Developing next-generation countermeasures for homeland security threat prevention:
"This book provides relevant theoretical frameworks and empirical research outlining potential threats while exploring their appropriate countermeasures, offering a broad perspective, from network security, surveillance, reconnaissance, and physical security"--Provided by publisher.
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :
IGI Global,
[2017]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book provides relevant theoretical frameworks and empirical research outlining potential threats while exploring their appropriate countermeasures, offering a broad perspective, from network security, surveillance, reconnaissance, and physical security"--Provided by publisher. |
Beschreibung: | PDFs (427 pages) : illustrations. Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522507048 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00148511 | ||
003 | IGIG | ||
005 | 20160915133108.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 160914s2017 paua fob 001 0 eng d | ||
010 | |z 2016023422 | ||
020 | |a 9781522507048 |q electronic | ||
020 | |z 9781522507031 |q print | ||
024 | 7 | |a 10.4018/978-1-5225-0703-1 |2 doi | |
035 | |a (CaBNVSL)gtp00566370 | ||
035 | |a (OCoLC)958438562 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
043 | |a n-us--- | ||
050 | 4 | |a HV6432 |b .D48 2017e | |
082 | 7 | |a 363.325/170973 |2 23 | |
245 | 0 | 0 | |a Developing next-generation countermeasures for homeland security threat prevention |c Maurice Dawson, Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing and Weifeng Li, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : |b IGI Global, |c [2017] | |
300 | |a PDFs (427 pages) : |b illustrations. | ||
336 | |a still image |2 rdacontent | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Types of terrorism / Gus Martin -- Protection of critical homeland assets: using a proactive, adaptive security management driven process / William J. Bailey -- Assessing the interactions between Native American tribes and the U.S. Government in homeland security and emergency management policy / Leigh R. Anderson -- Transnational crime and the American policing system / Starlett Michele Martin -- Islamic extremists in Africa: security spotlight on Kenya and Nigeria / Maurice Dawson, Wale Adeboje -- Border security and cooperative initiatives to counter illicit drug trafficking: the case of Jamaica and the USA / Suzette A. Haughton -- Biometric spoofing and anti-spoofing / Zahid Akhtar -- On using gait biometrics for re-identification in automated visual surveillance / Imed Bouchrika -- Multi-factor authentication and dynamic biometric signatures / Vladimír Smejkal -- Battlefield cyberspace: exploitation of hyperconnectivity and internet of things / Maurice Dawson [and 4 others] -- Search space reduction in biometric databases: a review / Ilaiah Kavati, Munaga V. N. K. Prasad, Chakravarthy Bhagvati -- Physical layer security in multiuser wireless networks / Anish Prasad Shrestha, Kyung Sup Kwak -- Importance of a versatile logging tool for behavioural biometrics and continuous authentication research / Soumik Mondal [and 4 others] -- | |
505 | 8 | |a Evaluation of keystroke dynamics authentication systems: analysis of physical and touch screen keyboards / Moustafa Dafer, Mohamad El-Abed -- A wrapper-based classification approach for personal identification through keystroke dynamics using soft computing techniques / Shanmugapriya D., Padmavathi Ganapathi -- Defending information networks in cyberspace: some notes on security needs / Alberto da Conceição Carneiro. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book provides relevant theoretical frameworks and empirical research outlining potential threats while exploring their appropriate countermeasures, offering a broad perspective, from network security, surveillance, reconnaissance, and physical security"--Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 09/14/2016). | ||
650 | 0 | |a Internal security |z United States. | |
650 | 0 | |a National security |z United States. | |
650 | 0 | |a Terrorism |x Prevention. | |
650 | 0 | |a Terrorism |z United States |x Prevention. | |
653 | |a Civil liberties | ||
653 | |a Cyber terrorism | ||
653 | |a Disaster recovery planning | ||
653 | |a Human trafficking | ||
653 | |a Immigration enforcement | ||
653 | |a Information security | ||
653 | |a Natural disasters | ||
653 | |a Technology management | ||
653 | |a Technology transfer | ||
653 | |a Transportation security | ||
700 | 1 | |a Dawson, Maurice |d 1982- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2016023422 | |
776 | 0 | 8 | |i Print version: |z 1522507035 |z 9781522507031 |w (DLC) 2016023422 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0703-1 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00148511 |
---|---|
_version_ | 1816797077444755456 |
adam_text | |
any_adam_object | |
author2 | Dawson, Maurice 1982- |
author2_role | edt |
author2_variant | m d md |
author_facet | Dawson, Maurice 1982- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV6432 |
callnumber-raw | HV6432 .D48 2017e |
callnumber-search | HV6432 .D48 2017e |
callnumber-sort | HV 46432 D48 42017E |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-98-IGB |
contents | Types of terrorism / Gus Martin -- Protection of critical homeland assets: using a proactive, adaptive security management driven process / William J. Bailey -- Assessing the interactions between Native American tribes and the U.S. Government in homeland security and emergency management policy / Leigh R. Anderson -- Transnational crime and the American policing system / Starlett Michele Martin -- Islamic extremists in Africa: security spotlight on Kenya and Nigeria / Maurice Dawson, Wale Adeboje -- Border security and cooperative initiatives to counter illicit drug trafficking: the case of Jamaica and the USA / Suzette A. Haughton -- Biometric spoofing and anti-spoofing / Zahid Akhtar -- On using gait biometrics for re-identification in automated visual surveillance / Imed Bouchrika -- Multi-factor authentication and dynamic biometric signatures / Vladimír Smejkal -- Battlefield cyberspace: exploitation of hyperconnectivity and internet of things / Maurice Dawson [and 4 others] -- Search space reduction in biometric databases: a review / Ilaiah Kavati, Munaga V. N. K. Prasad, Chakravarthy Bhagvati -- Physical layer security in multiuser wireless networks / Anish Prasad Shrestha, Kyung Sup Kwak -- Importance of a versatile logging tool for behavioural biometrics and continuous authentication research / Soumik Mondal [and 4 others] -- Evaluation of keystroke dynamics authentication systems: analysis of physical and touch screen keyboards / Moustafa Dafer, Mohamad El-Abed -- A wrapper-based classification approach for personal identification through keystroke dynamics using soft computing techniques / Shanmugapriya D., Padmavathi Ganapathi -- Defending information networks in cyberspace: some notes on security needs / Alberto da Conceição Carneiro. |
