9783540344780-3540344780-Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. (Lecture Notes in Computer Science, 3975)

Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. (Lecture Notes in Computer Science, 3975)

FREE US shipping

Summary

Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. (Lecture Notes in Computer Science, 3975) (ISBN-13: 9783540344780 and ISBN-10: 3540344780), written by authors Hsinchun Chen, Sharad Mehrotra, Daniel D. Zeng, was published by Springer in 2006. With an overall rating of 4.2 stars, it's a notable title among other Information Management (Processes & Infrastructure, Data Mining, Databases & Big Data, Internet & Networking, Hardware & DIY, Network Security, Security & Encryption, Software, Hacking, History & Culture, Science & Technology, Legal Theory & Systems, Bioinformatics, Biological Sciences, Management & Leadership) books. You can easily purchase or rent Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. (Lecture Notes in Computer Science, 3975) (Paperback) from BooksRun, along with many other new and used Information Management books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book constitutes the refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006. Gathers 39 revised full papers, 30 revised short papers, and 56 extended poster abstracts, organized in topical sections including intelligence analysis and knowledge discovery; access control, privacy, and cyber trust; surveillance and emergency response; infrastructure protection and cyber security; terrorism informatics and countermeasures; surveillance, bioterrorism, and emergency response.
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book