![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems
In the latest edition, Philip Walker not only tackles the
electronic aspect of the design of a security system, but also
examines the human factor in such systems. In his own words:
'Electronic aids are added to enable security officers to do their
jobs better, but not to do their jobs for them'.
As crime rates soar every householder looks at ways to protect
their home and its contents. This practical guide, in
straightforward language, spells out the simple steps you can take
to guard your home. It shows how burglars work, and how to thwart
them. The selection and installation of alarm systems are described
simply. This handy volume may provide the information you need to
avoid costly and upsetting break-ins.
The Electrician's Guide to Fire Detection and Fire Alarm Systems, 3rd Edition is ideal for individuals involved in the design and installation of fire detection systems as part of electrical installations. It offers information, advice, and guidance on managing BS 7671 and BS 5839 requirements. This Guide is an essential publication for all fire alarm designers, installers, specifiers, electricians, electrical contractors, installation designers and students in further education and/or professional training. Key Features include: Ideal for individuals involved in the design and installation of fire detection systems as part of electrical installations Includes essential advice on special fire risk, systems design and integration, and installation competency Provides information, advice and guidance on managing BS 7671:2018 and BS 5839 requirements Updated to accommodate the changes, revisions and new information made to IET's 18th Edition, BS 7671:2018 regulations Updated to include changes, revision and new information added to the BS 5839-1 and BS 5839-6 requirements An essential publication for all fire alarm designers, installers, specifiers, electricians, electrical contractors, installation designers and students in further education and/or professional training
This book describes the signal, image and video processing methods and techniques for fire detection and provides a thorough and practical overview of this important subject, as a number of new methods are emerging. This book will serve as a reference for signal processing and computer vision, focusing on fire detection and methods for volume sensors. Applications covered in this book can easily be adapted to other domains, such as multi-modal object recognition in other safety and security problems, with scientific importance for fire detection, as well as video surveillance. Coverage includes: Camera Based Techniques Multi-modal/Multi-sensor fire analysis Pyro-electric Infrared Sensors for Flame Detection Large scale fire experiments Wildfire detection from moving aerial platforms
Formed of papers originating from the 9th International Conference on Safety and Security Engineering, this book highlights research and industrial developments in the theoretical and practical aspects of safety and security engineering. Safety and Security Engineering, due to its special nature, is an interdisciplinary area of research and application that brings together, in a systematic way, many disciplines of engineering from the traditional to the most technologically advanced. This volume covers topics such as crisis management, security engineering, natural disasters and emergencies, terrorism, IT security, man-made hazards, risk management, control, protection and mitigation issues. The meeting aims to attract papers in all related fields, in addition to those listed under the Conference Topics, as well as case studies describing practical experiences. Due to the multitude and variety of topics included, the list is only indicative of the themes of the expected papers. Authors are encouraged to submit abstracts in all areas of Safety and Security, with particular attention to integrated and interdisciplinary aspects. Specific themes include: Critical infrastructure; Cyber security/E security; Disaster and emergency management; Earthquakes and natural hazards; Human factors and risk perception; Modelling and experiments; Risk analysis and assessment; Safety engineering; Risk reduction in transport system in emergency conditions.
In its 8th edition the SAFE conference continues to publish important research contributing to the development of the field. The papers included in this volume are the work of engineers, scientists, field researchers, managers and other specialists involved in one or more of the theoretical and practical aspects of safety and security. Safety and Security Engineering, due to its special nature, is an interdisciplinary area of research and application that brings together in a systematic way, many disciplines of engineering, from the traditional to the most technologically advanced. This volume covers topics such as crisis management, security engineering, natural and man-made disasters and emergencies, risk management, and control, protection and mitigation issues. Specific themes include: Risk analysis, assessment and management; System safety engineering; Incident monitoring; Information and communication security; Disaster management; Emergency response; Critical infrastructure protection; Counter terrorism issues; Human factors; Transportation safety and security; Modelling and experiments; Security surveillance systems; Loss prevention; BIM in Safety and Security.
" High-Security Mechanical Locks " comprehensively surveys and
explains the highly technical area of high security locks in a way
that is accessible to a wide audience. Well over 100 different
locks are presented, organized into 6 basic types. Each chapter
introduces the necessary concepts in a historical perspective and
further categorizes the locks. This is followed by detailed 'how it
works' descriptions with many pictures, diagrams and references.
The descriptions are based on actual dissections of the real locks.
With our highly connected and interdependent world, the growing threat of infectious diseases and public health crisis has shed light on the requirement for global efforts to manage and combat highly pathogenic infectious diseases and other public health crisis on an unprecedented level. Such disease threats transcend borders. Reducing global threats posed by infectious disease outbreaks - whether naturally caused or resulting from a deliberate or accidental release - requires efforts that cross the disaster management pillars: mitigation, preparedness, response and recovery. This book addresses the issues of global health security along 4 themes: Emerging Threats; Mitigation, Preparedness, Response and Recovery; Exploring the Technology Landscape for Solutions; Leadership and Partnership. The authors of this volume highlight many of the challenges that confront our global security environment today. These range from politically induced disasters, to food insecurity, to zoonosis and terrorism. More optimistically, the authors also present some advances in technology that can help us combat these threats. Understanding the challenges that confront us and the tools we have to overcome them will allow us to face our future with confidence.
CCTV for Security Professionals provides the information necessary
to design the ideal CCTV system. The chapters are stand-alone
sources of information on their subjects and are presented in
logical sequence to guide the reader from basic principles to more
complex for a complete system understanding.
This book presents the proceedings of SICC 2017, a conference devoted to promoting the dissemination of the different methodologies, techniques, theories, strategies, technologies and best practices on the prevention and mitigation of CBRNE risks. As the first scientific international conference on safety & security issues in the CBRNE field, SICC 2017 attracted contributions resulting from fruitful inter-professional collaborations between university and military experts, specialized operators, decision makers and the industry. As such, these proceedings are primarily intended for academics and professionals from public, private and military entities. It is the first trans-disciplinary collection of scientific papers from the numerous fields related to CBRNE.
Physical Security 150 Things You Should Know is a comprehensive reference for the security professional. This book covers all aspects of security operations, from lighting and fencing to tracking systems and crime risk management. The "150 Things" offered by Tyska and Fennelly will help professionals in the field build a well-trained, alert, and conscientious security staff.
This thesis describes novel devices for the secure identification of objects or electronic systems. The identification relies on the the atomic-scale uniqueness of semiconductor devices by measuring a macroscopic quantum property of the system in question. Traditionally, objects and electronic systems have been securely identified by measuring specific characteristics: common examples include passwords, fingerprints used to identify a person or an electronic device, and holograms that can tag a given object to prove its authenticity. Unfortunately, modern technologies also make it possible to circumvent these everyday techniques. Variations in quantum properties are amplified by the existence of atomic-scale imperfections. As such, these devices are the hardest possible systems to clone. They also use the least resources and provide robust security. Hence they have tremendous potential significance as a means of reliably telling the good guys from the bad.
This book details some of the major developments in the implementation of compressive sensing in radio applications for electronic defense and warfare communication use. It provides a comprehensive background to the subject and at the same time describes some novel algorithms. It also investigates application value and performance-related parameters of compressive sensing in scenarios such as direction finding, spectrum monitoring, detection, and classification.
This book addresses the challenge of reforming defense and military policy-making in newly democratized nations. By tracing the development of civil-military relations in various new democracies from a comparative perspective, it links two bodies of scholarship that thus far have remained largely separate: the study of emerging (or failed) civilian control over armed forces on the one hand; and work on the roots and causes of military effectiveness to guarantee the protection and security of citizens on the other. The empirical and theoretical findings presented here will appeal to scholars of civil-military relations, democratization and security issues, as well as to defense policy-makers.
This book proposes the air insulation prediction theory and method in the subject of electrical engineering. Prediction of discharge voltage in different cases are discussed and worked out by simulation. After decades, now bottlenecks of traditional air discharge theories can be solved with this book. Engineering applications of the theory in air gap discharge voltage prediction are introduced. This book serves as reference for graduate students, scientific research personnel and engineering staff in the related fields.
This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.
This book focuses on how machine learning techniques can be used to analyze and make use of one particular category of behavioral biometrics known as the gait biometric. A comprehensive Ground Reaction Force (GRF)-based Gait Biometrics Recognition framework is proposed and validated by experiments. In addition, an in-depth analysis of existing recognition techniques that are best suited for performing footstep GRF-based person recognition is also proposed, as well as a comparison of feature extractors, normalizers, and classifiers configurations that were never directly compared with one another in any previous GRF recognition research. Finally, a detailed theoretical overview of many existing machine learning techniques is presented, leading to a proposal of two novel data processing techniques developed specifically for the purpose of gait biometric recognition using GRF. This book * introduces novel machine-learning-based temporal normalization techniques * bridges research gaps concerning the effect of footwear and stepping speed on footstep GRF-based person recognition * provides detailed discussions of key research challenges and open research issues in gait biometrics recognition* compares biometrics systems trained and tested with the same footwear against those trained and tested with different footwear
In recent years, the paradigm of video coding has shifted from that
of a frame-based approach to a content-based approach, particularly
with the finalization of the ISO multimedia coding standard,
MPEG-4. MPEG-4 is the emerging standard for the coding of
multimedia content. It defines a syntax for a set of content-based
functionalities, namely, content-based interactivity, compression
and universal access. However, it does not specify how the video
content is to be generated. To generate the video content, video
has to be segmented into video objects and tracked as they
transverse across the video frames. This book addresses the
difficult problem of video segmentation, and the extraction and
tracking of video object planes as defined in MPEG-4. It then
focuses on the specific issue of face segmentation and coding as
applied to videoconferencing in order to improve the quality of
videoconferencing images especially in the facial region.