ctrlnum | (CaBNVSL)gtp00566370 (OCoLC)958438562 |
dewey-full | 363.325/170973 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325/170973 |
dewey-search | 363.325/170973 |
dewey-sort | 3363.325 6170973 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04395nam a2200625 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00148511</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20160915133108.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">160914s2017 paua fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2016023422</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522507048</subfield><subfield code="q">electronic</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522507031</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-0703-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)gtp00566370</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)958438562</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6432</subfield><subfield code="b">.D48 2017e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.325/170973</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Developing next-generation countermeasures for homeland security threat prevention </subfield><subfield code="c">Maurice Dawson, Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing and Weifeng Li, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">PDFs (427 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">still image</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Types of terrorism / Gus Martin -- Protection of critical homeland assets: using a proactive, adaptive security management driven process / William J. Bailey -- Assessing the interactions between Native American tribes and the U.S. Government in homeland security and emergency management policy / Leigh R. Anderson -- Transnational crime and the American policing system / Starlett Michele Martin -- Islamic extremists in Africa: security spotlight on Kenya and Nigeria / Maurice Dawson, Wale Adeboje -- Border security and cooperative initiatives to counter illicit drug trafficking: the case of Jamaica and the USA / Suzette A. Haughton -- Biometric spoofing and anti-spoofing / Zahid Akhtar -- On using gait biometrics for re-identification in automated visual surveillance / Imed Bouchrika -- Multi-factor authentication and dynamic biometric signatures / Vladimír Smejkal -- Battlefield cyberspace: exploitation of hyperconnectivity and internet of things / Maurice Dawson [and 4 others] -- Search space reduction in biometric databases: a review / Ilaiah Kavati, Munaga V. N. K. Prasad, Chakravarthy Bhagvati -- Physical layer security in multiuser wireless networks / Anish Prasad Shrestha, Kyung Sup Kwak -- Importance of a versatile logging tool for behavioural biometrics and continuous authentication research / Soumik Mondal [and 4 others] -- </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Evaluation of keystroke dynamics authentication systems: analysis of physical and touch screen keyboards / Moustafa Dafer, Mohamad El-Abed -- A wrapper-based classification approach for personal identification through keystroke dynamics using soft computing techniques / Shanmugapriya D., Padmavathi Ganapathi -- Defending information networks in cyberspace: some notes on security needs / Alberto da Conceição Carneiro.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book provides relevant theoretical frameworks and empirical research outlining potential threats while exploring their appropriate countermeasures, offering a broad perspective, from network security, surveillance, reconnaissance, and physical security"--Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 09/14/2016).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internal security</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">National security</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Civil liberties</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber terrorism</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Disaster recovery planning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Human trafficking</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Immigration enforcement</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Information security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Natural disasters</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Technology management</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Technology transfer</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Transportation security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dawson, Maurice</subfield><subfield code="d">1982-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2016023422</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522507035</subfield><subfield code="z">9781522507031</subfield><subfield code="w">(DLC) 2016023422</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0703-1</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00148511 |
illustrated | Illustrated |
indexdate | 2024-11-26T14:51:50Z |
institution | BVB |
isbn | 9781522507048 |
language | English |
oclc_num | 958438562 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | PDFs (427 pages) : illustrations. Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | IGI Global, |
record_format | marc |
