Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems
This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners.
The emergence of intelligent technologies, sophisticated natural language processing methodologies and huge textual repositories, invites a new approach for the challenge of automatically identifying personality dimensions through the analysis of textual data. This short book aims to (1) introduce the challenge of computational personality analysis, (2) present a unique approach to personality analysis and (3) illustrate this approach through case studies and worked-out examples. This book is of special relevance to psychologists, especially those interested in the new insights offered by new computational and data-intensive tools, and to computational social scientists interested in human personality and language processing.
This book provides readers a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for electronic warfare and defensive countermeasures in military contexts. It explains in detail the theoretical and technical background, and addresses all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne / spaceborne electronic warfare, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, to date only limited information has been available on its use in electronic warfare systems, especially in developing nations. Addressing that need, this book offers essential engineering guidelines that especially focus on the speed and reliability of current-generation SiGe circuits and highlight emerging innovations that help to ensure the sustainable long-term integration of SiGe into electronic warfare systems.
This book is the first one addressing quantum information from the viewpoint of group symmetry. Quantum systems have a group symmetrical structure. This structure enables to handle systematically quantum information processing. However, there is no other textbook focusing on group symmetry for quantum information although there exist many textbooks for group representation. After the mathematical preparation of quantum information, this book discusses quantum entanglement and its quantification by using group symmetry. Group symmetry drastically simplifies the calculation of several entanglement measures although their calculations are usually very difficult to handle. This book treats optimal information processes including quantum state estimation, quantum state cloning, estimation of group action and quantum channel etc. Usually it is very difficult to derive the optimal quantum information processes without asymptotic setting of these topics. However, group symmetry allows to derive these optimal solutions without assuming the asymptotic setting. Next, this book addresses the quantum error correcting code with the symmetric structure of Weyl-Heisenberg groups. This structure leads to understand the quantum error correcting code systematically. Finally, this book focuses on the quantum universal information protocols by using the group SU(d). This topic can be regarded as a quantum version of the Csiszar-Korner's universal coding theory with the type method. The required mathematical knowledge about group representation is summarized in the companion book, Group Representation for Quantum Theory.
This innovative volume gathers some of the world's best scholars to analyse the world's collective international efforts to address globalised threats through global security governance. Addressing global and planetary forms of insecurity that include nuclear weapons, conventional arms, gender violence, climate change, disease, bio weapons, cyber-conflict, children in conflict, crimes against humanity, and refugees, this timely book critiques how they are addressed by global institutions and regimes, and advocates important conceptual, institutional, and policy reforms. This is an invaluable resource for students, scholars and policymakers in international health, security and development.
This book addresses the challenge of reforming defense and military policy-making in newly democratized nations. By tracing the development of civil-military relations in various new democracies from a comparative perspective, it links two bodies of scholarship that thus far have remained largely separate: the study of emerging (or failed) civilian control over armed forces on the one hand; and work on the roots and causes of military effectiveness to guarantee the protection and security of citizens on the other. The empirical and theoretical findings presented here will appeal to scholars of civil-military relations, democratization and security issues, as well as to defense policy-makers.
This book covers the topics of theoretical principles, dynamics model and algorithm, mission analysis, system design and experimental studies of space nets system, aiming to provide an initial framework in this field and serve as a ready reference for those interested. Space nets system represents a forefront field in future development of aerospace technologies. However, it involves new challenges and problems such as nonlinear and distorted nets structure, complex rigid flexible coupling dynamics, orbital transfer of space flexible composite and dynamics control. Currently, no comprehensive books on space nets dynamics and design are available, so potential readers can get to know the working mechanism, dynamics elements, and mission design of the space nets system from a Chinese perspective.
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.
This book includes topics in nanophysics, nanotechnology, nanomaterials, sensors, biosensors, security systems, and CBRN agents detection. There have been many significant advances in the past two years and some entirely new directions of research are just opening up. Recent developments in nanotechnology and measurement techniques now allow experimental investigation of the physical properties of nanostructured materials. The book presents new methods for the detection of chemical, biological, radiological and nuclear (CBRN) agents using chemical and biochemical sensors. Identification, protection and decontamination are the main scientific and technological responses for the modern challenges of CBRN agents.
