HOMELAND SECURITY TECHNIQUES AND TECHNOLOGIES - LAXMI PUBLICATION
ABOUT THE BOOK:
The strategic use of network-centric software for data aggregation, integration, collaboration, categorization, and pattern-recognition by homeland security personnel at the local state, and federal level is essential in combating terrorism in the 21st Century. With the use of an assortment of software components, self-adaptive intellingent systems can be created for real-time use by a network of analysis. Homeland Security Techniques and Technologies provides important tips and tools necessary for achieving security that is both proper and functional. The book illustrates several key topics required in successful combating terrorism e.g., data warehousing techniques for behavioral profiling and entity validation to prevent identity theft; artificial intelligence and the Internet for the creation of virtual databases of images, html files, and e-mails; aggregating, preparing, and mining data remotely over networks anywhere in the world; and the visual mapping of connecting and tracking individuals on a global scale. Homeland Security Techniques and Technologies is an essential guide to understanding the different forms of terrorism and knowing the techniques of combating and preventing attacks.
Key Features
* Shows how to detect crimes often associated with cybe-terrorism, such as identity theft and money laundering.
* Focuses on using artificial intelligence and the Internet to develop tools for the creation of virtual databases of images, html files, and e-mails.
* Covers data warehousing techniques for behavioral profiling and entity validation
* Describes methods to organize, disseminate, and collaborate experts and content in real-time.
* CD-ROM includes homeland security techniques, presentation and demos.