Investigative Data Mining for Security and Criminal Detection
Jesus Mena
- 出版商: Butterworth-Heineman
- 出版日期: 2002-12-16
- 售價: $3,110
- 貴賓價: 9.5 折 $2,955
- 語言: 英文
- 頁數: 272
- 裝訂: Paperback
- ISBN: 0750676132
- ISBN-13: 9780750676137
-
相關分類:
Data-mining、資訊安全
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$2,010$1,910 -
$590$466 -
$399After Effects in Production: A Companion for Creating Motion Graphics, 2/e
-
$1,078Operating System Principles, 7/e(IE) (美國版ISBN:0471694665-Operating System Concepts, 7/e) (平裝)
-
$2,140$2,033 -
$880$695 -
$1,550$1,473 -
$650$507 -
$550$468 -
$990LPI Linux Certification in a Nutshell, 2/e (Paperback)
-
$1,296Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis (Paperback)
-
$450$351 -
$1,280RFID+: CompTIA RFID+ Study Guide and Practice Exam (RF0-001)
-
$990$891 -
$600$480 -
$1,180$1,003 -
$680$578 -
$800$632 -
$650$514 -
$520$411 -
$580$493 -
$450$351 -
$450$383 -
$580$458 -
$680$537
相關主題
商品描述
Description
Investigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest data mining techniques and shows how they can be used as investigative tools. Readers will learn how to search public and private databases and networks to flag potential security threats and root out criminal activities even before they occur. The groundbreaking book reviews the latest data mining technologies including intelligent agents, link analysis, text mining, decision trees, self-organizing maps, machine learning, and neural networks. Using clear, understandable language, it explains the application of these technologies in such areas as computer and network security, fraud prevention, law enforcement, and national defense. International case studies throughout the book further illustrate how these technologies can be used to aid in crime prevention. Investigative Data Mining for Security and Criminal Detection will also serve as an indispensable resource for software developers and vendors as they design new products for the law enforcement and intelligence communities.
Table of Contents
1) Pre-Crime Data Mining 2) Investigative Data Warehousing 3) Link Analysis: Visualizing Associations 4) Intelligent Agents: Software Detectives 5) Text Mining: Clustering Concepts 6) Neural Networks: Classifying Patterns 7) Machine Learning: Developing Profiles 8) NetFraud: A Case Study 9) Criminal Patterns: Detection Techniques 10) Intrusion Detection: Techniques and Systems 11) An Entity Validation System (EVS): A Conceptual Architecture 12) Mapping Crime: Clustering CaseWork Appendix A: 1,000 Online Sources for the Forensic Data Miner Appendix B: Intrusion Detection Systems (IDS) Products, Services, Freeware and Projects Glossary
商品描述(中文翻譯)
《安全與犯罪檢測的調查性數據挖掘》是第一本概述數據挖掘技術如何在21世紀用於打擊犯罪的書籍。它向安全經理、執法調查人員、反情報特工、詐騙專家和信息安全分析師介紹了最新的數據挖掘技術,並展示了它們如何作為調查工具使用。讀者將學習如何搜索公共和私人數據庫和網絡,以標記潛在的安全威脅,甚至在它們發生之前揪出犯罪活動。這本開創性的書籍回顧了最新的數據挖掘技術,包括智能代理、關聯分析、文本挖掘、決策樹、自組織映射、機器學習和神經網絡。它用清晰易懂的語言解釋了這些技術在計算機和網絡安全、詐騙預防、執法和國家防御等領域的應用。書中的國際案例研究進一步說明了這些技術如何用於犯罪預防。《安全與犯罪檢測的調查性數據挖掘》也將成為軟件開發人員和供應商在為執法和情報界設計新產品時的不可或缺的資源。
目錄:
1) 預先犯罪數據挖掘
2) 調查性數據倉儲
3) 關聯分析:可視化關聯
4) 智能代理:軟件偵探
5) 文本挖掘:聚類概念
6) 神經網絡:分類模式
7) 機器學習:開發個人檔案
8) 網絡詐騙:案例研究
9) 犯罪模式:檢測技術
10) 入侵檢測:技術和系統
11) 實體驗證系統(EVS):概念架構
12) 犯罪映射:聚類案例
附錄A:1000個法醫數據挖掘在線資源
附錄B:入侵檢測系統(IDS)產品、服務、免費軟件和項目
詞彙表