Sold Out
Book Categories |
Ch. I | Hazards analysis : a complexity perspective | 1 |
Ch. II | Small & simple : application-specific multi-agent systems | 17 |
Ch. III | How hard is it to red team? | 46 |
Ch. IV | Network robustness for critical infrastructure networks | 79 |
Ch. V | Distributed intrusion detection systems : a computational intelligence approach | 107 |
Ch. VI | The game of defense and security | 138 |
Ch. VII | Realized applications of positioning technologies in defense intelligence | 167 |
Ch. VIII | The advancement of positioning technologies in defense intelligence | 196 |
Ch. IX | Simulating complexity-based ethics for crucial decision making in counter terrorism | 221 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionApplications of Information Systems to Homeland Security and Defense
X
This Item is in Your InventoryApplications of Information Systems to Homeland Security and Defense
X
You must be logged in to review the productsX
X
X
Add Applications of Information Systems to Homeland Security and Defense, , Applications of Information Systems to Homeland Security and Defense to the inventory that you are selling on WonderClubX
X
Add Applications of Information Systems to Homeland Security and Defense, , Applications of Information Systems to Homeland Security and Defense to your collection on WonderClub |