
Homeland Security
Techniques And Technologies
Jesus Mena - Collection Networking Security Series
Résumé
The strategic use of network-centric software for data aggregation, integration, collaboration, categorization, and pattern-recognition by homeland security personnel at the local, state, and federal level is essential in combating terrorism in the 21st century. With the use of an assortment of software components, self-adaptive intelligent systems can be created for real-time use by a network of analysts. Homeland Security Techniques and Technologies provides important tips and tools necessary for achieving security that is both proper and functional. The book illustrates several key topics required in successful combating terrorism e.g., data warehousing techniques for behavioral profiling and entity validation to prevent identity theft; artificial intelligence and the Internet for the creation of virtual databases of images, html files, and e-mails; aggregating, preparing, and mining data remotely over networks anywhere in the world; and the visual mapping of connecting and tracking individuals on a global scale. Homeland Security Techniques and Technologies is an essential guide to understanding the different forms of terrorism and knowing the techniques of combating and preventing attacks.
Key features
- Shows how to detect crimes often associated with cyber-terrorism, such as identity theft and money laundering
- Focuses on using artificial intelligence and the Internet to develop tools for the creation of virtual databases of images, html files, and e-mails
- Covers data warehousing techniques for behavioral profiling and entity validation
- Describes methods to organize, disseminate, and collaborate experts and content in real-time
- CD-ROM includes homeland security techniques, presentations and demos
L'auteur - Jesus Mena
Jesús Mena (Alameda, CA) is a data mining consultant and writer with over 15 years experience. He is a former Artificial Intelligence Specialist for the Internal Revenue Service. Dozens of his articles have appeared in IT, Internet, Marketing, and AI publications. He is the author of Investigative Data Mining for Security and Criminal Detection, Data Mining Your Website, and WebMining for Profit.
Sommaire
- Overview: The Homeland Security (HS) Tasks, Technologies, and Processes
- Aggregation: How to Leverage the Web, Robots, and Commercial Demographics for Entity Validation
- Integration: The Components, Adapters, Middleware, and Web Services for Information Sharing
- Collaboration: The Technologies for Communicating Content, Expertise, and Analyses in Real Time
- Categorization: The Techniques for the Clustering of Concepts from Unstructured Content
- Intelligence: Systems for Detecting Terrorist Crimes
- Mining: Pattern Recognition and Agent Technologies for Analyzing Text and Data Remotely
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Charles River Media |
Auteur(s) | Jesus Mena |
Collection | Networking Security Series |
Parution | 13/07/2004 |
Nb. de pages | 331 |
Format | 19 x 23,5 |
Couverture | Broché |
Poids | 700g |
Intérieur | Noir et Blanc |
EAN13 | 9781584503286 |
ISBN13 | 978-1-58450-328-6 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Bases de données
- Informatique Bases de données Conception et modélisation UML
- Informatique Bases de données Conception et modélisation Merise
- Informatique Informatique d'entreprise Management des systèmes d'information
- Informatique Informatique d'entreprise Knowledge management
- Informatique Informatique d'entreprise Data warehouse et data mining
- Informatique Informatique d'entreprise Sécurité
- Informatique Développement d'applications Gestion de projets
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet