![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems
The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through its own imperfections and vulnerabilities. Moreover, quantum computers are further pushing the boundaries of what is possible, by making machine learning cyber agents faster and smarter. With the abundance of often-confusing information and lack of trust in the diverse applications of AI-based technologies, it is essential to have a book that can explain, from a cyber security standpoint, why and at what stage the emerging, powerful technology of machine learning can and should be mistrusted, and how to benefit from it while avoiding potentially disastrous consequences. In addition, this book sheds light on another highly sensitive area - the application of machine learning for offensive purposes, an aspect that is widely misunderstood, under-represented in the academic literature and requires immediate expert attention.
When the SCION project started in 2009, the goal was to create an architecture offering high availability and security for basic point-to-point communication. In the five years since the publication of SCION: A Secure Internet Architecture, this next-generation Internet architecture has evolved in terms of both design and deployment. On the one hand, there has been development of exciting new concepts and systems, including a new global time-synchronization system, an inter-domain approach for bandwidth reservations called COLIBRI, and Green Networking, which allows combating global climate change on three fronts. On the other hand, SCION is now also in production use by the Swiss financial ecosystem, and enables participants such as the Swiss National Bank, the Swiss provider of clearing services (SIX), and all Swiss financial institutes to communicate securely and reliably with each other via the Secure Swiss Finance Network. This unique guidebook provides an updated description of SCION's main components, covering new research topics and the most recent deployments. In particular, it presents in-depth discussion of formal verification efforts. Importantly, it offers a comprehensive, thorough description of the current SCION system: Describes the principles that guided SCION's design as a secure and robust Internet architecture Provides a comprehensive description of the next evolution in the way data finds its way through the Internet Explains how SCION can contribute to reducing carbon emissions, by introducing SCION Green Networking Demonstrates how SCION not only functions in academic settings but also works in production deployments Discusses additional use cases for driving SCION's adoption Presents the approaches for formal verification of protocols and code Illustrated with many colorful figures, pictures, and diagrams, allowing easy access to the concepts and use cases Assembled by a team with extensive experience in the fields of computer networks and security, this text/reference is suitable for researchers, practitioners, and graduate students interested in network security. Also, readers with limited background in computer networking but with a desire to know more about SCION will benefit from an overview of relevant chapters in the beginning of the book.
This book addresses the reader interested in vehicular traffic phenomena, who have not learned about them before. It presents traffic phenomena like traffic breakdown and the emergence of moving traffic jams by showcasing empirical traffic data measured in real-world traffic. The author explains how these empirical traffic studies have led to the three-phase traffic theory and why this new theory is in conflict with standard traffic theories developed before. Moreover, he presents the reason for the failure of applications of standard traffic theories in real-world traffic and discusses why understanding real traffic has caused a paradigm shift in traffic and transportation science. The book examines why understanding real traffic breakdown is the basis for an explanation for the autonomous driving effects on traffic flow. It shows that understanding real traffic is possible from real-world traffic data without the need of mathematical traffic models. This makes the book intuitive for non-specialists, who can qualitatively understand all the basic features of traffic dynamics. In turn, experienced traffic researchers can grasp concepts and ideas made here easily accessible by the author, one of the leading pioneers in the field of vehicular traffic.
This book discusses the latest advances in cyber-physical security and resilience of cyber-physical systems, including cyber-attack detection, isolation, situation awareness, resilient estimation and resilient control under attack. It presents both theoretical results and important applications of the methods. Security and Resilience in Cyber-Physical Systems begins by introducing the topic of cyber-physical security, covering state-of-the-art trends in both theory and applications, as well as some of the emerging methodologies and future directions for research. It then moves on to detail theoretical methods of attack detection, resilient estimation and control within cyber-physical systems, before discussing their various applications, such as power generation and distribution, autonomous systems, wireless communication networks and chemical plants. Focusing on the detection of and accommodation to cyber-attacks on cyber-physical systems, and including both estimation and artificial-intelligence-based methods, this book will be of interest to researchers, engineers and graduate students within the fields of cyber-physical security and resilient control.
This book is a compilation of selected papers from the Sixth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in October 2021 in Zhuji, Zhejiang, China. The purpose of this symposium is to discuss Inspection, test, certification and research for the software and hardware of Instrument and Control (I&C) systems in nuclear power plants (NPP), such as sensors, actuators and control system. It aims to provide a platform of technical exchange and experience sharing for those broad masses of experts and scholars and nuclear power practitioners, and for the combination of production, teaching and research in universities and enterprises to promote the safe development of nuclear power plant. Readers will find a wealth of valuable insights into achieving safer and more efficient instrumentation and control systems.
Resilience Engineering (RE) studies have successfully identified and described many instances of resilient performance in high hazard sectors as well as in the far more frequent cases where people and organisations cope with the uncertainties of daily operations. Since RE was first described in 2006, a steady accumulation of insights and efforts have provided the basis for practical tools and methods. This development has been documented by a series of texts in the Resilience Engineering Perspectives series as well as by a growing number of papers and reports. This book encapsulates the essential practical lessons learned from the use of Resilience Engineering (RE) for over ten years. The main contents are a series of chapters written by those who have been instrumental in these applications. To increase the value for the reader, each chapter will include: rationale for the overall approach; data sought and reason(s) for choosing; data sources used, data analyses performed, and how recommendations were made and turned into practice. Serving as a reference for practitioners who want to analyse, support, and manage resilient performance, this book also advances research into RE by inquiring why work goes well in unpredictable environments, to improve work performance, or compensate for deficiencies.
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license.
Despite the growing interest in security amongst governments, organizations and the general public, the provision of much security is substandard. This book explores the problems facing security, and sets out innovative proposals to enhance the effectiveness of security in society, at national and organizational levels.
This book highlights the design, use and structure of blockchain systems and decentralized ledger technologies (B/DLT) for use in the construction industry. Construction remains a fragmented change-resistant industry with chronic problems of underproductivity and a very low digitization factor compared to other fields. In parallel, the convergence, embedding and coordination of digital technologies in the physical world provides a unique opportunity for the construction industry to leap ahead and adopt fourth industrial revolution technologies. Within this context, B/DLT are an excellent fit for the digitization of the construction industry. B/DLT are effective in this as they organize and align digital and physical supply chains, produce stigmergic coordination out of decentralization, enable the governance of complex projects for multiple stakeholders, while enabling the creation of a new class of business models and legal instruments for construction.
Ensuring cybersecurity for smart cities is crucial for a sustainable cyber ecosystem. Given the undeniable complexity of smart cities, fundamental issues such as device configurations and software updates should be addressed when it is most needed to fight cyber-crime and ensure data privacy. This book addresses the cybersecurity challenges associated with smart cities, aiming to provide a bigger picture of the concepts, intelligent techniques, practices and research directions in this area. Furthermore, this book serves as a single source of reference for acquiring knowledge on the technology, processes and people involved in the next-generation of cyber-smart cities.
This book emphasizes recent advances in the creation of biometric identification systems for various applications in the field of human activity. The book displays the problems that arise in modern systems of biometric identification, as well as the level of development and prospects for the introduction of biometric technologies. The authors classify biometric technologies into two groups, distinguished according to the type of biometric characteristics used. The first group uses static biometric parameters: fingerprints, hand geometry, retina pattern, vein pattern on the finger, etc. The second group uses dynamic parameters for identification: the dynamics of the reproduction of a signature or a handwritten keyword, voice, gait, dynamics of work on the keyboard, etc. The directions of building information systems that use automatic personality identification based on the analysis of unique biometric characteristics of a person are discussed. The book is intended for professionals working and conducting research in the field of intelligent information processing, information security, and robotics and in the field of real-time identification systems. The book contains examples and problems/solutions throughout.
This book focuses on how real-time task schedules for reconfigurable hardware-based embedded platforms may be affected due to the vulnerability of hardware and proposes self-aware security strategies to counteract the various threats. The emergence of Industry 4.0 has witnessed the deployment of reconfigurable hardware or field programmable gate arrays (FPGAs) in diverse embedded applications. These are associated with the execution of several real-time tasks arranged in schedules. However, they are associated with several issues. Development of fully and partially reconfigurable task schedules are discussed that eradicates the existing problems. However, such real-time task schedules may be jeopardized due to hardware threats. Analysis of such threats is discussed and self-aware security techniques are proposed that can detect and mitigate such threats at runtime.
This book includes topics in nanophysics, nanotechnology, nanomaterials, sensors, biosensors, security systems, and CBRN agents detection. There have been many significant advances in the past two years and some entirely new directions of research are just opening up. Recent developments in nanotechnology and measurement techniques now allow experimental investigation of the physical properties of nanostructured materials. The book presents new methods for the detection of chemical, biological, radiological and nuclear (CBRN) agents using chemical and biochemical sensors. Identification, protection and decontamination are the main scientific and technological responses for the modern challenges of CBRN agents.
Lessons Learned from Afghanistan: America's Longest War examines the lessons of how America's "longest war" came to an ignominious end with staggering consequences for the United States and the Afghan nation. Afghanistan today faces an unprecedented humanitarian crisis, looming threat of a civil war and a resurgence of violent extremism organizations similar to pre-9/11. As the U.S. enters a new era in the strategic geopolitical Great Power Competition, an analysis of the original mission intent, shifting policy and strategic objectives, and ineffective implementation of security, political and economic programs reveal critical lessons and questions such as: What led to the "strategic failure" of the U.S. in Afghanistan? What decisions resulted in the present-day humanitarian, civil, and political crises in Afghanistan? Were these consequences in fact avoidable? Was there an alternative approach that could have maintained the hard-fought gains of the last two decades, and better demonstrated America's standing as a defender of global human rights? Lessons Learned from Afghanistan: America's Longest War further explores lessons of the past negotiations between the United States, Taliban, and former U.S. backed Afghan government to suggest alternative pathways that honor the original intent of the mission and meet present-day obligations to an Afghan nation in crisis.
Infrared thermography is a measurement technique that enables to obtain non intrusive measurements of surface temperatures. One of the interesting features of this technique is its ability to measure a full two dimensional map of the surface temperature and for this reason it has been widely used as a flow visualization technique. Since the temperature measurements can be extremely accurate it is possible, by using a heat flux sensor, also to measure convective heat transfer coefficient distributions on a surface making the technique de facto quantitative. This book, starting from the basic theory of infrared thermography and heat flux sensor guides, both the experienced researcher and the young student, in the correct application of this powerful technique to various practical problems. A significant number of examples and applications are also examined in detail.
This textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and sbilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management.
This PhD sought to determine the mechanisms for the reactor explosions by mapping, collecting and analysing samples from across the area of Japan that received radioactive fallout from the explosions. In doing this, the author conducted significant fieldwork in the restricted-access fallout zone using ground and novel UAV-based mapping of radiation to identify hot-spot areas for sample collecting but also using these tools to verify the efficacy of the clean-up operations ongoing in the prefecture. Such fieldwork was both technically pioneering for its use of UAVs (drones) but also selfless in terms of bravely entering a nuclear danger area to collect samples for the greater benefit of the scientific community.
This book focuses on the thermal management technology of lithium-ion batteries for vehicles. It introduces the charging and discharging temperature characteristics of lithium-ion batteries for vehicles, the method for modeling heat generation of lithium-ion batteries, experimental research and simulation on air-cooled and liquid-cooled heat dissipation of lithium-ion batteries, lithium-ion battery heating method based on PTC and wide-line metal film, self-heating using sinusoidal alternating current. This book is mainly for practitioners in the new energy vehicle industry, and it is suitable for reading and reference by researchers and engineering technicians in related fields such as new energy vehicles, thermal management and batteries. It can also be used as a reference book for undergraduates and graduate students in energy and power, electric vehicles, batteries and other related majors.
The topics discussed at the NATO Advanced Research Workshop Nanotechnology in the Security Systems" included nanophysics, nanotechnology, nanomaterials, sensors, biosensors security systems, explosivedetection. There have been many significant advances in the past two years and some entirely new directions of research are just opening up.Recent advances in nano science have demonstrated that fundamentally new physical phenomena are found when systems are reduced in size with dimensions, comparable to the fundamental microscopic length scales of the investigated material. Recent developments in nanotechnology and measurement techniques now allow experimental investigation of transport properties of nano devices. This work will be of interest to researchers working in spintronics, molecular electronicsand quantum information processing."
