000 | 09363cam a2201165 a 4500 | ||
---|---|---|---|
001 | ocm85784221 | ||
003 | OCoLC | ||
005 | 20240523125529.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 070307s2006 njuac ob 001 0 eng d | ||
040 |
_aDG1 _beng _epn _cDG1 _dOKU _dBTCTA _dDG1 _dOCLCQ _dIEEEE _dOCLCQ _dCDN _dN$T _dYDXCP _dTEFOD _dIDEBK _dE7B _dOCLCE _dCUS _dDG1 _dOCLCQ _dMHW _dOCLCQ _dB24X7 _dAU@ _dSNK _dOCLCQ _dCOO _dDEBSZ _dOCLCO _dMUX _dNRU _dUKDOC _dOCLCF _dOCLCO _dOCLCQ _dTEFOD _dEBLCP _dOCLCQ _dNLGGC _dOCL _dDG1 _dLIP _dOTZ _dOCLCQ _dOCLCA _dOCLCO _dUAB _dKIJ _dOCLCO _dOCLCQ _dCEF _dOCLCQ _dWYU _dYOU _dU3W _dOCLCQ _dSFB _dLEAUB _dUX1 _dOL$ _dOCLCA _dUKUOP _dOCLCO _dOCLCQ _dOCLCO _dOCLCL _dOCLCQ _dOCLCL |
||
015 |
_aGBA592520 _2bnb |
||
016 | 7 |
_z013326278 _2Uk |
|
019 |
_a74174814 _a85899323 _a181838151 _a225356712 _a646531895 _a647800413 _a654684443 _a657639616 _a669008721 _a697609113 _a712984176 _a727430934 _a839658403 _a990410742 _a994899479 _a1013526326 _a1027273921 _a1038736808 _a1044319468 _a1056401494 _a1058088786 _a1058677929 _a1060871148 _a1060951655 _a1061045609 _a1064925758 _a1075567056 _a1078024621 _a1081081146 _a1086515359 _a1127217402 |
||
020 | _a047178656X | ||
020 | _a9780471786566 | ||
020 |
_a0471786551 _q(electronic bk.) |
||
020 |
_a9780471786559 _q(electronic bk.) |
||
020 | _a9780470874103 | ||
020 | _a0470874104 | ||
020 | _a9786610650019 | ||
020 | _a6610650012 | ||
020 | _z0471776157 | ||
020 | _z9780471776154 | ||
024 | 7 |
_a10.1002/047178656X _2doi |
|
029 | 1 |
_aAU@ _b000041524287 |
|
029 | 1 |
_aAU@ _b000042132981 |
|
029 | 1 |
_aAU@ _b000048761284 |
|
029 | 1 |
_aAU@ _b000051478789 |
|
029 | 1 |
_aCHBIS _b005952419 |
|
029 | 1 |
_aCHNEW _b000928469 |
|
029 | 1 |
_aCHVBK _b480087881 |
|
029 | 1 |
_aDEBSZ _b37742725X |
|
029 | 1 |
_aDEBSZ _b400439557 |
|
029 | 1 |
_aDEBSZ _b430359039 |
|
029 | 1 |
_aGBVCP _b714992585 |
|
029 | 1 |
_aNLGGC _b297814605 |
|
029 | 1 |
_aNLGGC _b346289580 |
|
029 | 1 |
_aYDXCP _b2483183 |
|
035 |
_a(OCoLC)85784221 _z(OCoLC)74174814 _z(OCoLC)85899323 _z(OCoLC)181838151 _z(OCoLC)225356712 _z(OCoLC)646531895 _z(OCoLC)647800413 _z(OCoLC)654684443 _z(OCoLC)657639616 _z(OCoLC)669008721 _z(OCoLC)697609113 _z(OCoLC)712984176 _z(OCoLC)727430934 _z(OCoLC)839658403 _z(OCoLC)990410742 _z(OCoLC)994899479 _z(OCoLC)1013526326 _z(OCoLC)1027273921 _z(OCoLC)1038736808 _z(OCoLC)1044319468 _z(OCoLC)1056401494 _z(OCoLC)1058088786 _z(OCoLC)1058677929 _z(OCoLC)1060871148 _z(OCoLC)1060951655 _z(OCoLC)1061045609 _z(OCoLC)1064925758 _z(OCoLC)1075567056 _z(OCoLC)1078024621 _z(OCoLC)1081081146 _z(OCoLC)1086515359 _z(OCoLC)1127217402 |
||
037 |
_a112100957 _bWiley InterScience _nhttp://www3.interscience.wiley.com |
||
037 |
_a431CF031-D971-4E3D-B692-1C66C0549D16 _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
042 | _adlr | ||
043 | _an-us--- | ||
050 | 4 |
_aHV6431 _b.E487 2006eb |
|
072 | 7 |
_aPOL _x014000 _2bisacsh |
|
082 | 0 | 4 |
_a363.3202854 _222 |
049 | _aMAIN | ||
245 | 0 | 0 |
_aEmergent information technologies and enabling policies for counter-terrorism / _cedited by Robert L. Popp, John Yen. |
260 |
_aHoboken, N.J. : _bWiley-Interscience ; _aChichester : _bJohn Wiley [distributor], _c�2006. |
||
300 |
_a1 online resource (xv, 468 pages) : _billustrations, portrait |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 | _aIEEE Press series on computational intelligence | |
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aUtilizing information and social science technology to understand and counter the twenty-first century strategic threat / Robert L. Popp, David Allen, and Claudio Cioffi-Revilla -- Hidden Markov models and Bayesian networks for counter-terrorism / Krishna Pattipati [and others] -- Anticipatory models for counter-terrorism / Mark Lazaroff and David Snowden -- Information processing at very high speed data ingestion rates / J. Brian Sharkey [and others] -- Analysis of heterogeneous data in ultrahigh dimensions / R.A. Ammar [and others] -- Sematic web technologies for terrorist network analysis / Jennifer Golbeck, Aaron Mannes, and James Hendler -- Improving national and homeland security through context knowledge representation and reasoning technologies / Nazli Choucri, Stuart E. Madnick, and Michael D. Siegel -- Anonymized semantic directories and a privacy-enhancing architecture for enterprise discovery / Jeff Jonas and John Karat -- Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies / Brian Kettler, Gary Edwards, and Mark Hoffman -- Applying semantic