000 09363cam a2201165 a 4500
001 ocm85784221
003 OCoLC
005 20240523125529.0
006 m o d
007 cr cn|||||||||
008 070307s2006 njuac ob 001 0 eng d
040 _aDG1
_beng
_epn
_cDG1
_dOKU
_dBTCTA
_dDG1
_dOCLCQ
_dIEEEE
_dOCLCQ
_dCDN
_dN$T
_dYDXCP
_dTEFOD
_dIDEBK
_dE7B
_dOCLCE
_dCUS
_dDG1
_dOCLCQ
_dMHW
_dOCLCQ
_dB24X7
_dAU@
_dSNK
_dOCLCQ
_dCOO
_dDEBSZ
_dOCLCO
_dMUX
_dNRU
_dUKDOC
_dOCLCF
_dOCLCO
_dOCLCQ
_dTEFOD
_dEBLCP
_dOCLCQ
_dNLGGC
_dOCL
_dDG1
_dLIP
_dOTZ
_dOCLCQ
_dOCLCA
_dOCLCO
_dUAB
_dKIJ
_dOCLCO
_dOCLCQ
_dCEF
_dOCLCQ
_dWYU
_dYOU
_dU3W
_dOCLCQ
_dSFB
_dLEAUB
_dUX1
_dOL$
_dOCLCA
_dUKUOP
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCL
_dOCLCQ
_dOCLCL
015 _aGBA592520
_2bnb
016 7 _z013326278
_2Uk
019 _a74174814
_a85899323
_a181838151
_a225356712
_a646531895
_a647800413
_a654684443
_a657639616
_a669008721
_a697609113
_a712984176
_a727430934
_a839658403
_a990410742
_a994899479
_a1013526326
_a1027273921
_a1038736808
_a1044319468
_a1056401494
_a1058088786
_a1058677929
_a1060871148
_a1060951655
_a1061045609
_a1064925758
_a1075567056
_a1078024621
_a1081081146
_a1086515359
_a1127217402
020 _a047178656X
020 _a9780471786566
020 _a0471786551
_q(electronic bk.)
020 _a9780471786559
_q(electronic bk.)
020 _a9780470874103
020 _a0470874104
020 _a9786610650019
020 _a6610650012
020 _z0471776157
020 _z9780471776154
024 7 _a10.1002/047178656X
_2doi
029 1 _aAU@
_b000041524287
029 1 _aAU@
_b000042132981
029 1 _aAU@
_b000048761284
029 1 _aAU@
_b000051478789
029 1 _aCHBIS
_b005952419
029 1 _aCHNEW
_b000928469
029 1 _aCHVBK
_b480087881
029 1 _aDEBSZ
_b37742725X
029 1 _aDEBSZ
_b400439557
029 1 _aDEBSZ
_b430359039
029 1 _aGBVCP
_b714992585
029 1 _aNLGGC
_b297814605
029 1 _aNLGGC
_b346289580
029 1 _aYDXCP
_b2483183
035 _a(OCoLC)85784221
_z(OCoLC)74174814
_z(OCoLC)85899323
_z(OCoLC)181838151
_z(OCoLC)225356712
_z(OCoLC)646531895
_z(OCoLC)647800413
_z(OCoLC)654684443
_z(OCoLC)657639616
_z(OCoLC)669008721
_z(OCoLC)697609113
_z(OCoLC)712984176
_z(OCoLC)727430934
_z(OCoLC)839658403
_z(OCoLC)990410742
_z(OCoLC)994899479
_z(OCoLC)1013526326
_z(OCoLC)1027273921
_z(OCoLC)1038736808
_z(OCoLC)1044319468
_z(OCoLC)1056401494
_z(OCoLC)1058088786
_z(OCoLC)1058677929
_z(OCoLC)1060871148
_z(OCoLC)1060951655
_z(OCoLC)1061045609
_z(OCoLC)1064925758
_z(OCoLC)1075567056
_z(OCoLC)1078024621
_z(OCoLC)1081081146
_z(OCoLC)1086515359
_z(OCoLC)1127217402
037 _a112100957
_bWiley InterScience
_nhttp://www3.interscience.wiley.com
037 _a431CF031-D971-4E3D-B692-1C66C0549D16
_bOverDrive, Inc.
_nhttp://www.overdrive.com
042 _adlr
043 _an-us---
050 4 _aHV6431
_b.E487 2006eb
072 7 _aPOL
_x014000
_2bisacsh
082 0 4 _a363.3202854
_222
049 _aMAIN
245 0 0 _aEmergent information technologies and enabling policies for counter-terrorism /
_cedited by Robert L. Popp, John Yen.
260 _aHoboken, N.J. :
_bWiley-Interscience ;
_aChichester :
_bJohn Wiley [distributor],
_c�2006.
300 _a1 online resource (xv, 468 pages) :
_billustrations, portrait
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aIEEE Press series on computational intelligence
504 _aIncludes bibliographical references and index.
