Coverart for item
The Resource Homeland security techniques and technologies, Jesús Mena

Homeland security techniques and technologies, Jesús Mena

Label
Homeland security techniques and technologies
Title
Homeland security techniques and technologies
Statement of responsibility
Jesús Mena
Creator
Subject
Language
eng
Summary
Accompanying CD-ROM has all the figures from the book plus demonstrations of several software products discussed in the book: Entopia, InferX, iWay, Megaputer, MetaMatrix, SearchSoftware, and Searchspace
Member of
Cataloging source
DLC
http://library.link/vocab/creatorName
Mena, Jesus
Dewey number
006.3/12
Illustrations
illustrations
Index
index present
LC call number
QA76.9.D343
LC item number
M439 2004
Literary form
non fiction
Series statement
Charles River Media networking & security series
http://library.link/vocab/subjectName
  • Data mining
  • Computer security
  • Intelligence artificielle
  • Rassemblement des données
  • Restitution des données
  • Systèmes experts
  • Internet
  • Etats-Unis d'Amérique
  • Bases de données
  • Sécurité publique
  • Lutte contre le terrorisme
  • Comportement
  • Délits informatiques
  • Computer security
  • Data mining
Label
Homeland security techniques and technologies, Jesús Mena
Instantiates
Publication
Note
Includes indexes
Accompanying material
1 CD-ROM (4 3/4 in.).
Bibliography note
Includes indexes
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Overview: The Homeland Security (HS) Tasks, Technologies, and Processes -- The HS Processes and Objectives -- The HS Missions -- Intelligence and Warning -- Border and Transportation Security -- Domestic Counterterrorism -- Protecting Critical Infrastructures and Key Assets -- Defending Against Catastrophic Threats -- Emergency Preparedness and Response -- Aggregation: The Data Components -- Integration: Virtual Databases -- Web Services and XML -- Collaboration in Real Time -- Categorization: Clustering Concepts -- Intelligence Systems for Detecting Terrorist Crimes -- Data Mining: Embedded and Distributed -- Conclusion: The Information Technology Terrain -- The Perpetual Evolutionary Tasks -- Aggregation: How to Leverage the Web, Robots, and Commercial Demographics for Entity Validation -- Zero Latency -- Dynamic Data Warehouse (DDM) -- The Web: Internet Mechanisms -- IP Addresses -- Log Files: Clickstream Data -- Cookies -- Bugs -- Forms -- Robots: Data Collection Software -- AIS -- Fetch -- Mobular -- Commercial Demographics: Entity Validation -- Acxiom -- ChoicePoint -- Claritas -- DataQuick -- Experian -- Polk -- SRC -- TransUnion -- Conclusion: From Aggregation to Integration -- Integration: The Components, Adapters, Middleware, and Web Services for Information Sharing -- The Integrators: Framework Providers -- Integrator: Ascential -- Integrator: BEA -- The Cultural, Legal, and Technical Obstacles -- Integrator: IBM -- Integrator: Informatica -- The Benefits: Speed and Accuracy -- Integrator: Information Builders (iWay) -- Integrator: IONA -- Integrator: MetaMatrix -- The Architecture: The XML Glue -- Integrator: Microsoft -- Integrator: SeeBeyond -- Integrator: TIBCO -- Integrator: Vitria -- Homeland Security (HS) Requirements -- Integrator: WebMethods -- The Future: From 22 to 1 in 2002 -- Collaboration: The Technologies for Communicating Content, Expertise, and Analyses in Real Time -- Collaboration Components: Presence, Messaging, Discussion, Meeting, Sharing, and Virtual -- Collective Knowledge: Locating, Extracting, Organizing, and Routing Tacit Knowledge -- Benefits of Collaboration: One Mission, Different Cultures -- The Collaborators: Acquire, Learn, and Discover -- Experts and Personalization: The Dynamic Organization -- Expertise Collaborators: Who Knows What -- Mapping Collaboration: Search, Retrieval and Categorization -- Instant Collaborators: Presence Messaging -- Integrating a Collaboration Process: A Communications Culture -- Key Issues in Collaboration: Five Factors -- Threat Matrix Collaboration: Multi-Agency and Multimedia -- Categorization: The Techniques for the Clustering of Concepts from Unstructured Content -- Categorization Techniques -- Bayesian Networks: Categorizing Uncertainty -- Support Vector Machines: Categorization via Vectors -- Neural Networks: Mapping Meaning -- Clustering Concepts -- Linguistic Analysis Techniques -- Mapping Content -- Personalized Content -- The Categorization Providers -- The Evolution of Categorization of Unstructured Content -- Categorization for Homeland Security -- Intelligence: Systems for Detecting Terrorist Crimes -- Identity Theft -- A Crime of Our Time -- Terrorist Theft -- Visa Theft -- Technologies for Detecting ID Crimes -- National Report on Identity Fraud -- ID Score by ID Analytics -- ID Fraud Intercept by Fair Isaac -- The Fair and Accurate Credit Transactions Act of 2003 -- Name Recognition -- AeroText (Lockheed Martin) -- IdentiFinder (BBN/Verizon) -- Intelligent Miner for Text (IBM) -- NetOwl (SRA) -- Thing Finder (Inxight) -- Government Use of Name Recognition Technologies -- Search Software America (SSA) -- Language Analysis Systems (LAS) -- Money Laundering -- Anti-Money Laundering (AML) Technologies -- GIFTS Software -- Mantas -- NetEconomy -- Searchspace -- AML Technology for Homeland Security -- Mining: Pattern Recognition and Agent Technologies for Analyzing Text and Data Remotely -- What Is Data Mining? Discovery and Exploitation -- Our Distributed Data World: Connecting the Dots -- Text Mining -- The Challenges of Unstructured Data Analysis: Extracting Knowledge -- The Text Mining Technologies: Software That Understands -- Text Mining Processes: Categorization and Information Extraction -- The Text Mining Tools: From Unstructured to Structured -- Data Mining -- The Data Mining Processes: Prediction and Description -- The Data Mining Technologies: Rules, Ratios, and Code -- The Data Mining Suites: Toolboxes of Algorithms -- SPSS -- Embedded Data Mining -- Distributed Data Mining -- The Future of Homeland Security: Hybrid Self-Evolving Systems
Control code
ocm54677736
Dimensions
24 cm +
Edition
1st ed.
Extent
xiii, 331 pages
Isbn
9781584503286
Lccn
2004005215
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations
System control number
  • (Sirsi) o54677736
  • (OCoLC)54677736
Label
Homeland security techniques and technologies, Jesús Mena
Publication
Note
Includes indexes
Accompanying material
1 CD-ROM (4 3/4 in.).
Bibliography note
Includes indexes
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Overview: The Homeland Security (HS) Tasks, Technologies, and Processes -- The HS Processes and Objectives -- The HS Missions -- Intelligence and Warning -- Border and Transportation Security -- Domestic Counterterrorism -- Protecting Critical Infrastructures and Key Assets -- Defending Against Catastrophic Threats -- Emergency Preparedness and Response -- Aggregation: The Data Components -- Integration: Virtual Databases -- Web Services and XML -- Collaboration in Real Time -- Categorization: Clustering Concepts -- Intelligence Systems for Detecting Terrorist Crimes -- Data Mining: Embedded and Distributed -- Conclusion: The Information Technology Terrain -- The Perpetual Evolutionary Tasks -- Aggregation: How to Leverage the Web, Robots, and Commercial Demographics for Entity Validation -- Zero Latency -- Dynamic Data Warehouse (DDM) -- The Web: Internet Mechanisms -- IP Addresses -- Log Files: Clickstream Data -- Cookies -- Bugs -- Forms -- Robots: Data Collection Software -- AIS -- Fetch -- Mobular -- Commercial Demographics: Entity Validation -- Acxiom -- ChoicePoint -- Claritas -- DataQuick -- Experian -- Polk -- SRC -- TransUnion -- Conclusion: From Aggregation to Integration -- Integration: The Components, Adapters, Middleware, and Web Services for Information Sharing -- The Integrators: Framework Providers -- Integrator: Ascential -- Integrator: BEA -- The Cultural, Legal, and Technical Obstacles -- Integrator: IBM -- Integrator: Informatica -- The Benefits: Speed and Accuracy -- Integrator: Information Builders (iWay) -- Integrator: IONA -- Integrator: MetaMatrix -- The Architecture: The XML Glue -- Integrator: Microsoft -- Integrator: SeeBeyond -- Integrator: TIBCO -- Integrator: Vitria -- Homeland Security (HS) Requirements -- Integrator: WebMethods -- The Future: From 22 to 1 in 2002 -- Collaboration: The Technologies for Communicating Content, Expertise, and Analyses in Real Time -- Collaboration Components: Presence, Messaging, Discussion, Meeting, Sharing, and Virtual -- Collective Knowledge: Locating, Extracting, Organizing, and Routing Tacit Knowledge -- Benefits of Collaboration: One Mission, Different Cultures -- The Collaborators: Acquire, Learn, and Discover -- Experts and Personalization: The Dynamic Organization -- Expertise Collaborators: Who Knows What -- Mapping Collaboration: Search, Retrieval and Categorization -- Instant Collaborators: Presence Messaging -- Integrating a Collaboration Process: A Communications Culture -- Key Issues in Collaboration: Five Factors -- Threat Matrix Collaboration: Multi-Agency and Multimedia -- Categorization: The Techniques for the Clustering of Concepts from Unstructured Content -- Categorization Techniques -- Bayesian Networks: Categorizing Uncertainty -- Support Vector Machines: Categorization via Vectors -- Neural Networks: Mapping Meaning -- Clustering Concepts -- Linguistic Analysis Techniques -- Mapping Content -- Personalized Content -- The Categorization Providers -- The Evolution of Categorization of Unstructured Content -- Categorization for Homeland Security -- Intelligence: Systems for Detecting Terrorist Crimes -- Identity Theft -- A Crime of Our Time -- Terrorist Theft -- Visa Theft -- Technologies for Detecting ID Crimes -- National Report on Identity Fraud -- ID Score by ID Analytics -- ID Fraud Intercept by Fair Isaac -- The Fair and Accurate Credit Transactions Act of 2003 -- Name Recognition -- AeroText (Lockheed Martin) -- IdentiFinder (BBN/Verizon) -- Intelligent Miner for Text (IBM) -- NetOwl (SRA) -- Thing Finder (Inxight) -- Government Use of Name Recognition Technologies -- Search Software America (SSA) -- Language Analysis Systems (LAS) -- Money Laundering -- Anti-Money Laundering (AML) Technologies -- GIFTS Software -- Mantas -- NetEconomy -- Searchspace -- AML Technology for Homeland Security -- Mining: Pattern Recognition and Agent Technologies for Analyzing Text and Data Remotely -- What Is Data Mining? Discovery and Exploitation -- Our Distributed Data World: Connecting the Dots -- Text Mining -- The Challenges of Unstructured Data Analysis: Extracting Knowledge -- The Text Mining Technologies: Software That Understands -- Text Mining Processes: Categorization and Information Extraction -- The Text Mining Tools: From Unstructured to Structured -- Data Mining -- The Data Mining Processes: Prediction and Description -- The Data Mining Technologies: Rules, Ratios, and Code -- The Data Mining Suites: Toolboxes of Algorithms -- SPSS -- Embedded Data Mining -- Distributed Data Mining -- The Future of Homeland Security: Hybrid Self-Evolving Systems
Control code
ocm54677736
Dimensions
24 cm +
Edition
1st ed.
Extent
xiii, 331 pages
Isbn
9781584503286
Lccn
2004005215
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations
System control number
  • (Sirsi) o54677736
  • (OCoLC)54677736

Library Locations

    • Waubonsee: Sugar Grove Campus - Todd LibraryBorrow it
      Collins Hall 2nd Floor Waubonsee Community College Route 47 at Waubonsee Drive, Sugar Grove, IL, 60554-9454, US
      41.7974000 -88.45785