Search Results for Security system - Narrowed by: 2012 SirsiDynix Enterprise http://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dSecurity$002bsystem$0026qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026ic$003dtrue$0026ps$003d300? 2025-12-29T09:40:01Z Fundamentals of information system security ent://SD_ILS/0/SD_ILS:147400 2025-12-29T09:40:01Z 2025-12-29T09:40:01Z Kim, David<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763790257<br/> Software agents, agent systems and their applications ent://SD_ILS/0/SD_ILS:191583 2025-12-29T09:40:01Z 2025-12-29T09:40:01Z NATO Advanced Study Institute on Software Agents, Agent Systems and their Applications (2010 : Tangier, Morocco)&#160;Essaaidi, Mohamed&#160;Ganzha, M. (Maria)&#160;Paprzycki, Marcin<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781607508175<br/> 101 spy gadgets for the evil genius ent://SD_ILS/0/SD_ILS:192370 2025-12-29T09:40:01Z 2025-12-29T09:40:01Z Graham, Brad&#160;McGowan, Kathy<br/>2012<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9780071772686<br/> Security and game theory : algorithms, deployed systems, lessons learned ent://SD_ILS/0/SD_ILS:192772 2025-12-29T09:40:01Z 2025-12-29T09:40:01Z Tambe, Milind, 1965-<br/>&quot;Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world&quot;--<br/>2012<br/>Cover image <a href="http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg">http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg</a><br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781107096424<br/> Electronic Access Control ent://SD_ILS/0/SD_ILS:185919 2025-12-29T09:40:01Z 2025-12-29T09:40:01Z Norman, Thomas L.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780123820280<br/> Food systems failure : the global food crisis and the future of agriculture ent://SD_ILS/0/SD_ILS:220701 2025-12-29T09:40:01Z 2025-12-29T09:40:01Z Campbell, Hugh, 1964-&#160;Stock, Paul V.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780415712606<br/>