Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next

Title Application of big data for national security : a practitioner's guide to emerging technologies / edited by Babak Akhgar [and five others]. [O'Reilly electronic resource]

Publication Info. Oxford, UK : Butterworth-Heinemann, an imprint of Elsevier Ltd., [2015]
©2015
QR Code
Description 1 online resource
Bibliography Includes bibliographical referencesa and index.
Summary Annotation 'Mining Big Data to Improve National Security' introduces state-of-the-art concepts and technologies surrounding big data, providing users with a strategic framework that can be used to combat terrorism and reduce crime.
Contents Front Cover -- Application of Big Data for National Security: A Practitioner's Guide to Emerging Technologies -- Copyright -- Contents -- List of Contributors -- About the Editors -- Foreword by Lord Carlile of Berriew -- Preface by Edwin Meese III -- Acknowledgments -- Section 1 -- INTRODUCTION TO BIG DATA -- Chapter 1 -- An Introduction to Big Data -- WHAT IS BIG DATA? -- HOW DIFFERENT IS BIG DATA? -- MORE ON BIG DATA: TYPES AND SOURCES -- THE FIVE V'S OF BIG DATA -- BIG DATA IN THE BIG WORLD -- ANALYTICAL CAPABILITIES OF BIG DATA -- STREAMING ANALYTICS -- AN OVERVIEW OF BIG DATA SOLUTIONS -- CONCLUSIONS -- REFERENCES -- CHAPTER 2 -- DRILLING INTO THE BIG DATA GOLD MINE: DATA FUSION AND HIGH-PERFORMANCE ANALYTICS FOR INTELLIGENCE PROFESSIONALS -- INTRODUCTION -- THE AGE OF BIG DATA AND HIGH-PERFORMANCE ANALYTICS -- TECHNOLOGY CHALLENGES -- EXAMPLES -- CONCLUSION -- REFERENCE -- Section 2 -- CORE CONCEPTS AND APPLICATION SCENARIOS -- CHAPTER 3 -- HARNESSING THE POWER OF BIG DATA TO COUNTER INTERNATIONAL TERRORISM -- INTRODUCTION -- A NEW TERROR -- CHANGING THREAT LANDSCAPE -- EMBRACING BIG DATA -- CONCLUSION -- REFERENCES -- CHAPTER 4 -- BIG DATA AND LAW ENFORCEMENT: ADVANCES, IMPLICATIONS, AND LESSONS FROM AN ACTIVE SHOOTER CASE STUDY -- THE INTERSECTION OF BIG DATA AND LAW ENFORCEMENT -- CASE EXAMPLE AND WORKSHOP OVERVIEW -- SITUATIONAL AWARENESS -- TWITTER AS A SOCIAL MEDIA SOURCE OF BIG DATA -- SOCIAL MEDIA DATA ANALYZED FOR THE WORKSHOP -- TOOLS AND CAPABILITIES PROTOTYPES DURING THE WORKSHOP -- LAW ENFORCEMENT FEEDBACK FOR THE SESSIONS -- DISCUSSION -- ACKNOWLEDGMENTS -- REFERENCES -- CHAPTER 5 -- INTERPRETATION AND INSIDER THREAT: REREADING THE ANTHRAX MAILINGS OF 2001 THROUGH A "BIG DATA" LENS -- INTRODUCTION -- IMPORTANCE OF THE CASE -- THE ADVANCEMENT OF BIG DATA ANALYTICS AFTER 2001 -- RELEVANT EVIDENCE.