Nuclear Safeguards, Security and Nonproliferation: Achieving Security with Technology and Policy, Second Edition is a comprehensive reference covering the cutting-edge technologies used to trace, track and safeguard nuclear material. Sections cover security, the illicit trafficking of nuclear materials, improvised nuclear devices, and how to prevent nuclear terrorism. International case studies of security at nuclear facilities and illegal nuclear trade activities provide specific examples of the complex issues surrounding the technology and policy for nuclear material protection, control and accountability. New case studies include analyses of nuclear programs of important countries, such as North Korea, Iran, and Kazakhstan, among others. This is a thoroughly updated, must-have volume for private and public organizations involved in driving national security, domestic and international policy issues relating to nuclear material security, non-proliferation, and nuclear transparency.
In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks. The author first briefly introduces Sun Tzu. Then each chapter in the book takes its inspiration from an original title in The Art of War, where the author offers a general introduction to the content and then describes its application in a cybersecurity setting. These chapters cover estimates; waging war; offensive strategy; how you prepare for an attack; energy; weaknesses and strengths; the variables that need consideration before embarking on a war; how infrastructure is related to the concept of ground; attack by fire or how skilled attackers hide behind noise; and employing secret agents. The book will be interesting for computer security researchers and professionals who would like some grounding in a security mindset.
Global security threats have created a complex risk landscape that is challenging and transforming society. These global security issues intersect and influence the political, economic, social, technological, ecological and legal dimensions of the complex risk landscape and are now transborder thereby becoming national security issues. Accessing the innovation space to support safety, security and defence capabilities is critical in order to mitigate new and evolving threats. Through real-world examples of innovation, this book provides a detailed examination of the innovation space as it pertains to the application of S&T to safety and security threats and challenges. This book is of most interest to public and private sector innovators as well as academician and graduate students working in the safety and security domain.
This open access book is a pedagogical, examples-based guide to using the Monte Carlo N-Particle (MCNP (R)) code for nuclear safeguards and non-proliferation applications. The MCNP code, general-purpose software for particle transport simulations, is widely used in the field of nuclear safeguards and non-proliferation for numerous applications including detector design and calibration, and the study of scenarios such as measurement of fresh and spent fuel. This book fills a gap in the existing MCNP software literature by teaching MCNP software usage through detailed examples that were selected based on both student feedback and the real-world experience of the nuclear safeguards group at Los Alamos National Laboratory. MCNP input and output files are explained, and the technical details used in MCNP input file preparation are linked to the MCNP code manual. Benefiting from the authors' decades of experience in MCNP simulation, this book is essential reading for students, academic researchers, and practitioners whose work in nuclear physics or nuclear engineering is related to non-proliferation or nuclear safeguards. Each chapter comes with downloadable input files for the user to easily reproduce the examples in the text.
Introduction to Security, Tenth Edition, provides an overview of the security industry with an emphasis on the theories of security and loss prevention that have shaped the profession. Security is covered in totality, providing readers with a glimpse of the various and diverse components that make up the security function. This updated book is the latest edition in what has historically been the go-to textbook on the subject for more than 30 years. While this fully updated edition continues to utilize the basic concepts that have made this text the premier primer in the security field, it also focuses heavily on current and future security issues. |
![]() ![]() You may like...
Introduction to Data Systems - Building…
Thomas Bressoud, David White
Hardcover
R2,423
Discovery Miles 24 230
Advanced Computer and Communication…
Hamzah Asyrani Sulaiman, Mohd Azlishah Othman, …
Hardcover
R5,842
Discovery Miles 58 420
Information and Communication Technology…
Simon Fong, Shyam Akashe, …
Hardcover
R5,756
Discovery Miles 57 560
New Developments in Unsupervised Outlier…
Xiaochun Wang, Xiali Wang, …
Hardcover
R4,932
Discovery Miles 49 320
Challenges in Computational Statistics…
Stan Matwin, Jan Mielniczuk
Hardcover
Contemporary Experimental Design…
Jianqing Fan, Jian-Xin Pan
Hardcover
R5,148
Discovery Miles 51 480
Evolutionary Data Clustering: Algorithms…
Ibrahim Aljarah, Hossam Faris, …
Hardcover
R5,106
Discovery Miles 51 060
Stream Data Mining: Algorithms and Their…
Leszek Rutkowski, Maciej Jaworski, …
Hardcover
R4,936
Discovery Miles 49 360
Health Informatics: A Computational…
Ripon Patgiri, Anupam Biswas, …
Hardcover
R5,628
Discovery Miles 56 280
|