This volume constitutes the state-of-the-art in active interrogation, widely recognized as indispensable methods for addressing current and future nuclear security needs. Written by a leading group of science and technology experts, this comprehensive reference presents technologies and systems in the context of the fundamental physics challenges and practical requirements. It compares the features, limitations, technologies, and impact of passive and active measurement techniques; describes radiation sources for active interrogation including electron and ion accelerators, intense lasers, and radioisotope-based sources; and it describes radiation detectors used for active interrogation. Entire chapters are devoted to data acquisition and processing systems, modeling and simulation, data interpretation and algorithms, and a survey of working active measurement systems. Active Interrogation in Nuclear Security is structured to appeal to a range of audiences, including graduate students, active researchers in the field, and policy analysts. The first book devoted entirely to active interrogation Presents a focused review of the relevant physics Surveys available technology Analyzes scientific and technology trends Provides historical and policy context Igor Jovanovic is a Professor of Nuclear Engineering and Radiological Sciences at the University of Michigan and has previously also taught at Penn State University and Purdue University. He received his Ph.D. from University of California, Berkeley and worked as physicist at Lawrence Livermore National Laboratory. Dr. Jovanovic has made numerous contributions to the science and technology of radiation detection, as well as the radiation sources for use in active interrogation in nuclear security. He has taught numerous undergraduate and graduate courses in areas that include radiation detection, nuclear physics, and nuclear security. At University of Michigan Dr. Jovanovic is the director of Neutron Science Laboratory and is also associated with the Center for Ultrafast Optical Science. Anna Erickson is an Assistant Professor in the Nuclear and Radiological Engineering Program of the G.W. Woodruff School of Mechanical Engineering at Georgia Institute of Technology. Previously, she was a postdoctoral researcher in the Advanced Detectors Group at Lawrence Livermore National Laboratory. Dr. Erickson received her PhD from Massachusetts Institute of Technology with a focus on radiation detection for active interrogation applications. Her research interests focus on nuclear non-proliferation including antineutrino analysis and non-traditional detector design and characterization. She teaches courses in advanced experimental detection for reactor and nuclear nonproliferation applications, radiation dosimetry and fast reactor analysis.
This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as cancellable biometrics and soft biometrics. The book also focuses on several emerging topics such as big data issues, internet of things, medical biometrics, healthcare, and robot-human interactions. The authors show how these new applications have triggered a number of new biometric approaches. They show, as an example, how fuzzy extractor has become a useful tool for key generation in biometric banking, and vein/heart rates from medical records can also be used to identify patients. The contributors cover the topics, their methods, and their applications in depth.
This open access book focuses on investigating predicting precursor information and key points of rockburst in mining engineering through laboratory experiment, theoretical analysis, numerical simulation and case studies. Understanding the evolution patterns for the microstructure instability of rock is a prerequisite for rockburst prediction. The book provides a guide for readers seeking to understand the evolution patterns for the microstrucure of rock failure, the predicting key point of rock failure and the rockburst predicting model. It will be an essential reference to understand mechanism of rockburst and sheds new light on dynamic disasters prediction. Chapters are carefully developed to cover (1) The evolution patterns for the microstructure instability of rock; (2) Rockburst hazard monitoring and predicting criterion and predicting models. The book addresses the issue with a holistic and systematic approach that investigates the occurrence mechanism of rockburst based on the evolution patterns for the microstructure of rock failure and establishes the predicting model of rockburst. This book will be of interest to researchers of mining engineering, rock mechanics engineering and safety engineering.
This book systematically studies how game theory can be used to improve security in chemical industrial areas, capturing the intelligent interactions between security managers and potential adversaries. The recent unfortunate terrorist attacks on critical infrastructures show that adversaries are intelligent and strategic. Game theoretic models have been extensively used in some domains to model these strategic adversaries. However, there is a lack of such advanced models to be employed by chemical security managers. In this book, game theoretic models for protecting chemical plants as well as clusters are proposed. Different equilibrium concepts are explored, with user-friendly explanation of how to reflect them to realistic cases. Based on efficient analysis of the properties of security issues in chemical plants/clusters, models in this book are capable to support resources allocations, cost-effectiveness analysis, cooperation incentives and alike.
This book investigates the susceptibility of intrinsic physically unclonable function (PUF) implementations on reconfigurable hardware to optical semi-invasive attacks from the chip backside. It explores different classes of optical attacks, particularly photonic emission analysis, laser fault injection, and optical contactless probing. By applying these techniques, the book demonstrates that the secrets generated by a PUF can be predicted, manipulated or directly probed without affecting the behavior of the PUF. It subsequently discusses the cost and feasibility of launching such attacks against the very latest hardware technologies in a real scenario. The author discusses why PUFs are not tamper-evident in their current configuration, and therefore, PUFs alone cannot raise the security level of key storage. The author then reviews the potential and already implemented countermeasures, which can remedy PUFs' security-related shortcomings and make them resistant to optical side-channel and optical fault attacks. Lastly, by making selected modifications to the functionality of an existing PUF architecture, the book presents a prototype tamper-evident sensor for detecting optical contactless probing attempts.
This thesis describes novel devices for the secure identification of objects or electronic systems. The identification relies on the the atomic-scale uniqueness of semiconductor devices by measuring a macroscopic quantum property of the system in question. Traditionally, objects and electronic systems have been securely identified by measuring specific characteristics: common examples include passwords, fingerprints used to identify a person or an electronic device, and holograms that can tag a given object to prove its authenticity. Unfortunately, modern technologies also make it possible to circumvent these everyday techniques. Variations in quantum properties are amplified by the existence of atomic-scale imperfections. As such, these devices are the hardest possible systems to clone. They also use the least resources and provide robust security. Hence they have tremendous potential significance as a means of reliably telling the good guys from the bad.
