Related Books
Language: en
Pages: 272
Pages: 272
Type: BOOK - Published: 2005-09-30 - Publisher: IGI Global
"This book provides an overview of complex systems' techniques and presents both guidelines and specific instances of how they can be applied to security and de
Language: en
Pages: 170
Pages: 170
Type: BOOK - Published: 2004-08-03 - Publisher: National Academies Press
Shortly after the events of September 11, 2001, the U.S. Army asked the National Research Council (NRC) for a series of reports on how science and technology co
Language: en
Pages: 544
Pages: 544
Type: BOOK - Published: 2009-03-31 - Publisher: IGI Global
"This book emphasizes the convergence and trajectory of automatic identification and location-based services toward chip implants and real-time positioning capa
Language: en
Pages: 0
Pages: 0
Type: BOOK - Published: 2017-04-17 - Publisher: Praeger
A comprehensive textbook that overviews common technologies utilized within the homeland security enterprise with an emphasis on contemporary homeland security
Language: en
Pages: 377
Pages: 377
Type: BOOK - Published: 2008-10-26 - Publisher: National Academies Press
All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate