Buy Web Data Mining and Applications in Business Intelligence and Counter-Terrorism
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Databases > Web Data Mining and Applications in Business Intelligence and Counter-Terrorism
Web Data Mining and Applications in Business Intelligence and Counter-Terrorism

Web Data Mining and Applications in Business Intelligence and Counter-Terrorism


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

The explosion of Web-based data has created a demand among executives and technologists for methods to identify, gather, analyze, and utilize data that may be of value to corporations and organizations. The emergence of data mining, and the larger field of Web mining, has businesses lost within a confusing maze of mechanisms and strategies for obtaining and managing crucial intelligence.

Web Data Mining and Applications in Business Intelligence and Counter-Terrorism responds by presenting a clear and comprehensive overview of Web mining, with emphasis on CRM and, for the first time, security and counter-terrorism applications. The tools and methods of Web mining are revealed in an easy-to-understand style, emphasizing the importance of practical, hands-on experience in the creation of successful e-business solutions.

The author, a program director for Data and Applications Security at the National Science Foundations, details how both opportunities and dangers on the Web can be identified and managed. Armed with the knowledge contained in this book, businesses can collect and analyze Web-based data to help develop customer relationships, increase sales, and identify existing and potential threats. Organizations can apply these same Web mining techniques to battle the real and present danger of terrorism, demonstrating Web mining's critical role in the intelligence arsenal.

Table of Contents:
Introduction
Trends
Supporting Technologies for Web Data Mining
Web Data Mining Concepts
Web Data Mining and Counter-Terrorism
Organization of This Book
How Do We Proceed?

PART 1 SUPPORTING TECHNOLOGIES FOR WEB DATA MINING
WORLD WIDE WEB AND E-COMMERCE
Evolution of the Web
Introduction to E-Commerce
Relationship to Web Data Mining
Summary
DATA MINING
Data Mining Technologies
Concepts and Techniques in Data Mining
Directions and Trends in Data Mining
Relationship to Web Mining
Summary
CORE DATA MINING TECHNOLOGIES
Data Management and Data Warehousing
Statistical Reasoning
Machine Learning
Visualization
Parallel Processing
Decision Support
Architectural Support for Data Mining
Relationship to Web Data Mining
Summary
WEB DATABASE MANAGEMENT
Web Databases
Semi-Structured Databases
Metadata, Ontologies, and the Web
Distributed, Heterogeneous and Legacy Databases on the Web
Data Warehousing on the Web
Architectural Aspects
Relationship to Web Data Mining
Summary
INFORMATION RETRIEVAL SYSTEMS
Text Retrieval
Image Retrieval
Video Retrieval
Audio Retrieval
Multimedia Data and Information Management
Question Answering Systems
Markup Languages
Relationship to Web Data Mining
Summary

INFORMATION MANAGEMENT TECHNOLOGIES
Collaboration and Data Management
Knowledge Management
Agents for the Web
Training and Distance Learning
Wireless Information Management and Pervasive Computing
Sensor Information Management
Quality-Of-Service Aspects
Some Directions
Relationship to Web Data Mining
Summary
THE SEMANTIC WEB
Semantic Web Concepts
RDF
Role of Ontologies
Agents and the DAML Program
Semantic Web as a Database
XML, RDF, and Interoperability
Web Services
Note on E-Commerce and Semantic Web
Web versus the Semantic Web
Data Mining and the Semantic Web
Summary

PART 2 WEB DATA MINING TECHNIQUES, TOOLS, AND TRENDS
DATA MINING AND THE WEB
Mining Data on the Web
Mining Usage Patterns
Web Structure Mining
Applications and Directions
Summary

PROCESSES AND TECHNIQUES FOR WEB DATA MINING
Process of Web Data Mining
Web Data Mining Outcomes, Approaches, and Techniques
Web Data Mining versus Data Mining
Summary
MINING THE DATABASES ON THE WEB
Concepts in Web Database Mining
Mining Semi-Structured Databases
Metadata and Web Mining
Mining Distributed, Heterogeneous, Legacy, and Federated Databases on the Web
Architectures and Web Data Mining
Summary

INFORMATION RETRIEVAL AND WEB DATA MINING
Search Engines and Web Data Mining
Multimedia Data Mining and the Web
Some Other Aspects
Summary

INFORMATION MANAGEMENT AND WEB DATA MINING
Collaborative Data Mining
Knowledge Management and Web Data Mining
Training and Web Data Mining
Agents and Web Data Mining
Wireless Computing and Web Data Mining
Sensor Web Mining
Quality of Service and Web Data Mining
Other Aspects
Summary
SEMANTIC WEB MINING
Concepts In Semantic Web Mining
XML, RDF, and Web Data Mining
Ontologies and Web Data Mining
Agents and Web Data Mining
Web Mining and the Semantic Web as a Database
Semantic Interoperability and Web Mining
Web Services and Web Mining
Web Mining versus Semantic Web Mining
A Note on E-Commerce and Semantic Web Mining
Summary

MINING USAGE PATTERNS AND STRUCTURE ON THE WEB
Web Usage Mining Outcomes and Techniques
Web Usage Mining Analysis
CRM and Business Intelligence Applications
Mining Structure on the Web
Summary

