0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (1)
  • R500+ (311)
  • -
Status
Format
Author / Contributor
Publisher

Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems

Electronic Security Systems - Reducing False Alarms (Hardcover, 3rd edition): Philip Walker Electronic Security Systems - Reducing False Alarms (Hardcover, 3rd edition)
Philip Walker
R1,992 Discovery Miles 19 920 Ships in 10 - 15 working days

In the latest edition, Philip Walker not only tackles the electronic aspect of the design of a security system, but also examines the human factor in such systems. In his own words: 'Electronic aids are added to enable security officers to do their jobs better, but not to do their jobs for them'.
Today, with the escalation of crime and growing concerns for security, there has been a great increase in the number of electronic security systems. Unfortunately, despite improvements in reliability in terms of equipment manufacture, false alarms do still occur, and they waste a large amount of police time; approximately ninety out of one hundred alarms investigated by the police are false. In the light of this, the new edition of Electronic Security Systems couldn't come at a better time, as it deals extensively with methods of reducing false alarms, allowing the police to concentrate on real breeches of security, and thus ultimately to reduce crime.
The extensive and unusual combination of experience that Philip Walker has in the world of electronics, communications and as a security consulting engineer makes him eminently qualified to tackle such subjects.
At only 30, this hardback book is an essential addition to your security collection. It has 320 pages packed with advice and technical knowledge, 40 photographs and 25 line diagrams and a good index.

Comprehensive coverage of electronic security systems
Written by an experienced security professional
Fully updated to examine new equipment with extensive help on avoiding false alarms"

Home Security - Alarms, Sensors and Systems (Paperback, 2nd edition): Vivian Capel Home Security - Alarms, Sensors and Systems (Paperback, 2nd edition)
Vivian Capel
R1,286 Discovery Miles 12 860 Ships in 10 - 15 working days

As crime rates soar every householder looks at ways to protect their home and its contents. This practical guide, in straightforward language, spells out the simple steps you can take to guard your home. It shows how burglars work, and how to thwart them. The selection and installation of alarm systems are described simply. This handy volume may provide the information you need to avoid costly and upsetting break-ins.
As well as describing the bewildering range of security devices on offer, more technical readers may consider their own solutions using descriptions and circuits for two simple tested designs are given, one for the home and one for a foolproof public hall system.
There is a plethora of security devices now on offer. Large sums can be spent on elaborate systems, yet weak links can be left unrecognised - except by the housebreaker Good independent advice is scarce, as most security firms favour their own products. This book explains the pros and cons of alarm systems, including how to avoid faults, and find them if they occur. Friendly security' is particularly featured, and other security devices are given a critical scrutiny.

Explains simply and in straightforward language how to select and install systems
Describes range of security devices on offer
Explains pros and cons of alarm systems and how to avoid faults

Electrician's Guide to Fire Detection and Fire Alarm Systems (Spiral bound, 3rd edition): The Institution of Engineering... Electrician's Guide to Fire Detection and Fire Alarm Systems (Spiral bound, 3rd edition)
The Institution of Engineering and Technology
R996 Discovery Miles 9 960 Ships in 9 - 17 working days

The Electrician's Guide to Fire Detection and Fire Alarm Systems, 3rd Edition is ideal for individuals involved in the design and installation of fire detection systems as part of electrical installations. It offers information, advice, and guidance on managing BS 7671 and BS 5839 requirements. This Guide is an essential publication for all fire alarm designers, installers, specifiers, electricians, electrical contractors, installation designers and students in further education and/or professional training. Key Features include: Ideal for individuals involved in the design and installation of fire detection systems as part of electrical installations Includes essential advice on special fire risk, systems design and integration, and installation competency Provides information, advice and guidance on managing BS 7671:2018 and BS 5839 requirements Updated to accommodate the changes, revisions and new information made to IET's 18th Edition, BS 7671:2018 regulations Updated to include changes, revision and new information added to the BS 5839-1 and BS 5839-6 requirements An essential publication for all fire alarm designers, installers, specifiers, electricians, electrical contractors, installation designers and students in further education and/or professional training

