Limit Search Results
Format
Language
Shelf Location
Publication Date
-
3 Results Found Subscribe to search results
000PKL
Print
Cover image for IT governance :   an international guide to data security and ISO27001/ISO27002
Calder, Alan Steve Watkins
2012
Perpustakaan Kuala Lumpur Perpustakaan Jabatan
ISBN 
9780749464851
Excerpt: 
IT governance : an international guide to data security and ISO27001/ISO27002 / Calder, Alan
Relevance: 
0.7446
Available:
Cover image for Intelligent systems for security informatics
Yang, Christopher C.
The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).
2013
Perpustakaan Kuala Lumpur
ISBN 
9780124047020
Excerpt: 
Intelligent systems for security informatics / Yang, Christopher C.
Relevance: 
0.0000
Available:
Cover image for Security and game theory : algorithms, deployed systems, lessons learned
Tambe, Milind, 1965-
"Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"--
2012
Perpustakaan Kuala Lumpur
ISBN 
9781107096424
Excerpt: 
Security, Internatonal -- Mathematical models
Relevance: 
0.0000
Available: