Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Computational methods for counterterrorism

Computational methods for counterterrorism

Shlomo Argamon

Details

OL Work ID
OL15896309W

Subjects

Computer network resourcesTerrorismDatabasesPreventionResearchComputer scienceData miningInformation storage and retrieval systemsText processing (Computer science)Data protectionCriminologyTerrorism, preventionCrime, data processing

Find this book

Open Library
Book data from Open Library. Cover images courtesy of Open Library.