Methods and Techniques for Fire Detection - Signal, Image and Video Processing Perspectives (Hardcover): A. Enis Cetin, Bart... Methods and Techniques for Fire Detection - Signal, Image and Video Processing Perspectives (Hardcover)
A. Enis Cetin, Bart Merci, Osman Gunay, Behcet Ugur Toereyin, Steven Verstockt
R1,450 Discovery Miles 14 500 Ships in 10 - 15 working days

This book describes the signal, image and video processing methods and techniques for fire detection and provides a thorough and practical overview of this important subject, as a number of new methods are emerging. This book will serve as a reference for signal processing and computer vision, focusing on fire detection and methods for volume sensors. Applications covered in this book can easily be adapted to other domains, such as multi-modal object recognition in other safety and security problems, with scientific importance for fire detection, as well as video surveillance. Coverage includes: Camera Based Techniques Multi-modal/Multi-sensor fire analysis Pyro-electric Infrared Sensors for Flame Detection Large scale fire experiments Wildfire detection from moving aerial platforms

Safety and Security Engineering IX (Hardcover): Giorgio Passerini, Fabio Farzia, M. Lombardi Safety and Security Engineering IX (Hardcover)
Giorgio Passerini, Fabio Farzia, M. Lombardi
R4,325 Discovery Miles 43 250 Ships in 18 - 22 working days

Formed of papers originating from the 9th International Conference on Safety and Security Engineering, this book highlights research and industrial developments in the theoretical and practical aspects of safety and security engineering. Safety and Security Engineering, due to its special nature, is an interdisciplinary area of research and application that brings together, in a systematic way, many disciplines of engineering from the traditional to the most technologically advanced. This volume covers topics such as crisis management, security engineering, natural disasters and emergencies, terrorism, IT security, man-made hazards, risk management, control, protection and mitigation issues. The meeting aims to attract papers in all related fields, in addition to those listed under the Conference Topics, as well as case studies describing practical experiences. Due to the multitude and variety of topics included, the list is only indicative of the themes of the expected papers. Authors are encouraged to submit abstracts in all areas of Safety and Security, with particular attention to integrated and interdisciplinary aspects. Specific themes include: Critical infrastructure; Cyber security/E security; Disaster and emergency management; Earthquakes and natural hazards; Human factors and risk perception; Modelling and experiments; Risk analysis and assessment; Safety engineering; Risk reduction in transport system in emergency conditions.

Safety and Security Engineering VIII (Hardcover): M Guarascio, G. Passerini, F. Garzia, M. Lombardi Safety and Security Engineering VIII (Hardcover)
M Guarascio, G. Passerini, F. Garzia, M. Lombardi
R2,117 Discovery Miles 21 170 Ships in 18 - 22 working days

In its 8th edition the SAFE conference continues to publish important research contributing to the development of the field. The papers included in this volume are the work of engineers, scientists, field researchers, managers and other specialists involved in one or more of the theoretical and practical aspects of safety and security. Safety and Security Engineering, due to its special nature, is an interdisciplinary area of research and application that brings together in a systematic way, many disciplines of engineering, from the traditional to the most technologically advanced. This volume covers topics such as crisis management, security engineering, natural and man-made disasters and emergencies, risk management, and control, protection and mitigation issues. Specific themes include: Risk analysis, assessment and management; System safety engineering; Incident monitoring; Information and communication security; Disaster management; Emergency response; Critical infrastructure protection; Counter terrorism issues; Human factors; Transportation safety and security; Modelling and experiments; Security surveillance systems; Loss prevention; BIM in Safety and Security.

