Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Terrorismo 334
- Terrorism 301
- Historia 218
- Prevention 129
- History 107
- Política y gobierno 78
- Cuentos de terror 61
- Politics and government 56
- Història 52
- Terrorisme 51
- Cine de terror 46
- National security 46
- Islam 43
- Política 42
- Security measures 42
- Psychological aspects 41
- Political aspects 39
- Social aspects 36
- Violence 36
- Violencia política 36
- Government policy 35
- Political Science 35
- Derecho internacional 34
- War on Terrorism, 2001-2009 34
- Historia y crítica 33
- Guerra 32
- Foreign relations 31
- Aspectos religiosos 30
- Derechos humanos 30
- International relations 30
-
3461Publicado 2016“…Annotation The topic of religion, violence and terrorism has drawn increasing attention from academic and terrorism experts, policymakers, government agencies, and the media globally. …”
Libro electrónico -
3462
-
3463por Rapoport, David C.
Publicado 1985Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto, Universidad Loyola - Universidad Loyola Granada)Libro -
3464
-
3465
-
3466
-
3467
-
3468Publicado 2007“…Covers broad human security issues such as track two diplomacy, ethnic conflict, terrorism, religious extremism, human rights, demographic change, population health, human ecology, sustainable economics and related areas…”
Seriada digital -
3469Publicado 2023“…An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives…”
Grabación no musical -
3470Publicado 2022“…An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives…”
Libro electrónico -
3471Publicado 2013“…Over the last decade the increasing phenomenon of suicide terrorism has raised questions about how it might be rational for individuals to engage in such acts. …”
Libro electrónico -
3472Publicado 2021“…It spans various fields including cyber terrorism, cyber warfare, electronic civil disobedience, governance and security, hacking and hacktivism, information management and security, internet and controls, law enforcement, national security, privacy, protection of society and the rights of the individual, social engineering, terrorism, and more. …”
Libro electrónico -
3473Publicado 2008“…This volume assesses the impact of U.S. presidential decisionmaking style and administrative structure on nation-building, from the post-World War II era through the Cold War, post-Cold War era, and current war on terrorism…”
Libro electrónico -
3474Publicado 2002“…It includes publications covering such topics as environment, taxation, security systems, terrorism, poverty and health…”
Seriada digital -
3475Publicado 2001“…It includes publications covering such topics as environment, taxation, security systems, terrorism, poverty and health…”
Seriada digital -
3476
-
3477
-
3478por Tripathi, PadmeshTabla de Contenidos: “…3.5 Limitations -- 3.6 Future Improvements -- References -- Further Reading -- Chapter 4 AI-Based Surveillance Systems for Effective Attendance Management: Challenges and Opportunities -- 4.1 Introduction -- 4.2 Artificial Intelligence (AI) and Smart Surveillance -- 4.3 Artificial Intelligence (AI) and Attendance Management -- 4.4 Technologies in Automatic Attendance Management Image Processing -- 4.5 Deep Learning and Various Neural Network Techniques for Attendance Management -- 4.5.1 Applications of Convolutional Neural Networks (CNN) for Attendance Management -- 4.5.1.1 Mathematical Model of CNN -- 4.5.2 Applications of Recursive Neural Network (RNN) for Attendance Management -- 4.5.2.1 Mathematical Model of RNN -- 4.5.3 Applications of Generative Adversarial Network (GAN) for Attendance Management -- 4.5.3.1 Mathematical Model of Generalized Neural Network -- 4.6 Role of AI Technologies in Attendance Management -- 4.7 Challenges -- 4.8 Opportunities -- 4.9 Discussion & -- Conclusion -- References -- Chapter 5 Enhancing Surveillance Systems through Mathematical Models and Artificial Intelligence: An Image Processing Approach -- 5.1 Introduction -- 5.1.1 Surveillance -- 5.1.1.1 Crime Prevention and Detection -- 5.1.1.2 Public Safety -- 5.1.1.3 Terrorism Prevention -- 5.1.1.4 Traffic Management -- 5.1.1.5 Workplace Monitoring -- 5.1.1.6 Evidence Collection -- 5.1.1.7 Emergency Response -- 5.1.1.8 National Security -- 5.1.1.9 Public Health Monitoring -- 5.1.1.10 Accountability and Transparency -- 5.1.2 Image Processing -- 5.1.2.1 Image Enhancement -- 5.1.2.2 Image Restoration -- 5.1.2.3 Image Compression -- 5.1.2.4 Image Segmentation -- 5.1.2.5 Object Detection and Recognition -- 5.1.2.6 Image Analysis and Measurement -- 5.1.2.7 Image Registration -- 5.1.2.8 Image Classification and Machine Learning -- 5.1.2.9 Image Synthesis and Manipulation…”
Publicado 2024
Libro electrónico -
3479Publicado 2000Tabla de Contenidos: “…-- 1.4.3 Intermediary Conclusion -- 1.5 Determining Law-Methodological Considerations -- 1.5.1 A Triple Dilemma -- 1.5.2 Structuring Conflicts -- 1.5.3 The Legal-technical Level -- 1.5.4 The Qualitative Level -- 1.5.5 The Metalega/ Leve/ -- 1.6 The Structure of Inquiry -- 2 UNIVERSALISM VERSUS PARTICULARISM -- 2.1 Choosing between Torture and Terrorism: Mr. Chahal vs. the U.K. Population -- 2.2 Universalism -- 2.3 Particularism -- 2.4 Human Rights versus Sovereignty -- 2.5 Artefact versus Organism -- 2.6 Meandering Arguments -- 3 DETERMINANTS OF PROTECTION SYSTEMS…”
Libro electrónico -
3480