Applications of information systems to homeland security and defense /

A range of threats in the areas of safety and security, from natural disasters to terrorism to conventional warfare, involve complex interactions that are beyond the scope and capabilities of traditional problem solving techniques. Applications of Information Systems to Homeland Security and Defense...

Full description

Saved in:
Bibliographic Details
Corporate Authors: IGI Global
Group Author: Abbass, Hussein A. (Editor); Essam, Daryl, 1969- (Editor)
Published: IGI Global,
Publisher Address: Hershey, Pa. :
Publication Dates: 2006.
Literature type: eBook
Language: English
Subjects:
Online Access: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-640-2
Summary: A range of threats in the areas of safety and security, from natural disasters to terrorism to conventional warfare, involve complex interactions that are beyond the scope and capabilities of traditional problem solving techniques. Applications of Information Systems to Homeland Security and Defense provides an overview of complex systems' techniques and presents both guidelines and specific instances of how they can be applied to security and defense applications. In today's uncertain times, these techniques can provide a breakthrough in the capability to model, plan and respond to critical events in modern society.
Carrier Form: PDFs (xii, 257 pages (some col.), col. maps) : illustrations
Bibliography: Includes bibliographical references and index.
ISBN: 9781591406433 (PDF)
1591406439 (PDF)
Access: Restricted to subscribers or individual electronic text purchasers.
Index Number: UG479
CLC: E919
Contents: 1. All hazards analysis : a complexity perspective / Daryl Essam, Hussein A. Abbass -- 2. Small & simple : application-specific multi-agent systems / Michael Barlow, Robert Cox -- 3. How hard is it to red team? / Ang Yang, Hussein A. Abbass, Ruhul Sarker -- 4. Network robustness for critical infrastructure networks / Anthony H. Dekker, Bernard Colbert -- 5. Distributed intrusion detection systems : a computational intelligence approach / Ajith Abraham, Johnson Thomas -- 6. The game of defense and security / Michael Barlow -- 7. Realized applications of positioning technologies in defense intelligence / Katina Michael, Amelia Masters -- 8. The advancement of positioning technologies in defense intelligence / Katina Michael, Amelia Masters -- 9. Simulating complexity-based ethics for crucial decision making in counter terrorism / Cecilia Andrews, Edward Lewis.