1.

Record Nr.

UNISA996392011003316

Autore

Staunford William, Sir, <1509-1558.>

Titolo

Les plees del coron [[electronic resource] ] : diuisees in plusors titles & co[m]mon lieux. Per queux home pluis redement & plenairement trouera quelque chose que il quira, touchant les dits plees, composees per le tresreuerend iudge Monsieur Guilliaulme Staundforde Chiualer, dernierment corrigee auecques vn table parfaicte des choses notables contenus en ycelle, nouelment reueu & corrigee. Anno Domini 1583

Pubbl/distr/stampa

[London], : In ædibus Richardi Tottellj. Cum priuilegio, [1583]

Descrizione fisica

[12], 196 [i.e. 198] leaves

Altri autori (Persone)

RastellWilliam <1508?-1565.>

Soggetti

Pleas of the crown

Lingua di pubblicazione

Romance (Other)

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

At end of index: Cest table ne fuit collect ne fait per Mounsieur Stanforde, mes per vn auter [i.e. William Rastall].

Leaf 198 misnumberd 196.

Reproduction of the original in the Henry E. Huntington Library and Art Gallery.

Sommario/riassunto

eebo-0113



2.

Record Nr.

UNINA9910437601803321

Titolo

Computational analysis of terrorist groups : Lashkar-e-Taiba / / V.S. Subrahmanian ...[et al.] ; foreword by R. James Woolsey

Pubbl/distr/stampa

New York, : Springer, c2013

ISBN

1-283-62446-X

9786613936912

1-4614-4769-0

Edizione

[1st ed. 2013.]

Descrizione fisica

1 online resource (232 p.)

Altri autori (Persone)

SubrahmanianV. S

Disciplina

006.3/12

519.5

Soggetti

Computational intelligence

Data mining

Terrorism - Pakistan

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Introduction -- A Brief History of LeT -- Temporal Probabilistic Behavior Rules -- Targeting Civilians -- Attacks Against Public Sites, Tourist Sites, and Transportation Facilities -- Attacks Against Professional Security Forces -- Attacks Against Security Installations and Infrastructure -- Other Types of Attacks -- Armed Clashes -- Computing Policy Options -- Policy Options Against LeT.

Sommario/riassunto

Computational Analysis of Terrorist Groups: Lashkar-e-Taiba provides an in-depth look at Web intelligence, and how advanced mathematics and modern computing technology can influence the insights we have on terrorist groups. This book primarily focuses  on one famous terrorist group known as Lashkar-e-Taiba (or LeT), and  how it operates. After 10 years of counter Al Qaeda operations,  LeT is considered by many in the counter-terrorism community to be an even greater threat to the US and world peace than Al Qaeda. Computational Analysis of  Terrorist Groups: Lashkar-e-Taiba is the first book that demonstrates how to use modern computational analysis techniques including methods for “big data” analysis.  This book presents how to quantify both the environment in which LeT operate, and  the actions it



took over a 20-year period, and represent it as a relational database table. This table is then mined using sophisticated data mining algorithms in order to gain detailed, mathematical, computational and statistical insights into LeT and its operations. This book also provides a detailed  history of  Lashkar-e-Taiba based on extensive analysis conducted by  using open source information and public statements. Each chapter includes a case study, as well as  a slide describing the key results which are available on the authors’ web sites. Computational Analysis of  Terrorist Groups: Lashkar-e-Taiba is designed for a professional market composed of  government or military workers, researchers  and computer scientists working in the web intelligence field. Advanced-level students in computer science will also find this valuable as a reference book.