Narrow your search

Library

KU Leuven (4)

ULiège (3)

KBR (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLouvain (2)

UCLL (2)

ULB (2)

VIVES (2)

More...

Resource type

book (4)


Language

English (4)


Year
From To Submit

2010 (1)

2009 (1)

2007 (1)

2005 (1)

Listing 1 - 4 of 4
Sort by

Book
Human rights in the Polder : human rights and security in the public and private sphere
Authors: ---
ISBN: 9789050957458 9050957455 Year: 2007 Publisher: Antwerpen Oxford : Intersentia,


Book
Security informatics
Authors: --- --- ---
ISBN: 1441913246 9786612832574 1441913254 1282832573 Year: 2010 Publisher: New York : Springer Science,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners. SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field and will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics.

Keywords

Business enterprises --Computer networks --Security measures -- Congresses. --- Computer security -- Congresses. --- Data mining -- Congresses. --- Electronic surveillance -- Congresses. --- Expert systems (Computer science) -- Congresses. --- National security -- Congresses. --- Computer security --- Data protection --- Computer Science --- Engineering & Applied Sciences --- Computer security. --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Operations research. --- Decision making. --- Information technology. --- Business --- Computer organization. --- Data mining. --- Artificial intelligence. --- Computer Science. --- Systems and Data Security. --- IT in Business. --- Data Mining and Knowledge Discovery. --- Operation Research/Decision Theory. --- Computer Systems Organization and Communication Networks. --- Artificial Intelligence (incl. Robotics). --- Data processing. --- Security systems --- Hacking --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Organization, Computer --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Deciding --- Decision (Psychology) --- Decision analysis --- Decision processes --- Making decisions --- Management --- Management decisions --- Choice (Psychology) --- Problem solving --- Operational analysis --- Operational research --- Industrial engineering --- Management science --- Research --- System theory --- Informatics --- Science --- Decision making --- Computer network architectures. --- Operations Research/Decision Theory. --- Artificial Intelligence. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Business—Data processing.


Book
Energy and environmental challenges to security
Authors: --- ---
ISBN: 1402094515 9786611986414 1281986410 1402094531 Year: 2009 Publisher: Dordrecht, Netherlands : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

On 21 November 2007 the grand and elegant Delegates Hall of the Hungarian Parliament was the scene of the opening of a conference to discuss some of the most pressing issues of the day, those related to our unending thirst for energy, its environmental consequences, and the challenges that these bear on security. Over the next 3 days scientists, parliamentarians and their guests confronted, challenged, teased and cajoled each other in a NATO Advanced Research Workshop (ARW) entitled “Energy and Environmental Challenges to Security,” affirming that knowledge and public service hold the keys to solving our greatest challenges. The magnitude of the security challenge was confirmed while this volume was being prepared. In mid-2008, the International Energy Agency issued a report concluding that US$45 trillion would be needed over the next half century to prevent energy shortages and greenhouse gas emissions from undermining global economic growth. But lest such large numbers cause us all to shrug, this volume brings attention to some of the more manageable aspects of the environment and energy security challenge – from addressing conflict resources such as illegal timber that contribute to corruption and regional instability, to means and mechanisms to enable the diversification of energy supplies, to environmental risk reduction strategies for particular installations. The participants in the Hungarian Parliament building were atypical for a NATO Advanced Research Workshop.

Keywords

Energy industries --Security measures --Congresses. --- Energy policy --Congresses. --- Environmental policy --Congresses. --- National security --Congresses. --- Energy industries --- Energy policy --- Environmental policy --- National security --- Industries --- Environmental Sciences --- Business & Economics --- Earth & Environmental Sciences --- Security measures --- Environmental management. --- Security, International --- Environmental aspects. --- Collective security --- International security --- Environmental stewardship --- Stewardship, Environmental --- Environment. --- Energy policy. --- Energy and state. --- Climate change. --- Political science. --- Environmental sciences. --- Economic policy. --- Environmental Management. --- Environmental Science and Engineering. --- Political Science. --- Climate Change Management and Policy. --- Energy Policy, Economics and Management. --- Economic Policy. --- Environmental sciences --- Management --- International relations --- Disarmament --- International organization --- Peace --- Economic nationalism --- Economic planning --- National planning --- State planning --- Economics --- Planning --- Social policy --- Administration --- Civil government --- Commonwealth, The --- Government --- Political theory --- Political thought --- Politics --- Science, Political --- Social sciences --- State, The --- Energy and state --- Power resources --- State and energy --- Industrial policy --- Energy conservation --- Changes, Climatic --- Changes in climate --- Climate change --- Climate change science --- Climate changes --- Climate variations --- Climatic change --- Climatic changes --- Climatic fluctuations --- Climatic variations --- Global climate changes --- Global climatic changes --- Climatology --- Climate change mitigation --- Teleconnections (Climatology) --- Environmental science --- Science --- Government policy --- Environmental aspects

Listing 1 - 4 of 4
Sort by