spelling | Developing next-generation countermeasures for homeland security threat prevention Maurice Dawson, Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing and Weifeng Li, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2017] PDFs (427 pages) : illustrations. still image rdacontent text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Types of terrorism / Gus Martin -- Protection of critical homeland assets: using a proactive, adaptive security management driven process / William J. Bailey -- Assessing the interactions between Native American tribes and the U.S. Government in homeland security and emergency management policy / Leigh R. Anderson -- Transnational crime and the American policing system / Starlett Michele Martin -- Islamic extremists in Africa: security spotlight on Kenya and Nigeria / Maurice Dawson, Wale Adeboje -- Border security and cooperative initiatives to counter illicit drug trafficking: the case of Jamaica and the USA / Suzette A. Haughton -- Biometric spoofing and anti-spoofing / Zahid Akhtar -- On using gait biometrics for re-identification in automated visual surveillance / Imed Bouchrika -- Multi-factor authentication and dynamic biometric signatures / Vladimír Smejkal -- Battlefield cyberspace: exploitation of hyperconnectivity and internet of things / Maurice Dawson [and 4 others] -- Search space reduction in biometric databases: a review / Ilaiah Kavati, Munaga V. N. K. Prasad, Chakravarthy Bhagvati -- Physical layer security in multiuser wireless networks / Anish Prasad Shrestha, Kyung Sup Kwak -- Importance of a versatile logging tool for behavioural biometrics and continuous authentication research / Soumik Mondal [and 4 others] -- Evaluation of keystroke dynamics authentication systems: analysis of physical and touch screen keyboards / Moustafa Dafer, Mohamad El-Abed -- A wrapper-based classification approach for personal identification through keystroke dynamics using soft computing techniques / Shanmugapriya D., Padmavathi Ganapathi -- Defending information networks in cyberspace: some notes on security needs / Alberto da Conceição Carneiro. Restricted to subscribers or individual electronic text purchasers. "This book provides relevant theoretical frameworks and empirical research outlining potential threats while exploring their appropriate countermeasures, offering a broad perspective, from network security, surveillance, reconnaissance, and physical security"--Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 09/14/2016). Internal security United States. National security United States. Terrorism Prevention. Terrorism United States Prevention. Civil liberties Cyber terrorism Disaster recovery planning Human trafficking Immigration enforcement Information security Natural disasters Technology management Technology transfer Transportation security Dawson, Maurice 1982- editor. IGI Global, publisher. (Original) (DLC)2016023422 Print version: 1522507035 9781522507031 (DLC) 2016023422 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0703-1 Volltext |
spellingShingle | Developing next-generation countermeasures for homeland security threat prevention Types of terrorism / Gus Martin -- Protection of critical homeland assets: using a proactive, adaptive security management driven process / William J. Bailey -- Assessing the interactions between Native American tribes and the U.S. Government in homeland security and emergency management policy / Leigh R. Anderson -- Transnational crime and the American policing system / Starlett Michele Martin -- Islamic extremists in Africa: security spotlight on Kenya and Nigeria / Maurice Dawson, Wale Adeboje -- Border security and cooperative initiatives to counter illicit drug trafficking: the case of Jamaica and the USA / Suzette A. Haughton -- Biometric spoofing and anti-spoofing / Zahid Akhtar -- On using gait biometrics for re-identification in automated visual surveillance / Imed Bouchrika -- Multi-factor authentication and dynamic biometric signatures / Vladimír Smejkal -- Battlefield cyberspace: exploitation of hyperconnectivity and internet of things / Maurice Dawson [and 4 others] -- Search space reduction in biometric databases: a review / Ilaiah Kavati, Munaga V. N. K. Prasad, Chakravarthy Bhagvati -- Physical layer security in multiuser wireless networks / Anish Prasad Shrestha, Kyung Sup Kwak -- Importance of a versatile logging tool for behavioural biometrics and continuous authentication research / Soumik Mondal [and 4 others] -- Evaluation of keystroke dynamics authentication systems: analysis of physical and touch screen keyboards / Moustafa Dafer, Mohamad El-Abed -- A wrapper-based classification approach for personal identification through keystroke dynamics using soft computing techniques / Shanmugapriya D., Padmavathi Ganapathi -- Defending information networks in cyberspace: some notes on security needs / Alberto da Conceição Carneiro. Internal security United States. National security United States. Terrorism Prevention. Terrorism United States Prevention. |
title | Developing next-generation countermeasures for homeland security threat prevention |
title_auth | Developing next-generation countermeasures for homeland security threat prevention |
title_exact_search | Developing next-generation countermeasures for homeland security threat prevention |
title_full | Developing next-generation countermeasures for homeland security threat prevention Maurice Dawson, Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing and Weifeng Li, editors. |
title_fullStr | Developing next-generation countermeasures for homeland security threat prevention Maurice Dawson, Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing and Weifeng Li, editors. |
title_full_unstemmed | Developing next-generation countermeasures for homeland security threat prevention Maurice Dawson, Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing and Weifeng Li, editors. |
title_short | Developing next-generation countermeasures for homeland security threat prevention |
title_sort | developing next generation countermeasures for homeland security threat prevention |
topic | Internal security United States. National security United States. Terrorism Prevention. Terrorism United States Prevention. |
topic_facet | Internal security United States. National security United States. Terrorism Prevention. Terrorism United States Prevention. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0703-1 |
work_keys_str_mv | AT dawsonmaurice developingnextgenerationcountermeasuresforhomelandsecuritythreatprevention AT igiglobal developingnextgenerationcountermeasuresforhomelandsecuritythreatprevention |