- STAFF PICKS
- GIFTS + GIFT CARDS
- SELL BOOKS
- FIND A STORE
New Trade Paper
Currently out of stock.
available for shipping or prepaid pickup only
Other titles in the Charles River Media Networking/Security series:
Homeland Security Techniques and Technologies with CDROM (Networking)by Jesus Mena
Synopses & Reviews
The strategic use of network-centric software for data aggregation, integration, collaboration, categorization, and pattern-recognition by homeland security personnel at the local, state, and federal level is essential in combating terrorism in the 21st century. With the use of an assortment of software components, self-adaptive intelligent systems can be created for real-time use by a network of analysts. Homeland Security Techniques and Technologies provides important tips and tools necessary for achieving security that is both proper and functional. The book illustrates several key topics required in successful combating terrorism e.g., data warehousing techniques for behavioral profiling and entity validation to prevent identity theft; artificial intelligence and the Internet for the creation of virtual databases of images, html files, and e-mails; aggregating, preparing, and mining data remotely over networks anywhere in the world; and the visual mapping of connecting and tracking individuals on a global scale. Homeland Security Techniques and Technologies is an essential guide to understanding the different forms of terrorism and knowing the techniques of combating and preventing attacks.
Book News Annotation:
Data mining consultant Mena offers a handbook on the information technology tasks thought necessary for "homeland security." The major tasks he identifies and explains are data aggregation for identity validation, the integration of database information and software systems, collaboration systems for the location and sharing of information among agencies and individuals, categorization for text analysis, artificial intelligence for profiling, and data mining for pattern recognition. The CD-ROM contains demonstrations and presentations.
Annotation ©2004 Book News, Inc., Portland, OR (booknews.com)
Based on a course developed by the author, this book provides the knowledge and expertise necessary to prevent and counteract terrorism in the post 9/11 world. It delves into key identity theft prevention measures, including behavior profiling and entity validation, and then moves on to information-sharing technologies for counter-terrorists to share evidence and leads. The CD-ROM contains selected trial versions of the software discussed in the book.
About the Author
Jesus Mena (Alameda, CA) is a data mining consultant and writer with over 15 years experience. He is a former Artificial Intelligence Specialist for the Internal Revenue Service. Dozens of his articles have appeared in IT, Internet, Marketing, and AI publications. He is the author of Investigative Data Mining for Security and Criminal Detection, Data Mining Your Website, and WebMining for Profit.
Table of Contents
Dedication Introduction Chapter 1 Overview: The Homeland Security (HS) Tasks, Technologies, and Processes Chapter 2 Aggregation: How to Leverage the Web, Robots, and Commercial Demographics for Entity Validation Chapter 3 Integration: The Components, Adapters, Middleware, and Web Services for Information Sharing Chapter 4 Collaboration: The Technologies for Communicating Content, Expertise, and Analyses in Real Time Chapter 5 Categorization: The Techniques for the Clustering of Concepts from Unstructured Content Chapter 6 Intelligence: Systems for Detecting Terrorist Crimes Chapter 7 Mining: Pattern Recognition and Agent Technologies for Analyzing Text and Data Remotely About the CD-ROM Index
What Our Readers Are Saying