High-Security Mechanical Locks - An Encyclopedic Reference (Hardcover): Graham Pulford High-Security Mechanical Locks - An Encyclopedic Reference (Hardcover)
Graham Pulford
R2,131 Discovery Miles 21 310 Ships in 10 - 15 working days

" High-Security Mechanical Locks " comprehensively surveys and explains the highly technical area of high security locks in a way that is accessible to a wide audience. Well over 100 different locks are presented, organized into 6 basic types. Each chapter introduces the necessary concepts in a historical perspective and further categorizes the locks. This is followed by detailed 'how it works' descriptions with many pictures, diagrams and references. The descriptions are based on actual dissections of the real locks.
The scope is limited to key operated mechanical locks, thus keyless combination locks and digital locks are not covered. The book does not deal with routine locksmithing topics such as installation and servicing of locks. The sensitive area of picking and bypassing of locks is dealt with only at a high level without giving detailed information that would be unacceptable in the wrong hands.
* Comprehensive coverage of over 100 different types of 19th and 20th century key-operated locks, unified in a simple classification scheme
* Detailed operating principles - clear 'how it works' descriptions
* Manipulation resistance rating for each lock on a scale of 1 to 5

Global Health Security - Recognizing Vulnerabilities, Creating Opportunities (Hardcover, 1st ed. 2020): Anthony J. Masys,... Global Health Security - Recognizing Vulnerabilities, Creating Opportunities (Hardcover, 1st ed. 2020)
Anthony J. Masys, Ricardo Izurieta, Miguel Reina Ortiz
R3,399 Discovery Miles 33 990 Ships in 18 - 22 working days

With our highly connected and interdependent world, the growing threat of infectious diseases and public health crisis has shed light on the requirement for global efforts to manage and combat highly pathogenic infectious diseases and other public health crisis on an unprecedented level. Such disease threats transcend borders. Reducing global threats posed by infectious disease outbreaks - whether naturally caused or resulting from a deliberate or accidental release - requires efforts that cross the disaster management pillars: mitigation, preparedness, response and recovery. This book addresses the issues of global health security along 4 themes: Emerging Threats; Mitigation, Preparedness, Response and Recovery; Exploring the Technology Landscape for Solutions; Leadership and Partnership. The authors of this volume highlight many of the challenges that confront our global security environment today. These range from politically induced disasters, to food insecurity, to zoonosis and terrorism. More optimistically, the authors also present some advances in technology that can help us combat these threats. Understanding the challenges that confront us and the tools we have to overcome them will allow us to face our future with confidence.

CCTV for Security Professionals (Hardcover): Alan Matchett CCTV for Security Professionals (Hardcover)
Alan Matchett
R1,861 Discovery Miles 18 610 Ships in 10 - 15 working days

CCTV for Security Professionals provides the information necessary to design the ideal CCTV system. The chapters are stand-alone sources of information on their subjects and are presented in logical sequence to guide the reader from basic principles to more complex for a complete system understanding.
In his straight-forward and informative text, Alan Matchett approaches the camera systems from the user's point of view, providing the security manager with the knowledge to discuss the system, its desired features, and the areas of design concern within the context of an organization's business model. This can prove to be invaluable when evaluating an existing system, the use and components of a given system, or in evaluating a system design proposed by a vendor.
Installers and service personnel will benefit from the functions and possibilities that are available with the various components and by gaining an understanding of their customers' needs. Newer technicians will learn how to set up the system properly, and can familiarize themselves with the technologies that go into a CCTV system.
Security equipment sales personnel will also gain a better knowledge of the customer's needs as well as learn to determine exactly what questions they should be asking the customer and what the customer's responses mean. In this manner, the book will offer invaluable tips to ensure customers get exactly what they expect in a system.
* Provides a detailed explanation of CCTV components and the technology behind analog and digital CCTV systems.
* Establishes a "common language" for security professionals, CCTV system designers and sales personnel to use as a basis for system design.
* Provides a clear explanation of the design process and design principles.

Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference - Science as the first countermeasure for CBRNE and... Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference - Science as the first countermeasure for CBRNE and Cyber threats (Hardcover, 1st ed. 2018)
Andrea Malizia, Marco D'Arienzo
R2,728 Discovery Miles 27 280 Ships in 18 - 22 working days

This book presents the proceedings of SICC 2017, a conference devoted to promoting the dissemination of the different methodologies, techniques, theories, strategies, technologies and best practices on the prevention and mitigation of CBRNE risks. As the first scientific international conference on safety & security issues in the CBRNE field, SICC 2017 attracted contributions resulting from fruitful inter-professional collaborations between university and military experts, specialized operators, decision makers and the industry. As such, these proceedings are primarily intended for academics and professionals from public, private and military entities. It is the first trans-disciplinary collection of scientific papers from the numerous fields related to CBRNE.

Physical Security 150 Things You Should Know (Paperback): Lawrence Fennelly, Louis Tyska Physical Security 150 Things You Should Know (Paperback)
Lawrence Fennelly, Louis Tyska
R1,357 Discovery Miles 13 570 Ships in 10 - 15 working days

Physical Security 150 Things You Should Know is a comprehensive reference for the security professional. This book covers all aspects of security operations, from lighting and fencing to tracking systems and crime risk management. The "150 Things" offered by Tyska and Fennelly will help professionals in the field build a well-trained, alert, and conscientious security staff.


Format is unique in that it identifies subjects, then discusses and highlights specifics in terms of concerns and knowledge the security professional requires
Quick and easy reference
Covers basics of physical security - both high and low tech

Using Imperfect Semiconductor Systems for Unique Identification (Hardcover, 1st ed. 2017): Jonathan Roberts Using Imperfect Semiconductor Systems for Unique Identification (Hardcover, 1st ed. 2017)
Jonathan Roberts
R3,182 Discovery Miles 31 820 Ships in 18 - 22 working days

This thesis describes novel devices for the secure identification of objects or electronic systems. The identification relies on the the atomic-scale uniqueness of semiconductor devices by measuring a macroscopic quantum property of the system in question. Traditionally, objects and electronic systems have been securely identified by measuring specific characteristics: common examples include passwords, fingerprints used to identify a person or an electronic device, and holograms that can tag a given object to prove its authenticity. Unfortunately, modern technologies also make it possible to circumvent these everyday techniques. Variations in quantum properties are amplified by the existence of atomic-scale imperfections. As such, these devices are the hardest possible systems to clone. They also use the least resources and provide robust security. Hence they have tremendous potential significance as a means of reliably telling the good guys from the bad.

Compressive Sensing Based Algorithms for Electronic Defence (Hardcover, 1st ed. 2017): Amit Kumar Mishra, Ryno Strauss Verster Compressive Sensing Based Algorithms for Electronic Defence (Hardcover, 1st ed. 2017)
Amit Kumar Mishra, Ryno Strauss Verster
R3,935 Discovery Miles 39 350 Ships in 10 - 15 working days

This book details some of the major developments in the implementation of compressive sensing in radio applications for electronic defense and warfare communication use. It provides a comprehensive background to the subject and at the same time describes some novel algorithms. It also investigates application value and performance-related parameters of compressive sensing in scenarios such as direction finding, spectrum monitoring, detection, and classification.

Reforming Civil-Military Relations in New Democracies - Democratic Control and Military Effectiveness in Comparative... Reforming Civil-Military Relations in New Democracies - Democratic Control and Military Effectiveness in Comparative Perspectives (Hardcover, 1st ed. 2017)
Aurel Croissant, David Kuehn
R4,627 Discovery Miles 46 270 Ships in 10 - 15 working days

This book addresses the challenge of reforming defense and military policy-making in newly democratized nations. By tracing the development of civil-military relations in various new democracies from a comparative perspective, it links two bodies of scholarship that thus far have remained largely separate: the study of emerging (or failed) civilian control over armed forces on the one hand; and work on the roots and causes of military effectiveness to guarantee the protection and security of citizens on the other. The empirical and theoretical findings presented here will appeal to scholars of civil-military relations, democratization and security issues, as well as to defense policy-makers.

Air Insulation Prediction Theory and Applications (Hardcover, 1st ed. 2019): Zhibin Qiu, Jiangjun Ruan, Shengwen Shu Air Insulation Prediction Theory and Applications (Hardcover, 1st ed. 2019)
Zhibin Qiu, Jiangjun Ruan, Shengwen Shu
R2,660 Discovery Miles 26 600 Ships in 18 - 22 working days

This book proposes the air insulation prediction theory and method in the subject of electrical engineering. Prediction of discharge voltage in different cases are discussed and worked out by simulation. After decades, now bottlenecks of traditional air discharge theories can be solved with this book. Engineering applications of the theory in air gap discharge voltage prediction are introduced. This book serves as reference for graduate students, scientific research personnel and engineering staff in the related fields.

Advances in Cyber Security Analytics and Decision Systems (Hardcover, 1st ed. 2020): Shishir K. Shandilya, Neal Wagner, Atulya... Advances in Cyber Security Analytics and Decision Systems (Hardcover, 1st ed. 2020)
Shishir K. Shandilya, Neal Wagner, Atulya K. Nagar
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.

Machine Learning Techniques for Gait Biometric Recognition - Using the Ground Reaction Force (Hardcover, 1st ed. 2016): James... Machine Learning Techniques for Gait Biometric Recognition - Using the Ground Reaction Force (Hardcover, 1st ed. 2016)
James Eric Mason, Issa Traore, Isaac Woungang
R3,912 R1,907 Discovery Miles 19 070 Save R2,005 (51%) Ships in 10 - 15 working days

This book focuses on how machine learning techniques can be used to analyze and make use of one particular category of behavioral biometrics known as the gait biometric. A comprehensive Ground Reaction Force (GRF)-based Gait Biometrics Recognition framework is proposed and validated by experiments. In addition, an in-depth analysis of existing recognition techniques that are best suited for performing footstep GRF-based person recognition is also proposed, as well as a comparison of feature extractors, normalizers, and classifiers configurations that were never directly compared with one another in any previous GRF recognition research. Finally, a detailed theoretical overview of many existing machine learning techniques is presented, leading to a proposal of two novel data processing techniques developed specifically for the purpose of gait biometric recognition using GRF. This book * introduces novel machine-learning-based temporal normalization techniques * bridges research gaps concerning the effect of footwear and stepping speed on footstep GRF-based person recognition * provides detailed discussions of key research challenges and open research issues in gait biometrics recognition* compares biometrics systems trained and tested with the same footwear against those trained and tested with different footwear

Advanced Video Coding: Principles and Techniques, Volume 7 - The Content-based Approach (Hardcover): K.N. Ngan, T. Meier, D.... Advanced Video Coding: Principles and Techniques, Volume 7 - The Content-based Approach (Hardcover)
K.N. Ngan, T. Meier, D. Chai
R3,886 Discovery Miles 38 860 Ships in 10 - 15 working days

In recent years, the paradigm of video coding has shifted from that of a frame-based approach to a content-based approach, particularly with the finalization of the ISO multimedia coding standard, MPEG-4. MPEG-4 is the emerging standard for the coding of multimedia content. It defines a syntax for a set of content-based functionalities, namely, content-based interactivity, compression and universal access. However, it does not specify how the video content is to be generated. To generate the video content, video has to be segmented into video objects and tracked as they transverse across the video frames. This book addresses the difficult problem of video segmentation, and the extraction and tracking of video object planes as defined in MPEG-4. It then focuses on the specific issue of face segmentation and coding as applied to videoconferencing in order to improve the quality of videoconferencing images especially in the facial region.
Modal-based coding is a content-based coding technique used to code synthetic objects that have become an important part of video content. It results in extremely low bit rates because only the parameters needed to represent the modal are transmitted. Model-based coding is included to provide background information for the synthetic object coding in MPEG-4. Lastly, MPEG-4, the first coding standard for multimedia content is described in detail. The topics covered include the coding of audio objects, the coding of natural and synthetic video objects, and error resilience.
"Advanced Video Coding" is one of the first books on content-based coding and MPEG-4 coding standard. It serves as an excellent information source and reference for both researchers and practicing engineers.

Multimedia Forensics and Security - Foundations, Innovations, and Applications (Hardcover, 1st ed. 2017): Aboul Ella Hassanien,... Multimedia Forensics and Security - Foundations, Innovations, and Applications (Hardcover, 1st ed. 2017)
Aboul Ella Hassanien, Mohamed Mostafa Fouad, Azizah Abdul Manaf, Mazdak Zamani, Rabiah Ahmad, …
R4,070 R3,539 Discovery Miles 35 390 Save R531 (13%) Ships in 10 - 15 working days

This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court.

