0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (7)
  • R500+ (299)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General

Biometric Technology - Authentication, Biocryptography, and Cloud-Based Architecture (Hardcover): Ravi Das Biometric Technology - Authentication, Biocryptography, and Cloud-Based Architecture (Hardcover)
Ravi Das
R4,577 Discovery Miles 45 770 Ships in 12 - 19 working days

Most biometric books are either extraordinarily technical for technophiles or extremely elementary for the lay person. Striking a balance between the two, Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture is ideal for business, IT, or security managers that are faced with the task of making purchasing, migration, or adoption decisions. It brings biometrics down to an understandable level, so that you can immediately begin to implement the concepts discussed. Exploring the technological and social implications of widespread biometric use, the book considers the science and technology behind biometrics as well as how it can be made more affordable for small and medium-sized business. It also presents the results of recent research on how the principles of cryptography can make biometrics more secure. Covering biometric technologies in the cloud, including security and privacy concerns, the book includes a chapter that serves as a "how-to manual" on procuring and deploying any type of biometric system. It also includes specific examples and case studies of actual biometric deployments of localized and national implementations in the U.S. and other countries. The book provides readers with a technical background on the various biometric technologies and how they work. Examining optimal application in various settings and their respective strengths and weaknesses, it considers ease of use, false positives and negatives, and privacy and security issues. It also covers emerging applications such as biocryptography. Although the text can be understood by just about anybody, it is an ideal resource for corporate-level executives who are considering implementing biometric technologies in their organizations.

International Relations Theory and the Consequences of Unipolarity (Hardcover): G.John Ikenberry, Michael Mastanduno, William... International Relations Theory and the Consequences of Unipolarity (Hardcover)
G.John Ikenberry, Michael Mastanduno, William C. Wohlforth
R2,718 Discovery Miles 27 180 Ships in 12 - 19 working days

The end of the Cold War and subsequent dissolution of the Soviet Union resulted in a new unipolar international system that presented fresh challenges to international relations theory. Since the Enlightenment, scholars have speculated that patterns of cooperation and conflict might be systematically related to the manner in which power is distributed among states. Most of what we know about this relationship, however, is based on European experiences between the seventeenth and twentieth centuries, when five or more powerful states dominated international relations, and the latter twentieth century, when two superpowers did so. Building on a highly successful special issue of the leading journal World Politics, this book seeks to determine whether what we think we know about power and patterns of state behaviour applies to the current 'unipolar' setting and, if not, how core theoretical propositions about interstate interactions need to be revised.

Weak Links - Fragile States, Global Threats, and International Security (Paperback): Stewart Patrick Weak Links - Fragile States, Global Threats, and International Security (Paperback)
Stewart Patrick
R1,431 Discovery Miles 14 310 Ships in 10 - 15 working days

Conventional wisdom holds that weak and failing states are the source of the world's most pressing security threats. After all, the 9/11 attacks originated in an impoverished, war-ravaged country, and transnational crime appears to flourish in weakly governed states. However, our assumptions about the threats posed by failing states are based on anecdotal arguments, not on a systematic analysis of the connections between state failure and transnational security threats. Analyzing terrorism, transnational crime, WMDs, pandemic diseases, and energy insecurity, Stewart Patrick shows that while some global threats do emerge in fragile states, most of their weaknesses create misery only for their own citizenry. Moreover, many threats originate farther up the chain, in wealthier and more stable countries like Russia and Venezuela. Weak Links will force policymakers to rethink what they assume about state failure and transnational insecurity.

Bioterrorism - Field Guide to Disease Identification and Initial Patient Management (Paperback, New): Dag K.J.E. von Lubitz Bioterrorism - Field Guide to Disease Identification and Initial Patient Management (Paperback, New)
Dag K.J.E. von Lubitz
R3,023 Discovery Miles 30 230 Ships in 12 - 19 working days

The outbreak of anthrax infections that followed September 11, 2001, showed all too clearly that while we can defend ourselves against bioterrorism, our defenses need improvement. What's most important is the ability to recognize the associated disease, and recognize them quickly. Yet, many in the medical world are unfamiliar with the characteristic signs and symptoms of bioterrorism agents and are unable to differentiate between diseases whose symptoms appear almost identical. While a plethora of information on such diseases is available, finding it is time consuming.

Bioterrorism: Field Guide to Disease Identification and Initial Patient Management is an accessible resource that helps first-responders to quickly recognize the signs and symptoms caused by exposure to bioterrorism agents. It provides enough information to initiate treatment while a definitive diagnosis is being determined and presents measures for preventing contamination of those involved in the victims' medical management.

A special quick-reference foldout chart features a matrix linking 180 symptoms to 17 diseases and 90 differential diagnosis. In bulleted format, the book includes for each pathogenic agent:

" A brief description
" Signs and symptoms
" Diagnostic features
" Lab tests and expected results
" Treatment (specific drug regimens)
" Prophylaxis (specific drug regimens)
" Precautionary measures

This book is a potentially life-saving resource that can be thrown into a medical bag and kept there, hopefully forever unused. But if needed, it is a resource that can quickly provide information that will prevent secondary infections, improve site safety, and buy life-saving time for victims.

