Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Bücher der Reihe Terrorism, Security, and Computation

Filter
Filter
Ordnen nachSortieren Reihenfolge der Serie
  • 12% sparen
    von Michael Ovelgonne, Tudor Dumitras, V. S. Subrahmanian & usw.
    94,00 - 95,00 €

    This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec.

  • 12% sparen
    - Computational Analysis and Public Policy
    von Aaron Mannes, Animesh Roul, R.K. Raghavan & usw.
    89,00 - 93,00 €

    Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy "This book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies.

  • 13% sparen
    - Threats and Counter Efforts
     
    159,00 €

    This book covers the security and safety of CBRNE assets and management, and illustrates which risks may emerge and how to counter them through an enhanced risk management approach.

  • - Patterns and Trends
    von Patricia Taft & Nate Haken
    50,00 €

    The analysis of violence at state and local levels reveals a fractal pattern of overlapping ecosystems of conflict risk that must be understood for effective, conflict-sensitive approaches to development and direct conflict mitigation efforts.

  • von Kishan G. Mehrotra, Chilukuri K. Mohan & HuaMing Huang
    92,00 - 128,00 €

  • 13% sparen
    - Threats and Counter Efforts
     
    158,00 €

    This book covers the security and safety of CBRNE assets and management, and illustrates which risks may emerge and how to counter them through an enhanced risk management approach.

  • 11% sparen
     
    95,00 €

    This book analyzes the multimodal verbal and nonverbal behavior of humans in both an artificial game, based on the well-known Mafia and Resistance games, as well as selected other settings. This book develops statistical results linking different types of facial expressions (e.g. smile, pursed lips, raised eyebrows), vocal features (e.g., pitch, loudness) and linguistic features (e.g., dominant language, turn length) with both unary behaviors (e.g. is person X lying?) to binary behaviors (Is person X dominant compared to person Y? Does X trust Y? Does X like Y?). In addition, this book describes machine learning and computer vision-based algorithms that can be used to predict deception, as well as the visual focus of attention of people during discussions that can be linked to many binary behaviors. It is written by a multidisciplinary team of both social scientists and computer scientists.Meetings are at the very heart of human activity. Whether you are involved in a business meeting or in a diplomatic negotiation, such an event has multiple actors, some cooperative and some adversarial. Some actors may be deceptive, others may have complex relationships with others in the group. This book consists of a set of 11 chapters that describe the factors that link human behavior in group settings and attitudes to facial and voice characteristics.Researchers working in social sciences (communication, psychology, cognitive science) with an interest in studying the link between human interpersonal behavior and facial/speech/linguistic characteristics will be interested in this book. Computer scientists, who are interested in developing machine learning and deep learning based models of human behavior in group settings will also be interested in purchasing this book.

  • von M. D. Miller
    158,00 €

    This book offers a practical approach to conducting research in foreign languages on topics with a global nexus. It introduces the problem researchers face when getting started with a research problem, such as setting up the research environment and establishing goals for the research. The researcher then needs to prepares and to conduct foreign-language research by generating key terms and searching the right places where the information they seek is most likely to be stored. Using the appropriate advanced search operators, the researcher narrows down the search results to the desired sources, thereby eliminating the irrelevant sources. Specialized knowledge of country-specific domains advances the specificity and relevance of the researcher¿s efforts. The methods and tools demonstrated in this book are applicable to a variety of academic and practical fields. A doctor may ask ¿what are other experts in my field saying about ABC disease?¿ A sommelier may ask ¿where else in the world are XYZ grape varietals grown?¿ A businessman may ask ¿who are my global competitors in my market?¿ A doctoral student may ask ¿have any other students at universities abroad ever written a dissertation about my topic, too?¿ With the tools and techniques demonstrated in this book, all of these questions are answerable. This book concludes with chapters on translation and citation methods, and includes three case studies that demonstrate the practical use of the methods discussed above. This book targets academic researchers as well as students and faculty. This book will also be a good fit as an assigned reading for a college course on thesis/dissertation research.

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.