Search Results for Security system - Narrowed by: 2012SirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dSecurity$002bsystem$0026qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026ic$003dtrue$0026ps$003d300?2025-12-29T09:40:01ZFundamentals of information system securityent://SD_ILS/0/SD_ILS:1474002025-12-29T09:40:01Z2025-12-29T09:40:01ZKim, David<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763790257<br/>Software agents, agent systems and their applicationsent://SD_ILS/0/SD_ILS:1915832025-12-29T09:40:01Z2025-12-29T09:40:01ZNATO Advanced Study Institute on Software Agents, Agent Systems and their Applications (2010 : Tangier, Morocco) Essaaidi, Mohamed Ganzha, M. (Maria) Paprzycki, Marcin<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781607508175<br/>101 spy gadgets for the evil geniusent://SD_ILS/0/SD_ILS:1923702025-12-29T09:40:01Z2025-12-29T09:40:01ZGraham, Brad McGowan, Kathy<br/>2012<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9780071772686<br/>Security and game theory : algorithms, deployed systems, lessons learnedent://SD_ILS/0/SD_ILS:1927722025-12-29T09:40:01Z2025-12-29T09:40:01ZTambe, Milind, 1965-<br/>"Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"--<br/>2012<br/>Cover image <a href="http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg">http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg</a><br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781107096424<br/>Electronic Access Controlent://SD_ILS/0/SD_ILS:1859192025-12-29T09:40:01Z2025-12-29T09:40:01ZNorman, Thomas L.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780123820280<br/>Food systems failure : the global food crisis and the future of agricultureent://SD_ILS/0/SD_ILS:2207012025-12-29T09:40:01Z2025-12-29T09:40:01ZCampbell, Hugh, 1964- Stock, Paul V.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780415712606<br/>