POTENTIAL FOR STYLOMETRIC AND SENTIMENT ANALYSIS -- POTENTIAL FOR FURTHER PATTERN ANALYSIS AND VISUALIZATION -- FINAL WORDS: INTERPRETATION AND INSIDER THREAT -- REFERENCES -- CHAPTER 6 -- CRITICAL INFRASTRUCTURE PROTECTION BY HARNESSING BIG DATA -- INTRODUCTION -- UNDERSTANDING THE STRATEGIC LANDSCAPE INTO WHICH BIG DATA MUST BE APPLIED -- WHAT IS MEANT BY AN OVERARCHING ARCHITECTURE? -- UNDERPINNING THE SCR -- STRATEGIC COMMUNITY ARCHITECTURE FRAMEWORK -- CONCLUSIONS -- REFERENCES -- CHAPTER 7 -- MILITARY AND BIG DATA REVOLUTION -- RISK OF COLLAPSE -- INTO THE BIG DATA ARENA -- SIMPLE TO COMPLEX USE CASES -- CANONIC USE CASES -- MORE ON THE DIGITAL VERSION OF THE REAL WORLD (SEE THE WORLD AS EVENTS) -- REAL-TIME BIG DATA SYSTEMS -- IMPLEMENTING THE REAL-TIME BIG DATA SYSTEM -- INSIGHT INTO DEEP DATA ANALYTICS TOOLS AND REAL-TIME BIG DATA SYSTEMS -- VERY SHORT LOOP AND BATTLEFIELD BIG DATA DATACENTERS -- CONCLUSIONS -- FURTHER READING -- CHAPTER 8 -- CYBERCRIME: ATTACK MOTIVATIONS AND IMPLICATIONS FOR BIG DATA AND NATIONAL SECURITY -- INTRODUCTION -- DEFINING CYBERCRIME AND CYBERTERRORISM -- ATTACK CLASSIFICATION AND PARAMETERS -- WHO PERPETRATES THESE ATTACKS? -- TOOLS USED TO FACILITATE ATTACKS -- MOTIVATIONS -- ATTACK MOTIVATIONS TAXONOMY -- DETECTING MOTIVATIONS IN OPEN-SOURCE INFORMATION -- CONCLUSION -- REFERENCES -- Section 3 -- METHODS AND TECHNOLOGICAL SOLUTIONS -- CHAPTER 9 -- REQUIREMENTS AND CHALLENGES FOR BIG DATA ARCHITECTURES -- WHAT ARE THE CHALLENGES INVOLVED IN BIG DATA PROCESSING? -- TECHNOLOGICAL UNDERPINNING -- PLANNING FOR A BIG DATA PLATFORM -- CONCLUSIONS -- REFERENCES -- CHAPTER 10 -- TOOLS AND TECHNOLOGIES FOR THE IMPLEMENTATION OF BIG DATA -- INTRODUCTION -- TECHNIQUES -- Analysis -- COMPUTATIONAL TOOLS -- IMPLEMENTATION -- PROJECT INITIATION AND LAUNCH -- DATA SOURCES AND ANALYTICS -- ANALYTICS PHILOSOPHY: ANALYSIS OR SYNTHESIS.
GOVERNANCE AND COMPLIANCE -- REFERENCES -- CHAPTER 11 -- MINING SOCIAL MEDIA: ARCHITECTURE, TOOLS, AND APPROACHES TO DETECTING CRIMINAL ACTIVITY -- INTRODUCTION -- MINING OF SOCIAL NETWORKS FOR CRIME -- TEXT MINING -- NATURAL LANGUAGE METHODS -- GENERAL ARCHITECTURE AND VARIOUS COMPONENTS OF TEXT MINING -- AUTOMATIC EXTRACTION OF BNS FROM TEXT -- BNS AND CRIME DETECTION -- CONCLUSIONS -- REFERENCES -- CHAPTER 12 -- MAKING SENSE OF UNSTRUCTURED NATURAL LANGUAGE INFORMATION -- INTRODUCTION -- BIG DATA AND UNSTRUCTURED DATA -- ASPECTS OF UNCERTAINTY IN SENSE MAKING -- SITUATION AWARENESS AND INTELLIGENCE -- PROCESSING NATURAL LANGUAGE DATA -- STRUCTURING NATURAL LANGUAGE DATA -- TWO SIGNIFICANT WEAKNESSES -- AN ALTERNATIVE REPRESENTATION FOR FLEXIBILITY -- CONCLUSIONS -- REFERENCES -- CHAPTER 13 -- LITERATURE MINING AND ONTOLOGY MAPPING APPLIED TO BIG DATA -- INTRODUCTION -- BACKGROUND -- ARIANA: ADAPTIVE ROBUST INTEGRATIVE ANALYSIS FOR FINDING NOVEL ASSOCIATIONS -- CONCEPTUAL FRAMEWORK OF ARIANA -- IMPLEMENTATION OF ARIANA FOR BIOMEDICAL APPLICATIONS -- CASE STUDIES -- DISCUSSION -- CONCLUSIONS -- ACKNOWLEDGMENT -- REFERENCES -- CHAPTER 14 -- BIG DATA CONCERNS IN AUTONOMOUS AI SYSTEMS -- INTRODUCTION -- ARTIFICIALLY INTELLIGENT SYSTEM MEMORY MANAGEMENT -- ARTIFICIAL MEMORY PROCESSING AND ENCODING -- CONSTRUCTIVIST LEARNING -- PRACTICAL SOLUTIONS FOR SECURE KNOWLEDGE DEVELOPMENT IN BIG DATA ENVIRONMENTS -- CONCLUSIONS -- REFERENCES -- Section 4 -- LEGAL AND SOCIAL CHALLENGES -- CHAPTER 15 -- THE LEGAL CHALLENGES OF BIG DATA APPLICATION IN LAW ENFORCEMENT -- INTRODUCTION -- LEGAL FRAMEWORK -- CONCLUSIONS -- REFERENCES -- CHAPTER 16 -- BIG DATA AND THE ITALIAN LEGAL FRAMEWORK: OPPORTUNITIES FOR POLICE FORCES -- INTRODUCTION -- EUROPEAN LEGAL FRAMEWORK -- THE ITALIAN LEGAL FRAMEWORK -- OPPORTUNITIES AND CONSTRAINTS FOR POLICE FORCES AND INTELLIGENCE -- REFERENCES.
CHAPTER 17 -- ACCOUNTING FOR CULTURAL INFLUENCES IN BIG DATA ANALYTICS -- INTRODUCTION -- CONSIDERATIONS FROM CROSS-CULTURAL PSYCHOLOGY FOR BIG DATA ANALYTICS -- CULTURAL DEPENDENCE IN THE SUPPLY AND DEMAND SIDES OF BIG DATA ANALYTICS -- (MIS)MATCHES AMONG PRODUCER, PRODUCTION, INTERPRETER, AND INTERPRETATION CONTEXTS -- INTEGRATING CULTURAL INTELLIGENCE INTO BIG DATA ANALYTICS: SOME RECOMMENDATIONS -- CONCLUSIONS -- REFERENCES -- CHAPTER 18 -- MAKING SENSE OF THE NOISE: AN ABC APPROACH TO BIG DATA AND SECURITY -- HOW HUMANS NATURALLY DEAL WITH BIG DATA -- THE THREE STAGES OF DATA PROCESSING EXPLAINED -- THE PUBLIC ORDER POLICING MODEL AND THE COMMON OPERATIONAL PICTURE -- APPLICATIONS TO BIG DATA AND SECURITY -- APPLICATION TO BIG DATA AND NATIONAL SECURITY -- A FINAL CAVEAT FROM THE FBI BULLETIN -- REFERENCES -- Glossary -- Index.
Subject National security -- United States.
Big data.
Data protection.
Science and state.
Technology and state.
Données volumineuses.
Protection de l'information (Informatique)
Politique scientifique et technique.
Technology and state
Big data
Data protection
National security
Science and state
United States
Added Author Akhgar, Babak, editor.
Other Form: Print version: Application of big data for national security. Oxford, UK : Butterworth-Heinemann, an imprint of Elsevier Ltd., [2015] 0128019670 (OCoLC)898052443
ISBN 9780128019733 (electronic bk.)
0128019735 (electronic bk.)
0128019670
9780128019672
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information