9783540898993-3540898999-Intelligence and Security Informatics: European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings (Lecture Notes in Computer Science, 5376)

Intelligence and Security Informatics: European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings (Lecture Notes in Computer Science, 5376)

FREE US shipping
Buy

From $16.50

Summary

Intelligence and Security Informatics: European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings (Lecture Notes in Computer Science, 5376) (ISBN-13: 9783540898993 and ISBN-10: 3540898999), written by authors Daniel Ortiz-Arroyo, Henrik Legind Larsen, Daniel Zeng, David L. Hicks, Gerhard Wagner, was published by Springer in 2008. With an overall rating of 4.4 stars, it's a notable title among other Information Management (Processes & Infrastructure, Business Technology, Data Mining, Databases & Big Data, Internet & Networking, Hardware & DIY, Hacking, Security & Encryption, Computer & Internet Law, History & Culture, Science & Technology, Legal Theory & Systems, Management & Leadership) books. You can easily purchase or rent Intelligence and Security Informatics: European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings (Lecture Notes in Computer Science, 5376) (Paperback) from BooksRun, along with many other new and used Information Management books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book constitutes the refereed proceedings of the First European Conference on Intelligence and Security Informatics, EuroISI 2008, held in Esbjerg, Denmark, in December 2008. The 23 revised full papers and 2 revised poster papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on criminal and social network analysis, intelligence analysis and knowledge discovery, Web-based intelligence monitoring and analysis, privacy protection, access control, and digital rights management, malware and intrusion detection, as well as surveillance and crisis management.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book