This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court.
This book covers the topics of theoretical principles, dynamics model and algorithm, mission analysis, system design and experimental studies of space nets system, aiming to provide an initial framework in this field and serve as a ready reference for those interested. Space nets system represents a forefront field in future development of aerospace technologies. However, it involves new challenges and problems such as nonlinear and distorted nets structure, complex rigid flexible coupling dynamics, orbital transfer of space flexible composite and dynamics control. Currently, no comprehensive books on space nets dynamics and design are available, so potential readers can get to know the working mechanism, dynamics elements, and mission design of the space nets system from a Chinese perspective.
This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications. The proceedings of the 2nd International Conference on Mobile and Wireless Technology (ICMWT2015), it represents the outcome of a unique platform for researchers and practitioners from academia and industry to share cutting-edge developments in the field of mobile and wireless science technology, including those working on data management and mobile security. The contributions presented here describe the latest academic and industrial research from the international mobile and wireless community. The scope covers four major topical areas: mobile and wireless networks and applications; security in mobile and wireless technology; mobile data management and applications; and mobile software. The book will be a valuable reference for current researchers in academia and industry, and a useful resource for graduate-level students working on mobile and wireless technology.
The reader will find here a timely update on new THz sources and detection schemes as well as concrete applications to the detection of Explosives and CBRN. Included is a method to identify hidden RDX-based explosives (pure and plastic ones) in the frequency domain study by Fourier Transformation, which has been complemented by the demonstration of improvement of the quality of the images captured commercially available THz passive cameras. The presented examples show large potential for the detection of small hidden objects at long distances (6-10 m). Complementing the results in the short-wavelength range, laser spectroscopy with a mid-infrared, room temperature, continuous wave, DFB laser diode and high performance DFB QCL have been demonstrated to offer excellent enabling sensor technologies for environmental monitoring, medical diagnostics, industrial and security applications. From the new source point of view a number of systems have been presented - From superconductors to semiconductors, e.g. Detection of Terahertz Waves from Superconducting Bi2Sr2CaCu2O8+ Intrinsic Josephson Junctions.The quest for a compact room temperature THz source and the recent advances in high power mid-IR QCLs lead to the development of a semiconductor THz source based on intracavity difference frequency generation. Furthermore, alternative electrically pumped THz sources based on the high emission efficiency predicted for polaritonic states in the ultra-strong coupling regime led to the demonstration of electroluminescent devices. Finally, antipolaritons in dispersive media were discussed and different aspects of the interaction of THz radiation with biomatter were presented."
Intruder Alarms provides a definitive and fully up-to-date guide to
the specification, systems design, integration, installation and
maintenance of intruder alarm systems. It has been written to be
the essential handbook for installation engineers and security
professionals working in this rapidly expanding and developing
area.
Detection of concealed explosives is a notoriously difficult problem, and many different approaches have been proposed to solve this problem. Nuclear quadrupole resonance (NQR) is unique in many ways. It operates in a safe AM radio frequency range, and it can remotely detect unique fingerprint (NQR spectrum) of many explosives, such as TNT or RDX. As such, the detection of target does not depend on the shape or material of the container, or the presence of metallic object such as triggers etc. Spectra of chemically similar compounds differ enough that their presence never causes interference or false alarms. Unfortunately, widespread use is prevented due to low sensitivity, radiofrequency interference from the noisy environment, and inability to detect liquid explosives. This book presents current state of the art of the attempts to overcome NQR sensitivity problem, either by increasing the strengths of signals generated, or by increasing the specificity of the technique through a better understanding of the factors that affect the quadrupolar parameters of specific explosives. The use of these specific quadrupolar parameters is demonstrated on signal processing techniques that can detect weak signals, which are hidden in a noisy background. The problem of differentiation of liquid explosives and benign liquids in closed containers is approached by measurements of different nuclear magnetic resonance (NMR) parameters. As shown, a couple of solutions has reached a prototype stage and could find their use in a near future."
This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. |
You may like...
Palmprint Authentication
8#, Xingyi Road,Chang Ning District 16/F, Maxdo Center
Hardcover
R2,672
Discovery Miles 26 720
Fire Behavior and Fire Protection in…
Roza Aseeva, Boris Serkov, …
Hardcover
Multisensor Surveillance Systems - The…
Gian Luca Foresti, Carlo S. Regazzoni, …
Hardcover
R4,047
Discovery Miles 40 470
Biometric-Based Physical and…
Mohammad S. Obaidat, Issa Traore, …
Hardcover
R4,123
Discovery Miles 41 230
Mobile Phone Security and Forensics - A…
Iosif I. Androulidakis
Hardcover
Advanced Video-Based Surveillance…
Carlo S. Regazzoni, Gianni Fabri, …
Hardcover
R2,782
Discovery Miles 27 820
Trusted Computing Platforms - TPM2.0 in…
Graeme Proudler, Liqun Chen, …
Hardcover
R4,853
Discovery Miles 48 530
|