000 -LEADER |
fixed length control field |
02260cam a22003254a 4500 |
001 - CONTROL NUMBER |
control field |
16961668 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
APU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20150813100650.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
110914s2012 enka b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2011038733 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781107096424 (hbk.) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Transcribing agency |
APU |
Modifying agency |
BAHAR |
-- |
SM |
Language of cataloging |
eng |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.M35 |
Item number |
T36 2012 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
Item number |
TAM 2012 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Tambe, Milind. |
Dates associated with a name |
1965- |
9 (RLIN) |
11339 |
245 10 - TITLE STATEMENT |
Title |
Security and game theory : |
Remainder of title |
algorithms, deployed systems, lessons learned / |
Statement of responsibility, etc |
Milind Tambe. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Cambridge ; |
-- |
New York : |
Name of publisher, distributor, etc |
Cambridge University Press, |
Date of publication, distribution, etc |
c2012. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xiv, 319 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references (p. 297-310) and index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"-- |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
9 (RLIN) |
76 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Game theory. |
9 (RLIN) |
11340 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Security, Internatonal |
General subdivision |
Mathematical models. |
9 (RLIN) |
11341 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
COMPUTERS / Security / General. |
Source of heading or term |
bisacsh |
9 (RLIN) |
81 |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Cover image |
Uniform Resource Identifier |
http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Book |