Radiation Injury Prevention and Mitigation in Humans (Hardcover): Kedar Prasad Radiation Injury Prevention and Mitigation in Humans (Hardcover)
Kedar Prasad
R4,566 Discovery Miles 45 660 Ships in 12 - 19 working days

With an estimated 3.3 billion ionizing radiation imaging examinations performed worldwide each year, the growing use of x-ray-based diagnostic procedures raises concerns about long-term health risks, especially cancer. In addition, rapid growth in the number of nuclear power plants around the world increases the risk of a nuclear accident similar to that of Fukushima, Japan. Add to this, exposure to non-ionizing radiation from prolonged cell phone use, proton radiation from solar flares, and potential nuclear conflict or a dirty bomb attack, and the need to expand our repertoire of radiation prevention and mitigation strategies becomes increasingly urgent. Radiation Injury Prevention and Mitigation in Humans identifies and examines physical protection strategies as well as non-toxic, cost-effective biological protection strategies. This includes agents that-when administered orally before and/or after irradiation exposures-could be effective in preventing and mitigating acute radiation damage. The book discusses implementing physical and biological protection strategies particularly for first responders, radiation workers, astronauts, and civilians who might be exposed to higher doses of radiation in the course of their activities. The book describes: Physics of ionizing radiation and radiological weapons, principles of nuclear reactors, the types of radiological weapons, and consequences of their explosions Acute and late health effects of high and low doses of radiation The efficacy of FDA-approved and unapproved radioprotective and radiation mitigating agents The efficacy of radioprotective and radiation mitigating agents not requiring FDA approval (antioxidants and herbs) Scientific data and rationale in support of using micronutrient preparations containing dietary and endogenous antioxidants for preventing acute radiation sickness and for mitigating the late adverse health effects among survivors of high and low doses of radiation Examining cutting-edge advances in the research of the effects of non-ionizing radiation on cellular and genetic levels, the book proposes an implementation plan of both physical and biological protection strategies. It covers the full range of potential sources of radiation and includes an up-to-date list of helpful resources and references for the latest research and readings on the topic.

Cyber Forensics - A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition... Cyber Forensics - A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition (Electronic book text, 2nd Revised edition)
Albert Marcella, Jr., Doug Menendez
R2,035 Discovery Miles 20 350 Out of stock

Designed as an introduction and overview to the field, Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition integrates theory and practice to present the policies, procedures, methodologies, and legal ramifications and implications of a cyber forensic investigation. The authors guide you step-by-step through the basics of investigation and introduce the tools and procedures required to legally seize and forensically evaluate a suspect machine. Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition delineates the scope and goals of cyber forensics to reveal and track legal and illegal activity. Beginning with an introduction and definition of cyber forensics, chapters explain the rules of evidence and chain of custody in maintaining legally valid electronic evidence. They describe how to begin an investigation and employ investigative methodology, as well as establish standard operating procedures for the field and cyber forensic laboratory. The authors provide an in depth examination of the manipulation of technology to conceal illegal activities and the use of cyber forensics to uncover them. They discuss topics and issues such as conducting a cyber forensic investigation within both the local and federal legal framework, and evaluating the current data security and integrity exposure of multifunctional devices. Cyber Forensics includes details and tips on taking control of a suspect computer or PDA and its "operating" environment, mitigating potential exposures and risks to chain of custody, and establishing and following a flowchart for the seizure of electronic evidence. An extensive list of appendices include websites, organizations, pertinent legislation, further readings, best practice recommendations, more information on hardware and software, and a recap of the federal rules of civil procedure.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Kingston HyperX FURY 8GB Desktop Memory…
R697 Discovery Miles 6 970
IUTAM Symposium on Relations of Shell…
George Jaiani, Paolo Podio-Guidugli Hardcover R3,037 Discovery Miles 30 370
Navigating Information Literacy
Theo Bothma, Erica Cosijn, … Paperback R639 Discovery Miles 6 390
PDE Modeling and Boundary Control for…
Zhijie Liu, Jinkun Liu Hardcover R3,021 Discovery Miles 30 210
Crowdsourced Data Management - Hybrid…
Guoliang Li, Jiannan Wang, … Hardcover R3,020 Discovery Miles 30 200
Lit and Dark Liquidity with Lost Time…
T. Vuorenmaa Hardcover R1,558 Discovery Miles 15 580
Design of Steel Structures
Elias G. Abu-Saba Hardcover R6,892 Discovery Miles 68 920
Commodities Rising - The Reality Behind…
J M Christian Hardcover R676 R564 Discovery Miles 5 640
Introduction to the Theory of…
Michael Sipser Hardcover R1,322 R1,200 Discovery Miles 12 000
Opstokers, Fopdossers en Tweegatjakkalse
Herman Lategan Paperback R316 Discovery Miles 3 160

 

Partners