PROTOTYPES, PRODUCTS, AND STANDARDS FOR WEB DATA MINING
Prototypes and Products for Data Mining
Web Data Mining Products
Standards for Web Mining
Summary
SOME APPLICATIONS FOR WEB MINING
E-Commerce And E-Business
Business Intelligence
Customer Relationship Management
Marketing and Sales
Enterprise Resource Management
Manufacturing and Planning
Education and Training
Telecommunications
Financial
Physical Sciences, Social Sciences, and Engineering
Medicine and Biotechnology
Counter-Terrorism
Summary

PART 3 WEB DATA MINING APPLICATIONS FOR COUNTER-TERRORISM

SOME INFORMATION ON TERRORISM, SECURITY THREATS, AND PROTECTION MEASURES
Natural Disasters and Human Errors
Non-Information Related Terrorism
Information Related Terrorism
Bio-Terrorism, Chemical, and Nuclear Attacks
Attacks on Critical Infrastructures
Non Real-Time Threats versus Real-Time Threats
Aspects of Counter-Terrorism
A Note on Privacy
Summary

WEB DATA MINING FOR COUNTER-TERRORISM
Web Data Mining for Counter-Terrorism
Analyzing the Techniques
Link Analysis
Summary

MINING THE WEB DATABASES FOR COUNTER-TERRORISM
Web Database Mining
Semi-Structured Database Mining
Metadata Mining
Warehouse Mining
Distributed and Heterogeneous Database Mining
Other Aspects
Summary

INFORMATION RETRIEVAL AND WEB MINING FOR COUNTER-TERRORISM
Exploiting and Using Intelligent Search Engines
Applying Multimedia Data Mining
Other Aspects
Summary

INFORMATION MANAGEMENT AND WEB MINING FOR COUNTER-TERRORISM
Collaborative Data Mining
Knowledge Management and Web Mining
Training and Web Mining
Agents and Web Mining
Wireless Information Management and Web Mining
Sensor Information Management and Web Mining
Quality of Service and Web Mining
Some Other Aspects
Summary

SEMANTIC WEB MINING FOR COUNTER-TERRORISM
Semantic Web Mining for Counter-Terrorism
Building the Semantic Web and Web Mining for Counter-Terrorism
Summary

WEB USAGE AND STRUCTURE MINING FOR COUNTER-TERRORISM
Web Usage Mining for Counter-Terrorism
Web Structure Mining for Counter-Terrorism
Summary

NATIONAL SECURITY, PRIVACY, CIVIL LIBERTIES, AND WEB MINING
Background on the Inference Problem
Mining, Warehousing, and Inference
Inductive Logic Programming and Inference
Privacy Issues
Inference Problem and Privacy
Privacy Enhanced Data Mining
Civil Liberties versus National Security
Summary

REVISITING SECURITY THREATS WITH RESPECT TO WEB MINING
Natural Disasters, Human Errors, and Malicious Attacks
Non-Information Related Terrorism
Information Related Terrorism
Bio-Terrorism, Chemical, and Nuclear Attacks
Attacks on Critical Infrastructures
Non-Realtime Threats versus Real-Time Threats
Revisiting Privacy
Summary

E-COMMERCE, BUSINESS INTELLIGENCE, AND COUNTER-TERRORISM
Models for Counter-Terrorism
Architectures for Counter-Terrorism
Functions for Counter-Terrorism
Revisiting Business Intelligence
Summary
SUMMARY AND DIRECTIONS
Summary of This Book
Challenges and Directions for Web Data Mining
Challenges and Directions for Web Data Mining for Counter-Terrorism
Impact of the Department of Homeland Security
Where Do We Go from Here?

PART 4 APPENDICES

DATA MANAGEMENT SYSTEMS: DEVELOPMENTS AND TRENDS
Developments in Database Systems
Status, Vision, and Issues
Data Management Systems Framework
Building Information Systems from the Framework
Relationship between the Texts
Summary

DATABASE SYSTEMS AND RELATED TECHNOLOGIES
Relational and Entity-Relationship Data Models
Architectural Issues
Database Design
Database Administration
Database Management System Functions
Distributed Databases
Heterogeneous Database Integration
Federated Databases
Client-Server Databases
Migrating Legacy Databases and Applications
Data Warehousing
Object Technology
Summary

DATA AND INFORMATION SECURITY
Access Control and Other Security Concepts
Secure Systems
Secure Database Systems
Emerging Trends
Impact of the Web
Summary

REFERENCES


Best Sellers


Product Details
  • ISBN-13: 9781135508753
  • Publisher: Taylor & Francis Ltd
  • Publisher Imprint: Routledge
  • Language: English
  • No of Pages: 544
  • ISBN-10: 1135508755
  • Publisher Date: 26 Jun 2003
  • Binding: Digital (delivered electronically)
  • No of Pages: 544


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Web Data Mining and Applications in Business Intelligence and Counter-Terrorism
Taylor & Francis Ltd -
Web Data Mining and Applications in Business Intelligence and Counter-Terrorism
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Web Data Mining and Applications in Business Intelligence and Counter-Terrorism

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!