Applications of Information Systems to Homeland Security and Defense, 1st Edition

  • Published By:
  • ISBN-10: 1591406439
  • ISBN-13: 9781591406433
  • DDC: 355.070973
  • Grade Level Range: College Freshman - College Senior
  • 257 Pages | eBook
  • Original Copyright 2006 | Published/Released October 2006
  • This publication's content originally published in print form: 2006

  • Price:  Sign in for price

About

Overview

A range of threats in the areas of safety and security, from natural disasters to terrorism to conventional warfare, involve complex interactions that are beyond the scope and capabilities of traditional problem solving techniques. Applications of Information Systems to Homeland Security and Defense provides an overview of complex systems' techniques and presents both guidelines and specific instances of how they can be applied to security and defense applications. In today's uncertain times, these techniques can provide a breakthrough in the capability to model, plan and respond to critical events in modern society.

Applications of Information Systems to Homeland Security and Defense is a must read for anyone who is interested in the areas of security and defense, as well as for undergraduate and postgraduate students who are eager to learn about the applications of complex adaptive systems to real-life problems.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Applications of Information Systems to Homeland Security and Defense.
Preface.
Acknowledgments.
1: All Hazards Analysis: A Complexity Perspective.
2: Small & Simple: Application-Specific Multi-Agent Systems.
3: How Hard Is It to Red Team?.
4: Network Robustness for Critical Infrastructure Networks.
5: Distributed Intrusion Detection Systems: A Computational Intelligence Approach.
6: The Game of Defense and Security.
7: Realized Applications of Positioning Technologies in Defense Intelligence.
8: The Advancement of Positioning Technologies in Defense Intelligence.
9: Simulating Complexity-Based Ethics for Crucial Decision Making in Counter Terrorism.
About the Authors.
Index.