505 0 _aUtilizing information and social science technology to understand and counter the twenty-first century strategic threat / Robert L. Popp, David Allen, and Claudio Cioffi-Revilla -- Hidden Markov models and Bayesian networks for counter-terrorism / Krishna Pattipati [and others] -- Anticipatory models for counter-terrorism / Mark Lazaroff and David Snowden -- Information processing at very high speed data ingestion rates / J. Brian Sharkey [and others] -- Analysis of heterogeneous data in ultrahigh dimensions / R.A. Ammar [and others] -- Sematic web technologies for terrorist network analysis / Jennifer Golbeck, Aaron Mannes, and James Hendler -- Improving national and homeland security through context knowledge representation and reasoning technologies / Nazli Choucri, Stuart E. Madnick, and Michael D. Siegel -- Anonymized semantic directories and a privacy-enhancing architecture for enterprise discovery / Jeff Jonas and John Karat -- Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies / Brian Kettler, Gary Edwards, and Mark Hoffman -- Applying semantic web reasoning to counter-terrorism / Paul Kogut [and others] -- Schemer : consensus-based knowledge validation and collaboration services for virtual teams of intelligence experts / Clifford Behrens, Hyong-Sop Shim, and Davaisis Bassu -- Sharing intelligence using information supply chains / Shuang Sun, Xiaocong Fan, and John Yen -- Supporting knowledge management in emergency crisis management domains : envisioned designs for collaborative work / Michael D. McNeese . [and others] -- Agent-based simulations for disaster rescue using the DEFACTO coordination system / Janusz Marecki, Nathan Schurr, and Milind Tambe -- Transcending the tower of Babel : supporting access to multilingual information with cross-language information retrieval / Douglas W. Oard -- Journey from analysis to inquiry : technology and transformation of counter-terrorism analysis / Aaron B. Frank and Desmond Saunders-Newton -- Behavioral network analysis for terrorist detection / Seth A. Greenblatt, Thayne Coffman, and Sherry E. Marcus -- Detecting terrorist activities in the twenty-first century : a theory of detection for transactional networks / Tom Mifflin [and others] -- Social network analysis via matrix decompositions / D.B. Skillicorn -- Legal standards for data mining / Fred H. Cate -- Privacy and consequences : legal and policy structures for implementing new counter-terrorism technologies and protecting civil liberty / Paul Rosenzweig -- Designing technical systems to support policy : enterprise architecture, policy appliances and civil liberties / K.A. Taipale.
520 _aExplores both counter-terrorism and enabling policy dimensions of emerging information technologies in national securityAfter the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks
506 _3Use copy
_fRestrictions unspecified
_2star
_5MiAaHDL
533 _aElectronic reproduction.
_b[Place of publication not identified] :
_cHathiTrust Digital Library,
_d2010.
_5MiAaHDL
538 _aMaster and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
_uhttp://purl.oclc.org/DLF/benchrepro0212
_5MiAaHDL
583 1 _adigitized
_c2010
_hHathiTrust Digital Library
_lcommitted to preserve
_2pda
_5MiAaHDL
546 _aEnglish.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aTerrorism
_zUnited States
_xPrevention.
650 0 _aTerrorism
_xGovernment policy
_zUnited States.
650 0 _aTerrorism
_xTechnological innovations
_zUnited States.
650 0 _aInformation technology
_xGovernment policy
_zUnited States.
650 6 _aTerrorisme
_xPolitique gouvernementale
_z�Etats-Unis.
650 6 _aTerrorisme
_xInnovations
_z�Etats-Unis.
650 6 _aTechnologie de l'information
_xPolitique gouvernementale
_z�Etats-Unis.
650 7 _aPOLITICAL SCIENCE
_xPolitical Freedom & Security
_xLaw Enforcement.
_2bisacsh
650 7 _aInformation technology
_xGovernment policy
_2fast
650 7 _aTerrorism
_xGovernment policy
_2fast
650 7 _aTerrorism
_xPrevention
_2fast
650 7 _aTerrorism
_xTechnological innovations
_2fast
651 7 _aUnited States
_2fast
_1https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq
650 7 _aInformationstechnik
_2gnd
650 7 _aTerrorismus
_2gnd
650 7 _aBek�ampfung
_2gnd
650 0 7 _aBek�eampfung.
_2swd
700 1 _aPopp, Robert L.
700 1 _aYen, John.
758 _ihas work:
_aEmergent information technologies and enabling policies for counter-terrorism (Text)
_1https://id.oclc.org/worldcat/entity/E39PCGjqwWwGtTtmch43pJKgjy
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_tEmergent information technologies and enabling policies for counter-terrorism.
_dHoboken, N.J. : Wiley-Interscience ; Chichester : John Wiley [distributor], �2006
_z0471776157
_z9780471776154
_w(DLC) 2006299648
_w(OCoLC)62225396
830 0 _aIEEE series on computational intelligence.
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/047178656X
938 _a123Library
_b123L
_n9698
938 _aBooks 24x7
_bB247
_nbkg00016843
938 _aBaker and Taylor
_bBTCP
_nBK0007440186
938 _aEBL - Ebook Library
_bEBLB
_nEBL272213
938 _aebrary
_bEBRY
_nebr10305005
938 _aEBSCOhost
_bEBSC
_n158136
938 _aProQuest MyiLibrary Digital eBook Collection
_bIDEB
_n65001
938 _aYBP Library Services
_bYANK
_n2483183
938 _aYBP Library Services
_bYANK
_n2943412
938 _aYBP Library Services
_bYANK
_n3320662
994 _a92
_bINLUM
999 _c11135
_d11135