000 01423nam a22004095i 4500
001 978-3-642-01141-2
003 DE-He213
005 20130515021856.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 _a9783642011412
_9978-3-642-01141-2
024 7 _a10.1007/978-3-642-01141-2
_2doi
100 1 _aArgamon, Shlomo.
245 1 0 _aComputational Methods for Counterterrorism
_h[electronic resource] /
_cedited by Shlomo Argamon, Newton Howard.
260 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2009.
300 _bdigital.
650 0 _aComputer science.
650 0 _aData protection.
650 0 _aData mining.
650 0 _aInformation storage and retrieval systems.
650 0 _aText processing (Computer science.
650 0 _aCriminology.
650 1 4 _aComputer Science.
650 2 4 _aData Mining and Knowledge Discovery.
650 2 4 _aSystems and Data Security.
650 2 4 _aCriminology & Criminal Justice.
650 2 4 _aDocument Preparation and Text Processing.
650 2 4 _aInformation Storage and Retrieval.
650 2 4 _aComputers and Society.
700 1 _aHoward, Newton.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642011405
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-01141-2
912 _aZDB-2-SCS
999 _c81637
_d81637