000 | 04123nam a22004095i 4500 | ||
---|---|---|---|
001 | 293312 | ||
003 | MX-SnUAN | ||
005 | 20160429155100.0 | ||
007 | cr nn 008mamaa | ||
008 | 150903s2009 au | o |||| 0|eng d | ||
020 |
_a9783211094426 _99783211094426 |
||
024 | 7 |
_a10.1007/9783211094426 _2doi |
|
035 | _avtls000345379 | ||
039 | 9 |
_a201509030412 _bVLOAD _c201405050320 _dVLOAD _y201402061335 _zstaff |
|
040 |
_aMX-SnUAN _bspa _cMX-SnUAN _erda |
||
050 | 4 | _aQA276-280 | |
100 | 1 |
_aMemon, Nasrullah. _eeditor. _9314448 |
|
245 | 1 | 0 |
_aMathematical Methods in Counterterrorism / _cedited by Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben Rosenorn. |
250 | _a1. | ||
264 | 1 |
_aVienna : _bSpringer Vienna, _c2009. |
|
300 |
_axiii, 389 páginas, 124 Figs. _brecurso en línea. |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
500 | _aSpringer eBooks | ||
505 | 0 | _aMathematical Methods in Counterterrorism: Tools and Techniques for a New Challenge -- Mathematical Methods in Counterterrorism: Tools and Techniques for a New Challenge -- Network Analysis -- Modeling Criminal Activity in Urban Landscapes -- Extracting Knowledge from Graph Data in Adversarial Settings -- Mathematically Modeling Terrorist Cells: Examining the Strength of Structures of Small Sizes -- Combining Qualitative and Quantitative Temporal Reasoning for Criminal Forensics -- Two Theoretical Research Questions Concerning the Structure of the Perfect Terrorist Cell -- Forecasting -- Understanding Terrorist Organizations with a Dynamic Model -- Inference Approaches to Constructing Covert Social Network Topologies -- A Mathematical Analysis of Short-term Responses to Threats of Terrorism -- Network Detection Theory -- Communication/Interpretation -- Security of Underground Resistance Movements -- Intelligence Constraints on Terrorist Network Plots -- On Heterogeneous Covert Networks -- Two Models for Semi-Supervised Terrorist Group Detection -- Behavior -- CAPE: Automatically Predicting Changes in Group Behavior -- Interrogation Methods and Terror Networks -- Terrorists and Sponsors. An Inquiry into Trust and Double-Crossing -- Simulating Terrorist Cells: Experiments and Mathematical Theory -- Game Theory -- A Brinkmanship Game Theory Model of Terrorism -- Strategic Analysis of Terrorism -- Underfunding in Terrorist Organizations -- History of the Conference on Mathematical Methods in Counterterrorism -- Personal Reflections on Beauty and Terror. | |
520 | _aThe present work presents the most current research from mathematicians and computer scientists from around the world to develop strategies for counterterrorism and homeland security to the broader public. New mathematical and computational technique concepts are applied to counterterrorism and computer security problems. Topics covered include strategies for disrupting terrorist cells, border penetration and security, terrorist cell formation and growth, data analysis of terrorist activity, terrorism deterrence strategies, information security, emergency response and planning. Since 2001, tremendous amounts of information have been gathered regarding terrorist cells and individuals potentially planning future attacks. This book addresses this need to develop new countermeasures. Interested readers include researchers, policy makers, politicians, and the members of intelligence and law enforcement agencies. | ||
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aDavid Farley, Jonathan. _eeditor. _9325802 |
|
700 | 1 |
_aHicks, David L. _eeditor. _9314450 |
|
700 | 1 |
_aRosenorn, Torben. _eeditor. _9325803 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9783211094419 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-211-09442-6 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c293312 _d293312 |