HOME > 상세정보

상세정보

Web data mining and applications in business intelligence and counter-terrorism

Web data mining and applications in business intelligence and counter-terrorism

자료유형
단행본
개인저자
Thuraisingham, Bhavani M
서명 / 저자사항
Web data mining and applications in business intelligence and counter-terrorism / Bhavani Thuraisingham.
발행사항
Boca Raton, Fla. :   CRC Press,   c2003.  
형태사항
xxiv, 516 p. : ill. ; 24 cm.
ISBN
0849314607 (alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Data mining. Web databases. Business intelligence -- Databases. Terrorism -- Prevention -- Databases.
000 00985camuu2200289 a 4500
001 000000872572
005 20040305162748
008 030227s2003 flua b 001 0 eng
010 ▼a 2003043967
020 ▼a 0849314607 (alk. paper)
035 ▼a KRIC09037940
040 ▼a DLC ▼c DLC ▼d 211046 ▼d 211046 ▼d 211009
042 ▼a pcc
049 1 ▼l 111276826
050 0 0 ▼a QA76.9.D343 ▼b T48 2003
082 0 4 ▼a 006.3 ▼2 21
090 ▼a 006.3 ▼b T536w
100 1 ▼a Thuraisingham, Bhavani M
245 1 0 ▼a Web data mining and applications in business intelligence and counter-terrorism / ▼c Bhavani Thuraisingham.
260 ▼a Boca Raton, Fla. : ▼b CRC Press, ▼c c2003.
300 ▼a xxiv, 516 p. : ▼b ill. ; ▼c 24 cm.
504 ▼a Includes bibliographical references and index.
650 0 ▼a Data mining.
650 0 ▼a Web databases.
650 0 ▼a Business intelligence ▼x Databases.
650 0 ▼a Terrorism ▼x Prevention ▼x Databases.

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 중앙도서관/서고6층/ 청구기호 006.3 T536w 등록번호 111276826 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

The explosion of Web-based data has created a demand among executives and technologists for methods to identify, gather, analyze, and utilize data that may be of value to corporations and organizations. The emergence of data mining, and the larger field of Web mining, has businesses lost within a confusing maze of mechanisms and strategies for obtaining and managing crucial intelligence.

Web Data Mining and Applications in Business Intelligence and Counter-Terrorism responds by presenting a clear and comprehensive overview of Web mining, with emphasis on CRM and, for the first time, security and counter-terrorism applications. The tools and methods of Web mining are revealed in an easy-to-understand style, emphasizing the importance of practical, hands-on experience in the creation of successful e-business solutions.

The author, a program director for Data and Applications Security at the National Science Foundations, details how both opportunities and dangers on the Web can be identified and managed. Armed with the knowledge contained in this book, businesses can collect and analyze Web-based data to help develop customer relationships, increase sales, and identify existing and potential threats. Organizations can apply these same Web mining techniques to battle the real and present danger of terrorism, demonstrating Web mining's critical role in the intelligence arsenal.

The explosion of Web-based data has created a demand among executives and technologists for tools and strategies to gather, analyze and utilize online information. This book describes key concepts in Web mining and discusses resulting applications in business intelligence and counter-terrorism. Armed with the knowledge contained in this book, businesses can collect and analyze critical data in order to find and develop relationships with new customers, increase sales, and identify potential threats. Government organizations can apply these same Web mining techniques to battle the real and present danger of terrorism.


