne disease outbreaks and emergency foodborne pathogens.
Chapter 14: Government agency interoperability in security applications.
Chapter 15: Process-centric risk management framework for information security.
Chapter 16: Intrusion detection and information infrastructure protection.
Chapter 17: Anomaly Based Security Framework for Network Centric Systems.


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.