第 1/5 張圖片





圖片庫
第 1/5 張圖片





有類似物品要出售?
Handbook of Computational Approaches to Counterterrori sm Subrahmanian Hardcover
US $58.76
大約HK$ 457.32
狀況:
“Unused Book, Photographs Included.”
很新
狀況完好的書籍。封面發亮且沒有損壞,精裝本書籍含書皮。不存在缺頁或內頁受損,無褶皺或破損,同時也沒有對文字標注/標記,或在留白處書寫內容。內封面上標記極少。書籍的磨損和破損程度也很低。
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
運送:
免費 USPS Media MailTM.
所在地:Sioux Falls, South Dakota, 美國
送達日期:
估計於 10月17日 (星期五)至 10月22日 (星期三)之間送達 運送地點 94104
退貨:
30 日退貨. 由賣家支付退貨運費.
保障:
請參閱物品說明或聯絡賣家以取得詳細資料。閱覽全部詳情查看保障詳情
(不符合「eBay 買家保障方案」資格)
賣家必須承擔此刊登物品的所有責任。
eBay 物品編號:375792590954
物品細節
- 物品狀況
- 很新
- 賣家備註
- “Unused Book, Photographs Included.”
- ISBN
- 9781489987662
關於產品
Product Identifiers
Publisher
Springer New York
ISBN-10
1489987665
ISBN-13
9781489987662
eBay Product ID (ePID)
240701128
Product Key Features
Number of Pages
Xviii, 578 Pages
Publication Name
Handbook of Computational Approaches to Counterterrorism
Language
English
Subject
Terrorism, Probability & Statistics / General, Intelligence (Ai) & Semantics, Computer Science
Publication Year
2015
Type
Textbook
Subject Area
Mathematics, Political Science, Computers
Format
Trade Paperback
Dimensions
Item Weight
313.6 Oz
Item Length
9.3 in
Item Width
6.1 in
Additional Product Features
Intended Audience
Scholarly & Professional
Dewey Edition
23
Number of Volumes
1 vol.
Illustrated
Yes
Dewey Decimal
363.325170285
Table Of Content
Data and Data Acquisition.- Behavioral Models and Forecasting.- Terrorist Network Analysis.- Systems, Frameworks, and Case Studies.- New Directions.
Synopsis
Terrorist groups throughout the world have been studied primarily through the use of social science methods. However, major advances in IT during the past decade have led to significant new ways of studying terrorist groups, making forecasts, learning models of their behaviour, and shaping policies about their behaviour. Handbook of Computational Approaches to Counterterrorism provides the first in-depth look at how advanced mathematics and modern computing technology is shaping the study of terrorist groups. This book includes contributions from world experts in the field, and presents extensive information on terrorism data sets, new ways of building such data sets in real-time using text analytics, introduces the mathematics and computational approaches to understand terror group behaviour, analyzes terror networks, forecasts terror group behaviour, and shapes policies against terrorist groups. Auxiliary information will be posted on the book's website. This book targets defence analysts, counter terror analysts, computer scientists, mathematicians, political scientists, psychologists, and researchers from the wide variety of fields engaged in counter-terrorism research. Advanced-level students in computer science, mathematics and social sciences will also find this book useful., Terrorist groups throughout the world have been studied primarily through the use of social science methods. However, major advances in IT during the past decade have led to significant new ways of studying terrorist groups, making forecasts, learning models of their behaviour, and shaping policies about their behaviour. Handbook of Computational Approaches to Counterterrorism provides the first in-depth look at how advanced mathematics and modern computing technology is shaping the study of terrorist groups. This book includes contributions from world experts in the field, and presents extensive information on terrorism data sets, new ways of building such data sets in real-time using text analytics, introduces the mathematics and computational approaches to understand terror group behaviour, analyzes terror networks, forecasts terror group behaviour, and shapes policies against terrorist groups. Auxiliary information will be posted on the book's website. Thisbook targets defence analysts, counter terror analysts, computer scientists, mathematicians, political scientists, psychologists, and researchers from the wide variety of fields engaged in counter-terrorism research. Advanced-level students in computer science, mathematics and social sciences will also find this book useful.
LC Classification Number
Q334-342
賣家提供的物品說明
賣家信用評價 (1,510)
- eBay automated Feedback- 買家留下的信用評價。過去 1 個月Order delivered on time with no issues
- eBay automated Feedback- 買家留下的信用評價。過去 1 個月Order delivered on time with no issues
- eBay automated Feedback- 買家留下的信用評價。過去 1 個月Order delivered on time with no issues