Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "terrorism"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"004 - Data processing & computer science"
Showing
1
-
20
of
22
Search:
'"terrorism"'
,
query time: 0.04s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Mathematical Methods in Counterterrorism
Published 2009
Springer Vienna
Table of Contents:
“
... Mathematical Analysis of Short-term Responses to Threats of
Terrorism
-- Network Detection Theory...
”
Read Now
2
Intelligence and Security Informatics for International Security : Information Sharing and Data Mining
by
Chen, Hsinchun
Published 2006
Springer US
Table of Contents:
“
... -- Domestic Counter-
Terrorism
-- Protecting Critical Infrastructure and Key Assets -- Defending Against...
”
Read Now
3
Zum Frühstück gibt's Apps : Mehr Durchblick in der digitalen Welt
by
Lembke, Gerald
,
Leipner, Ingo
Published 2020
Springer Berlin Heidelberg
Table of Contents:
“
...-Wahn -- Shopping-Himmel -- Digitaler Knieschuss -- Totale Überwachung --
Terror
durch E-Mails...
”
Read Now
4
Zum Frühstück gibt's Apps : Der tägliche Kampf mit der Digitalen Ambivalenz
by
Lembke, Gerald
,
Leipner, Ingo
Published 2014
Springer Berlin Heidelberg
Table of Contents:
“
... --
Terror
durch E-Mails -- Hardware-Gläubige -- Digitale Bildungswelt -- Tobender Mob im Netz -- IT-Angriff...
”
Read Now
5
Cyberterrorism : Understanding, Assessment, and Response
Published 2014
Springer New York
Table of Contents:
“
...What is 'Cyberterrorism'? Computer and Internet Technology in Legal Definitions of
Terrorism
...
”
Read Now
6
Advances in Information Security and Assurance : Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
Published 2009
Springer Berlin Heidelberg
Table of Contents:
“
..., and Other Security Products -- Internet and Web Services Security -- Cyber-attack and Cyber-
terrorism
...
”
Read Now
7
Encyclopedia of Social Network Analysis and Mining
Published 2020
Springer New York
Table of Contents:
“
... Security,
Terrorism
, Fraud Detection, Public Sector, Politics and Case studies -- Social Network...
”
Read Now
8
Social Computing, Behavioral Modeling, and Prediction
Published 2008
Springer US
Table of Contents:
“
... in Predictive Behavioral Modeling -- The SOMA
Terror
Organization Portal (STOP): social network and analytic...
”
Read Now
9
Human Choice and Computers : Issues of Choice and Quality of Life in the Information Society
Published 2002
Springer US
Table of Contents:
“
... to Privacy, Freedom of Information and Civil Liberties in the Age of
Terrorism
-- National Identification...
”
Read Now
10
The Social Life of Avatars : Presence and Interaction in Shared Virtual Environments
Published 2002
Springer London
Table of Contents:
“
...: Death and Life in Virtual Worlds -- 5 30 Days in Active Worlds - Community, Design and
Terrorism
in a...
”
Read Now
11
Intelligence and Security Informatics : European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings
Published 2008
Springer Berlin Heidelberg
Table of Contents:
“
... Knowledge Reachback -- Rampart: A Service and Agent-Based Architecture for Anti-
Terrorism
Planning...
”
Read Now
12
Encyclopedia of Social Network Analysis and Mining
Published 2014
Springer New York
Table of Contents:
“
... studies -- Social Network Applications in Homeland Security,
Terrorism
, Fraud Detection, Public Sector...
”
Read Now
13
Securing Electronic Business Processes : Highlights of the Information Security Solutions Europe 2003 Conference
Published 2004
Vieweg+Teubner Verlag
Table of Contents:
“
... -- IT Risk Assessment -- Cybercrime and Cyber
Terrorism
-- Providing Cost-effective Security Functionality...
”
Read Now
14
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba
by
Subrahmanian, V.S.
,
Mannes, Aaron
,
Sliva, Amy
,
Shakarian, Jana
Published 2013
Springer New York
“
... in the counter-
terrorism
community to be an even greater threat to the US and world peace than Al Qaeda...