Dynamics and Design of Space Nets for Orbital Capture (Hardcover, 1st ed. 2017): Leping Yang, Qingbin Zhang, Ming Zhen, Haitao... Dynamics and Design of Space Nets for Orbital Capture (Hardcover, 1st ed. 2017)
Leping Yang, Qingbin Zhang, Ming Zhen, Haitao Liu
R3,285 Discovery Miles 32 850 Ships in 10 - 15 working days

This book covers the topics of theoretical principles, dynamics model and algorithm, mission analysis, system design and experimental studies of space nets system, aiming to provide an initial framework in this field and serve as a ready reference for those interested. Space nets system represents a forefront field in future development of aerospace technologies. However, it involves new challenges and problems such as nonlinear and distorted nets structure, complex rigid flexible coupling dynamics, orbital transfer of space flexible composite and dynamics control. Currently, no comprehensive books on space nets dynamics and design are available, so potential readers can get to know the working mechanism, dynamics elements, and mission design of the space nets system from a Chinese perspective.

Mobile and Wireless Technology 2015 (Hardcover, 2015 ed.): Kuinam J. Kim, Naruemon Wattanapongsakorn Mobile and Wireless Technology 2015 (Hardcover, 2015 ed.)
Kuinam J. Kim, Naruemon Wattanapongsakorn
R5,202 R4,610 Discovery Miles 46 100 Save R592 (11%) Ships in 10 - 15 working days

This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications. The proceedings of the 2nd International Conference on Mobile and Wireless Technology (ICMWT2015), it represents the outcome of a unique platform for researchers and practitioners from academia and industry to share cutting-edge developments in the field of mobile and wireless science technology, including those working on data management and mobile security. The contributions presented here describe the latest academic and industrial research from the international mobile and wireless community. The scope covers four major topical areas: mobile and wireless networks and applications; security in mobile and wireless technology; mobile data management and applications; and mobile software. The book will be a valuable reference for current researchers in academia and industry, and a useful resource for graduate-level students working on mobile and wireless technology.

Terahertz and Mid Infrared Radiation: Detection of Explosives and CBRN (Using Terahertz) (Hardcover, 2014 ed.): Mauro F.... Terahertz and Mid Infrared Radiation: Detection of Explosives and CBRN (Using Terahertz) (Hardcover, 2014 ed.)
Mauro F. Pereira, Oleksiy Shulika
R4,625 Discovery Miles 46 250 Ships in 10 - 15 working days

The reader will find here a timely update on new THz sources and detection schemes as well as concrete applications to the detection of Explosives and CBRN. Included is a method to identify hidden RDX-based explosives (pure and plastic ones) in the frequency domain study by Fourier Transformation, which has been complemented by the demonstration of improvement of the quality of the images captured commercially available THz passive cameras. The presented examples show large potential for the detection of small hidden objects at long distances (6-10 m). Complementing the results in the short-wavelength range, laser spectroscopy with a mid-infrared, room temperature, continuous wave, DFB laser diode and high performance DFB QCL have been demonstrated to offer excellent enabling sensor technologies for environmental monitoring, medical diagnostics, industrial and security applications. From the new source point of view a number of systems have been presented - From superconductors to semiconductors, e.g. Detection of Terahertz Waves from Superconducting Bi2Sr2CaCu2O8+ Intrinsic Josephson Junctions.The quest for a compact room temperature THz source and the recent advances in high power mid-IR QCLs lead to the development of a semiconductor THz source based on intracavity difference frequency generation. Furthermore, alternative electrically pumped THz sources based on the high emission efficiency predicted for polaritonic states in the ultra-strong coupling regime led to the demonstration of electroluminescent devices. Finally, antipolaritons in dispersive media were discussed and different aspects of the interaction of THz radiation with biomatter were presented."