web reasoning to counter-terrorism / Paul Kogut [and others] -- Schemer : consensus-based knowledge validation and collaboration services for virtual teams of intelligence experts / Clifford Behrens, Hyong-Sop Shim, and Davaisis Bassu -- Sharing intelligence using information supply chains / Shuang Sun, Xiaocong Fan, and John Yen -- Supporting knowledge management in emergency crisis management domains : envisioned designs for collaborative work / Michael D. McNeese . [and others] -- Agent-based simulations for disaster rescue using the DEFACTO coordination system / Janusz Marecki, Nathan Schurr, and Milind Tambe -- Transcending the tower of Babel : supporting access to multilingual information with cross-language information retrieval / Douglas W. Oard -- Journey from analysis to inquiry : technology and transformation of counter-terrorism analysis / Aaron B. Frank and Desmond Saunders-Newton -- Behavioral network analysis for terrorist detection / Seth A. Greenblatt, Thayne Coffman, and Sherry E. Marcus -- Detecting terrorist activities in the twenty-first century : a theory of detection for transactional networks / Tom Mifflin [and others] -- Social network analysis via matrix decompositions / D.B. Skillicorn -- Legal standards for data mining / Fred H. Cate -- Privacy and consequences : legal and policy structures for implementing new counter-terrorism technologies and protecting civil liberty / Paul Rosenzweig -- Designing technical systems to support policy : enterprise architecture, policy appliances and civil liberties / K.A. Taipale. | |
520 | _aExplores both counter-terrorism and enabling policy dimensions of emerging information technologies in national securityAfter the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks | ||
506 |
_3Use copy _fRestrictions unspecified _2star _5MiAaHDL |
||
533 |
_aElectronic reproduction. _b[Place of publication not identified] : _cHathiTrust Digital Library, _d2010. _5MiAaHDL |
||
538 |
_aMaster and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. _uhttp://purl.oclc.org/DLF/benchrepro0212 _5MiAaHDL |
||
583 | 1 |
_adigitized _c2010 _hHathiTrust Digital Library _lcommitted to preserve _2pda _5MiAaHDL |
|
546 | _aEnglish. | ||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 |
_aTerrorism _zUnited States _xPrevention. |
|
650 | 0 |
_aTerrorism _xGovernment policy _zUnited States. |
|
650 | 0 |
_aTerrorism _xTechnological innovations _zUnited States. |
|
650 | 0 |
_aInformation technology _xGovernment policy _zUnited States. |
|
650 | 6 |
_aTerrorisme _xPolitique gouvernementale _z�Etats-Unis. |
|
650 | 6 |
_aTerrorisme _xInnovations _z�Etats-Unis. |
|
650 | 6 |
_aTechnologie de l'information _xPolitique gouvernementale _z�Etats-Unis. |
|
650 | 7 |
_aPOLITICAL SCIENCE _xPolitical Freedom & Security _xLaw Enforcement. _2bisacsh |
|
650 | 7 |
_aInformation technology _xGovernment policy _2fast |
|
650 | 7 |
_aTerrorism _xGovernment policy _2fast |
|
650 | 7 |
_aTerrorism _xPrevention _2fast |
|
650 | 7 |
_aTerrorism _xTechnological innovations _2fast |
|
651 | 7 |
_aUnited States _2fast _1https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq |
|
650 | 7 |
_aInformationstechnik _2gnd |
|
650 | 7 |
_aTerrorismus _2gnd |
|
650 | 7 |
_aBek�ampfung _2gnd |
|
650 | 0 | 7 |
_aBek�eampfung. _2swd |
700 | 1 | _aPopp, Robert L. | |
700 | 1 | _aYen, John. | |
758 |
_ihas work: _aEmergent information technologies and enabling policies for counter-terrorism (Text) _1https://id.oclc.org/worldcat/entity/E39PCGjqwWwGtTtmch43pJKgjy _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _tEmergent information technologies and enabling policies for counter-terrorism. _dHoboken, N.J. : Wiley-Interscience ; Chichester : John Wiley [distributor], �2006 _z0471776157 _z9780471776154 _w(DLC) 2006299648 _w(OCoLC)62225396 |
830 | 0 | _aIEEE series on computational intelligence. | |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/047178656X |
938 |
_a123Library _b123L _n9698 |
||
938 |
_aBooks 24x7 _bB247 _nbkg00016843 |
||
938 |
_aBaker and Taylor _bBTCP _nBK0007440186 |
||
938 |
_aEBL - Ebook Library _bEBLB _nEBL272213 |
||
938 |
_aebrary _bEBRY _nebr10305005 |
||
938 |
_aEBSCOhost _bEBSC _n158136 |
||
938 |
_aProQuest MyiLibrary Digital eBook Collection _bIDEB _n65001 |
||
938 |
_aYBP Library Services _bYANK _n2483183 |
||
938 |
_aYBP Library Services _bYANK _n2943412 |
||
938 |
_aYBP Library Services _bYANK _n3320662 |
||
994 |
_a92 _bINLUM |
||
999 |
_c11135 _d11135 |