”
Read Now
15
Research and Development in Intelligent Systems XXVIII : Incorporating Applications and Innovations in Intelligent Systems XIX Proceedings of AI-2011, the Thirty-first SGAI Interna...
Published 2011
Springer London
Table of Contents:
“
... Organisational Compatible Plans Generation Framework -- A Neural Network for Counter-
Terrorism
S. Dixon, M. Dixon...
”
Read Now
16
ISSE/SECURE 2007 Securing Electronic Business Processes : Highlights of the Information Security Solutions Europe/SECURE 2007 Conference
Published 2007
Vieweg+Teubner Verlag
Table of Contents:
“
... Security and Privacy in Addressing Crime and
Terrorism
on the Internet -- Data Encryption on File Servers...
”
Read Now
17
Foundations of Augmented Cognition. Advancing Human Performance and Decision-Making through Adaptive Systems : 8th International Conference, AC 2014, Held as Part of HCI Internatio...
Published 2014
Springer International Publishing
Table of Contents:
“
... of the Perceived Threat of
Terrorism
and Behavioral Responses of Terrorist Activities -- Untangling Operator...
”
Read Now
18
Harbour Protection Through Data Fusion Technologies
Published 2009
Springer Netherlands
“
.... Defence Against
Terrorism
or Countering Other Threats to Security) and also preferably on a Partner...
”
Read Now
19
Social Computing and Social Media. Design, Ethics, User Behavior, and Social Network Analysis : 12th International Conference, SCSM 2020, Held as Part of the 22nd HCI International...
Published 2020
Springer International Publishing
Table of Contents:
“
... Properties of Information Diffusion during the 2019 Halle
Terror
Attack on Twitter -- Cultural Factors...
”
Read Now
20
Social Computing and Social Media. Participation, User Experience, Consumer Experience, and Applications of Social Computing : 12th International Conference, SCSM 2020, Held as Par...
Published 2020
Springer International Publishing
Table of Contents:
“
... Properties of Information Diffusion during the 2019 Halle
Terror
Attack on Twitter -- Cultural Factors...
”
1
2
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 004 - Data processing & computer science
Year of Publication
From:
To:
Classification
004 - Data processing & computer science
005 - Computer programming, programs & data
6
621 - Applied physics
2
Language
English
19
German
3
Collection
Springer eBooks 2005-
17
Springer Book Archives -2004
5
Author
Alhajj, Reda
2
Hicks, David L.
2
Leipner, Ingo
2
Lembke, Gerald
2
Meiselwitz, Gabriele
2
Pohlmann, Norbert
2
more ...
Reimer, Helmut
2
Rokne, Jon
2
Atiquzzaman, Mohammed
1
Berleur, Jacques
1
Bramer, Max
1
Brunnstein, Klaus
1
Chen, Hsiao-Hwa
1
Chen, Hsinchun
1
Chen, Thomas M.
1
Dilligan, Robert J.
1
Farley, Jonathan David
1
Fidopiastis, Cali M.
1
Jarvis, Lee
1
Larsen, Henrik Legind
1
Lee, Changhoon
1
Liu, Huan
1
Lübbe, Hermann
1
Macdonald, Stuart
1
Mannes, Aaron
1
Memon, Nasrullah
1
Nolle, Lars
1
Ortiz-Arroyo, Daniel
1
Park, James (Jong Hyuk)
1
Paulus, Sachar
1
Petridis, Miltos
1
Rogova, Galina
1
Rosenorn, Torben
1
Salerno, John
1
Schmorrow, Dylan D.
1
Schneider, Wolfgang
1
Schroeder, Ralph
1
Shahbazian, Elisa
1
Shakarian, Jana
1
Sliva, Amy
1
Subrahmanian, V.S.
1
Young, Michael J.
1
Zeng, Daniel
1
de Weert, Michael J.
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22004+-+Data+processing+%26+computer+science%22&lookfor=%22terrorism%22&type=AllFields
Send by Email
×
Loading...