정보제공 : Aladin

목차

Introduction TrendsSupporting Technologies for Web Data MiningWeb Data Mining ConceptsWeb Data Mining and Counter-TerrorismOrganization of This BookHow Do We Proceed?PART 1 SUPPORTING TECHNOLOGIES FOR WEB DATA MININGWORLD WIDE WEB AND E-COMMERCEEvolution of the WebIntroduction to E-CommerceRelationship to Web Data MiningSummaryDATA MINING Data Mining TechnologiesConcepts and Techniques in Data Mining Directions and Trends in Data Mining Relationship to Web MiningSummaryCORE DATA MINING TECHNOLOGIESData Management and Data Warehousing Statistical Reasoning Machine Learning Visualization Parallel Processing Decision Support Architectural Support for Data Mining Relationship to Web Data Mining Summary WEB DATABASE MANAGEMENTWeb Databases Semi-Structured Databases Metadata, Ontologies, and the Web Distributed, Heterogeneous and Legacy Databases on the Web Data Warehousing on the Web Architectural Aspects Relationship to Web Data Mining Summary INFORMATION RETRIEVAL SYSTEMSText Retrieval Image Retrieval Video Retrieval Audio Retrieval Multimedia Data and Information Management Question Answering Systems Markup Languages Relationship to Web Data Mining Summary INFORMATION MANAGEMENT TECHNOLOGIESCollaboration and Data Management Knowledge Management Agents for the Web Training and Distance Learning Wireless Information Management and Pervasive Computing Sensor Information Management Quality-Of-Service Aspects Some Directions Relationship to Web Data Mining Summary THE SEMANTIC WEBSemantic Web Concepts RDF Role of Ontologies Agents and the DAML Program Semantic Web as a Database XML, RDF, and Interoperability Web Services Note on E-Commerce and Semantic Web Web versus the Semantic Web Data Mining and the Semantic Web Summary PART 2 WEB DATA MINING TECHNIQUES, TOOLS, AND TRENDSDATA MINING AND THE WEBMining Data on the WebMining Usage PatternsWeb Structure MiningApplications and DirectionsSummaryPROCESSES AND TECHNIQUES FOR WEB DATA MININGProcess of Web Data Mining Web Data Mining Outcomes, Approaches, and Techniques Web Data Mining versus Data MiningSummaryMINING THE DATABASES ON THE WEBConcepts in Web Database Mining Mining Semi-Structured Databases Metadata and Web Mining Mining Distributed, Heterogeneous, Legacy, and Federated Databases on the Web Architectures and Web Data Mining Summary INFORMATION RETRIEVAL AND WEB DATA MININGSearch Engines and Web Data Mining Multimedia Data Mining and the Web Some Other Aspects Summary INFORMATION MANAGEMENT AND WEB DATA MININGCollaborative Data MiningKnowledge Management and Web Data MiningTraining and Web Data MiningAgents and Web Data MiningWireless Computing and Web Data MiningSensor Web MiningQuality of Service and Web Data MiningOther AspectsSummarySEMANTIC WEB MININGConcepts In Semantic Web MiningXML, RDF, and Web Data MiningOntologies and Web Data MiningAgents and Web Data MiningWeb Mining and the Semantic Web as a DatabaseSemantic Interoperability and Web MiningWeb Services and Web MiningWeb Mining versus Semantic Web MiningA Note on E-Commerce and Semantic Web MiningSummaryMINING USAGE PATTERNS AND STRUCTURE ON THE WEBWeb Usage Mining Outcomes and TechniquesWeb Usage Mining AnalysisCRM and Business Intelligence ApplicationsMining Structure on the WebSummaryPROTOTYPES, PRODUCTS, AND STANDARDS FOR WEB DATA MININGPrototypes and Products for Data MiningWeb Data Mining ProductsStandards for Web MiningSummarySOME APPLICATIONS FOR WEB MININGE-Commerce And E-BusinessBusiness IntelligenceCustomer Relationship ManagementMarketing and SalesEnterprise Resource ManagementManufacturing and PlanningEducation and TrainingTelecommunicationsFinancialPhysical Sciences, Social Sciences, and EngineeringMedicine and BiotechnologyCounter-TerrorismSummaryPART 3 WEB DATA MINING APPLICATIONS FOR COUNTER-TERRORISMSOME INFORMATION ON TERRORISM, SECURITY THREATS, AND PROTECTION MEASURESNatural Disasters and Human ErrorsNon-Information Related TerrorismInformation Related TerrorismBio-Terrorism, Chemical, and Nuclear AttacksAttacks on Critical InfrastructuresNon Real-Time Threats versus Real-Time ThreatsAspects of Counter-TerrorismA Note on PrivacySummaryWEB DATA MINING FOR COUNTER-TERRORISMWeb Data Mining for Counter-TerrorismAnalyzing the TechniquesLink AnalysisSummaryMINING THE WEB DATABASES FOR COUNTER-TERRORISMWeb Database MiningSemi-Structured Database MiningMetadata MiningWarehouse MiningDistributed and Heterogeneous Database MiningOther AspectsSummaryINFORMATION RETRIEVAL AND WEB MINING FOR COUNTER-TERRORISMExploiting and Using Intelligent Search EnginesApplying Multimedia Data MiningOther AspectsSummaryINFORMATION MANAGEMENT AND WEB MINING FOR COUNTER-TERRORISMCollaborative Data MiningKnowledge Management and Web MiningTraining and Web MiningAgents and Web MiningWireless Information Management and Web MiningSensor Information Management and Web MiningQuality of Service and Web MiningSome Other AspectsSummarySEMANTIC WEB MINING FOR COUNTER-TERRORISMSemantic Web Mining for Counter-TerrorismBuilding the Semantic Web and Web Mining for Counter-TerrorismSummaryWEB USAGE AND STRUCTURE MINING FOR COUNTER-TERRORISMWeb Usage Mining for Counter-TerrorismWeb Structure Mining for Counter-TerrorismSummaryNATIONAL SECURITY, PRIVACY, CIVIL LIBERTIES, AND WEB MININGBackground on the Inference ProblemMining, Warehousing, and InferenceInductive Logic Programming and InferencePrivacy IssuesInference Problem and PrivacyPrivacy Enhanced Data MiningCivil Liberties versus National SecuritySummaryREVISITING SECURITY THREATS WITH RESPECT TO WEB MININGNatural Disasters, Human Errors, and Malicious AttacksNon-Information Related TerrorismInformation Related TerrorismBio-Terrorism, Chemical, and Nuclear AttacksAttacks on Critical InfrastructuresNon-Realtime Threats versus Real-Time ThreatsRevisiting PrivacySummaryE-COMMERCE, BUSINESS INTELLIGENCE, AND COUNTER-TERRORISMModels for Counter-TerrorismArchitectures for Counter-TerrorismFunctions for Counter-TerrorismRevisiting Business IntelligenceSummarySUMMARY AND DIRECTIONSSummary of This BookChallenges and Directions for Web Data MiningChallenges and Directions for Web Data Mining for Counter-TerrorismImpact of the Department of Homeland SecurityWhere Do We Go from Here? PART 4 APPENDICESDATA MANAGEMENT SYSTEMS: DEVELOPMENTS AND TRENDSDevelopments in Database SystemsStatus, Vision, and IssuesData Management Systems FrameworkBuilding Information Systems from the FrameworkRelationship between the TextsSummaryDATABASE SYSTEMS AND RELATED TECHNOLOGIESRelational and Entity-Relationship Data ModelsArchitectural IssuesDatabase DesignDatabase AdministrationDatabase Management System FunctionsDistributed DatabasesHeterogeneous Database IntegrationFederated DatabasesClient-Server DatabasesMigrating Legacy Databases and ApplicationsData WarehousingObject TechnologySummaryDATA AND INFORMATION SECURITYAccess Control and Other Security ConceptsSecure SystemsSecure Database SystemsEmerging TrendsImpact of the WebSummaryREFERENCES


정보제공 : Aladin

관련분야 신착자료

Dyer-Witheford, Nick (2026)
양성봉 (2025)