The book is organized in four major areas. The first unit focuses on the terrorism informatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The fourth unit presents surveillance and emergency response.
Readers will find the book valuable and useful in their study or work, especially the ISI community. The researchers and practitioners in this community will continue to grow and share research findings to contribute to national safety around the world.