Intruder Alarms (Paperback, 3rd edition): Gerard Honey Intruder Alarms (Paperback, 3rd edition)
Gerard Honey
R1,008 Discovery Miles 10 080 Ships in 10 - 15 working days

Intruder Alarms provides a definitive and fully up-to-date guide to the specification, systems design, integration, installation and maintenance of intruder alarm systems. It has been written to be the essential handbook for installation engineers and security professionals working in this rapidly expanding and developing area.
The third edition includes new material on systems integration, digital systems, wireless and remote signalling technologies, and electrical safety.
The revision has brought coverage fully in line with the new European standards (EN50131 / BS EN 50131-1), with their implications summarised in a new appendix. The coverage has also been carefully matched to the requirements of the new Knowledge of Security and Emergency Alarm Systems from City & Guilds (1852).
* An hugely popular practical guide for installation engineers and security professionals now in its third edition
* Essential reading for managers responsible for the commissioning and maintenance of security alarm systems
* Third edition is fully matched to the new European standards (EN50131 / BS EN 50131-1)
* Coverage meets City & Guilds specifications for the new 1852 Security Alarm course

Magnetic Resonance Detection of Explosives and Illicit Materials (Hardcover, 2014 ed.): Tomaz Apih, Bulat Rameev, Georgy... Magnetic Resonance Detection of Explosives and Illicit Materials (Hardcover, 2014 ed.)
Tomaz Apih, Bulat Rameev, Georgy Mozzhukhin, Jamie Barras
R4,587 Discovery Miles 45 870 Ships in 10 - 15 working days

Detection of concealed explosives is a notoriously difficult problem, and many different approaches have been proposed to solve this problem. Nuclear quadrupole resonance (NQR) is unique in many ways. It operates in a safe AM radio frequency range, and it can remotely detect unique fingerprint (NQR spectrum) of many explosives, such as TNT or RDX. As such, the detection of target does not depend on the shape or material of the container, or the presence of metallic object such as triggers etc. Spectra of chemically similar compounds differ enough that their presence never causes interference or false alarms. Unfortunately, widespread use is prevented due to low sensitivity, radiofrequency interference from the noisy environment, and inability to detect liquid explosives. This book presents current state of the art of the attempts to overcome NQR sensitivity problem, either by increasing the strengths of signals generated, or by increasing the specificity of the technique through a better understanding of the factors that affect the quadrupolar parameters of specific explosives. The use of these specific quadrupolar parameters is demonstrated on signal processing techniques that can detect weak signals, which are hidden in a noisy background. The problem of differentiation of liquid explosives and benign liquids in closed containers is approached by measurements of different nuclear magnetic resonance (NMR) parameters. As shown, a couple of solutions has reached a prototype stage and could find their use in a near future."

Information Security Practices - Emerging Threats and Perspectives (Hardcover, 1st ed. 2017): Issa Traore, Ahmed Awad, Isaac... Information Security Practices - Emerging Threats and Perspectives (Hardcover, 1st ed. 2017)
Issa Traore, Ahmed Awad, Isaac Woungang
R3,106 Discovery Miles 31 060 Ships in 18 - 22 working days

This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Palmprint Authentication
8#, Xingyi Road,Chang Ning District 16/F, Maxdo Center Hardcover R2,672 Discovery Miles 26 720
Sustainable Cities and Military…
Igor Linkov Hardcover R6,460 Discovery Miles 64 600
Fire Behavior and Fire Protection in…
Roza Aseeva, Boris Serkov, … Hardcover R5,283 R4,692 Discovery Miles 46 920
Disaster Management: Enabling Resilience
Anthony Masys Hardcover R4,799 Discovery Miles 47 990
Multisensor Surveillance Systems - The…
Gian Luca Foresti, Carlo S. Regazzoni, … Hardcover R4,047 Discovery Miles 40 470
Biometric-Based Physical and…
Mohammad S. Obaidat, Issa Traore, … Hardcover R4,123 Discovery Miles 41 230
Mobile Phone Security and Forensics - A…
Iosif I. Androulidakis Hardcover R3,522 R2,415 Discovery Miles 24 150
Advanced Video-Based Surveillance…
Carlo S. Regazzoni, Gianni Fabri, … Hardcover R2,782 Discovery Miles 27 820
Design for Secure Residential…
S. Crouch, Henry Shaftoe, … Paperback R1,128 Discovery Miles 11 280
Trusted Computing Platforms - TPM2.0 in…
Graeme Proudler, Liqun Chen, … Hardcover R4,853 Discovery Miles 48 530

 

Partners