12.07.2015 Views

Editorial Board Contents - Bureau of Police Research and ...

Editorial Board Contents - Bureau of Police Research and ...

Editorial Board Contents - Bureau of Police Research and ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

9North Atlantic Treaty Organization NATO St<strong>and</strong>ardization Agency, NATO glossary <strong>of</strong> terms <strong>and</strong> definitions,AAP 6-2004,10Secrets <strong>of</strong> the spies,11http://www.eyespymag.com/SECRETS%20OF%20THE%20SPIES.pdf (Accessed on 10-09-2012)12Stallings William, Cryptography And Network Security, (New Delhi: Pearson Education, 2006).13Morgan T,” Secure satellite communication <strong>and</strong> beacon tracking device”, Technologies for Homel<strong>and</strong>Security, 2009 HST ‘09. IEEE Conference 11-12 May 2009, pp188-19214Johnson, Neil F., Duric Zoran, Jajodia Sushil, Information Hiding: Steganography <strong>and</strong> Watermarking-Attacks<strong>and</strong> Countermeasures Steganography <strong>and</strong> Watermarking - Attacks <strong>and</strong> Countermeasures (Massachusetts:Springer, 2001).15Z<strong>and</strong>er S, Armitage G, Branch P, “A Survey <strong>of</strong> Covert Channels <strong>and</strong> Countermeasures in Computer NetworkProtocols”, IEEE Communications Surveys <strong>and</strong> Tutorials, 3rd Quarter 2007, Volume: 9, Issue: 3, pp. 44-5716Based on author’s experience <strong>of</strong> using Hushmail.17Siegel Ronald, Intoxication: The Universal Drive for Mind-Altering Substances, (Vermont: Park StreetPress,2005).18Onathan Cummins, Patrick Diskin, Samuel Lau <strong>and</strong> Robert Parlett, Steganography And Digital Watermarking,School <strong>of</strong> Computer Science, The University <strong>of</strong> Birmingham,2004.19US Department <strong>of</strong> Defense, Joint Publication 1-02 Department <strong>of</strong> Defense Dictionary <strong>of</strong> Military <strong>and</strong>Associated Terms, Available at www.dtic.mil/doctrine/new_pubs/jp1_02.pdf (Accessed on 10-09-2012)20Tektronix Data Sheets for RSA3300B Series.21CDMA IS-95A <strong>and</strong> CDMA 2000 1X Interception <strong>and</strong> Logging System by Shogi Communications. http://shoghi.com.br/cdma_is_95a.htm22Moore William K, “MASINT: new eyes in the battlespace”, Military Intelligence Pr<strong>of</strong>essional Bulletin,March, 2003.23Freye Jeffrey t, Design <strong>of</strong> experiment <strong>and</strong> analysis for the joint dynamic allocation <strong>of</strong> fires <strong>and</strong> sensors(JADAFS) simulation,( CALIFORNIA: NAVAL POSTGRADUATE SCHOOL, 2007). 23Freye Jeffrey t, Design<strong>of</strong> experiment <strong>and</strong> analysis for the joint dynamic allocation <strong>of</strong> fires <strong>and</strong> sensors JADAFS) simulation,(CALIFORNIA: NAVAL POSTGRADUATE SCHOOL, 2007).24Sentinel Visual Analyzer, FMS Advanced Systems GroupAvailable at http://www.fmsasg.com/fmsasg/SocialNetworkAnalysis/ (Accessed on 10-092012)25Golliher Sean A, “Search Engine Ranking Variables <strong>and</strong> Algorithms “, semj.org volume 1, supplementalissue, august2008.26Kao Anne <strong>and</strong> Poteet Steve, Natural Language Processing <strong>and</strong> Text Mining, (London: Springer, 2006).27Holsapple, H<strong>and</strong>book <strong>of</strong> Knowledge Management, (New York: Springer, 2003).28“SPOT 6<strong>and</strong>7 products: the right balance between high resolution <strong>and</strong> large-area coverage”, Astrium EADS,Availaible at http://www.astrium-geo.com/en/147-spot-6-7 (Accessed on 10-092012)29Intelligence analysis tools <strong>and</strong> theories at intelligence gateway US Air force University http://www.au.af.mil/au/awc/awcgate/awc-ntel.htm#tools30Green Tim, “Mumbai terrorist attack”, Visual analysis, 10th February 2009, Updated on 24th March 2012,Version 1.2 GSA 2009Available at www.visualanalysis.com (Accessed on 10-092012)31Qia YiJoshi James,Tipper David <strong>and</strong> Krishnamurthy Prashant, Information Assurance: Dependability <strong>and</strong>Security in Networked Systems-Morgan Kaufmann series(Burlington: Elsevier,2008).32Stallings William, Cryptography And Network Security, (New Delhi: Pearson Education, 2006).33Dr. Mark Lowenthal is an author <strong>and</strong> Adjunct Pr<strong>of</strong>essor at the School <strong>of</strong> International <strong>and</strong> Public Affairs,Columbia University. Lowenthal has written five books <strong>and</strong> over 90 articles or studies on intelligence <strong>and</strong>national security.The Indian <strong>Police</strong> Journal, October - December, 2012, Special Issue 103

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!