Apress Access
  • eBook Price: $129.00
Buy eBook Buy Print Book

Security Informatics Cover Image

Global in its scope and perspective, this publication features contributing authors from around the world in the first systematic, archival volume treatment of the field. They cover the very latest advances in research and practice in this vital area of study.

Full Description

  • Add to Wishlist
  • ISBN13: 978-1-4419-1324-1
  • 180 Pages
  • User Level: Professionals
  • Publication Date: January 8, 2010
  • Available eBook Formats: PDF
Full Description
Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners. SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field and will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics.
Table of Contents

Table of Contents

  1. Framing Social Movement Identity with Cyber
  2. Artifacts.
  3. Patterns of Word Use for Deception in Testimony.
  4. Information Integration for Terrorist or Criminal Social Networks.
  5. Processing Constrained K
  6. Closest Pairs Queries in Crime Databases.
  7. What
  8. if Emergency Response through Higher Order Voronoi Diagram.
  9. Identity Management Architecture.
  10. A Game Theoretic Framework for Multi
  11. agent Deployment in Intrusion Detection Systems.
  12. EKTnet: A Distributed Network System for Sharing Event Data and Multi
  13. faceted Knowledge in a Collaboration Federation.
  14. Duplicate Work Reduction in Business Continuity and Risk Management Processes.

If you think that you've found an error in this book, please let us know by emailing to editorial@apress.com . You will find any confirmed erratum below, so you can check if your concern has already been addressed.
No errata are currently published