Logo - springer
Slogan - springer

Computer Science - Security and Cryptology | Security Informatics

Security Informatics

Yang, C.C., Chau, M., Wang, J.-H., Chen, H. (Eds.)

2010, VI, 206p. 120 illus., 60 illus. in color.

Available Formats:

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.


(net) price for USA

ISBN 978-1-4419-1325-8

digitally watermarked, no DRM

Included Format: PDF and EPUB

download immediately after purchase

learn more about Springer eBooks

add to marked items


Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.


(net) price for USA

ISBN 978-1-4419-1324-1

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days

add to marked items

  • Outlines the foundations and parameters of the field of Intelligence and Security Informatics (ISIS)
  • While this is a relatively new field, it is expanding in a variety of directions with, at this point, very few authoritative, archival resources, editing volumes, or books to assist its development; this is an authoritative volume by leading experts in ISI
  • The volume’s audience will include the following: graduate level students in information systems, information sciences, public policy, computer science, information assurance, and terrorism, researchers engaged in security informatics, homeland security, information policy, knowledge management, public administration, and counterterrorism, public and private sector practitioners in the national/international and homeland security area, consultants and contractors engaged in on-going relationships with federal, state, local, and international agencies on projects related to national security

Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners.

SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field and will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics.

Content Level » Professional/practitioner

Keywords » Information Technology (IT) - Protection - identity management - information system - intelligence - knowledge - network analysis - networks - security - service-oriented computing - social networks - text mining

Related subjects » Artificial Intelligence - Business Information Systems - Communication Networks - Database Management & Information Retrieval - Operations Research & Decision Theory - Security and Cryptology

Table of contents / Preface / Sample pages 

Popular Content within this publication 



Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Systems and Data Security.