In this book, the authors present their theoretical, experimental and numerical investigations into concrete structures subjected to projectile and aircraft impacts in recent years. Innovative approaches to analyze the rigid, mass abrasive and eroding projectile penetration and perforation are proposed. Damage and failure analyses of nuclear power plant containments impacted by large commercial aircrafts are numerically and experimentally analyzed. Ultra-high performance concrete materials and structures against the projectile impact are developed and their capacities of resisting projectile impact are evaluated. This book is written for the researchers, engineers and graduate students in the fields of protective structures and terminal ballistics.
Safety and Security Studies is an interdisciplinary area of research and this book includes specially selected papers. These papers encompass the work of engineers, scientists, field researchers and other specialists involved in one or more of the theoretical and practical aspects of safety and security. Due to the interdisciplinary nature of this field it forms an area of research and application that brings together in a systematic way, many disciplines of engineering, from the traditional to the most technologically advanced. This volume covers topics such as crisis management, security engineering, natural and man-made disasters and emergencies, risk management, and control, protection and mitigation issues.
This book details some of the major developments in the implementation of compressive sensing in radio applications for electronic defense and warfare communication use. It provides a comprehensive background to the subject and at the same time describes some novel algorithms. It also investigates application value and performance-related parameters of compressive sensing in scenarios such as direction finding, spectrum monitoring, detection, and classification.
This book presents the study, design, modulation, optimization and implementation of low power, passive DT- Ms for use in audio applications. The high gain and bandwidth amplifier normally used for integration in modulation, is replaced by passive, switched-capacitor branches working under the Ultra Incomplete Settling (UIS) condition, leading to a reduction of the consumed power. The authors describe a design process that uses high level models and an optimization process based in genetic algorithms to achieve the desired performance.
The book analyses the risks of nuclear power stations. The security concept of reactors is explained. Measures against the spread of radioactivity after a severe accident, accidents of core melting and a possible crash of an air plane on reactor containment are discussed. The book covers three scientific subjects of the safety concepts of Light Water Reactors: - A first part describes the basic safety design concepts of operating German Pressurized Water Reactors and Boiling Water Reactors including accident management measures introduced after the reactor accidents of Three Mile Island and Chernobyl. These safety concepts are also compared with the experiences of the Fukushima accidents. In addition, the safety design concepts of the future modern European Pressurized Water Reactor (EPR) and of the future modern Boiling Water Reactor SWR-1000 (KERENA) are presented. These are based on new safety research results of the past decades. - In a second, part the possible crash of military or heavy commercial air planes on reactor containment is analyzed. It is shown that reactor containments can be designed to resist to such an airplane crash. - In a third part, an online decision system is presented. It allows to analyze the distribution of radioactivity in the atmosphere and to the environment after a severe reactor accident. It provides data for decisions to be taken by authorities for the minimization of radiobiological effects to the population. This book appeals to readers who have an interest in save living conditions and some understanding for physics or engineering.
This volume addresses the challenges associated with methodology and application of risk and resilience science and practice to address emerging threats in environmental, cyber, infrastructure and other domains. The book utilizes the collective expertise of scholars and experts in industry, government and academia in the new and emerging field of resilience in order to provide a more comprehensive and universal understanding of how resilience methodology can be applied in various disciplines and applications. This book advocates for a systems-driven view of resilience in applications ranging from cyber security to ecology to social action, and addresses resilience-based management in infrastructure, cyber, social domains and methodology and tools. Risk and Resilience has been written to open up a transparent dialog on resilience management for scientists and practitioners in all relevant academic disciplines and can be used as supplement in teaching risk assessment and management courses.
Video monitoring has become a vital aspect within the global society as it helps prevent crime, promote safety, and track daily activities such as traffic. As technology in the area continues to improve, it is necessary to evaluate how video is being processed to improve the quality of images. Applied Video Processing in Surveillance and Monitoring Systems investigates emergent techniques in video and image processing by evaluating such topics as segmentation, noise elimination, encryption, and classification. Featuring real-time applications, empirical research, and vital frameworks within the field, this publication is a critical reference source for researchers, professionals, engineers, academicians, advanced-level students, and technology developers.
This book presents advanced technologies used in practice to enable early recognition and tracking of various threats to national security. It discusses practical applications, examples and recent challenges in the application fields using sophisticated sensory devices, embedded designs and airborne and ground unmanned vehicles. Undeniably rapid advances in the development of sophisticated sensory devices, significant increases of computing power available to embedded designs and the development of airborne and ground unmanned vehicles offer almost unlimited possibilities for fighting various types of pathologies affecting our societies. The book provides scientists, researchers, engineers and graduate students involved in computer vision, image processing, data fusion, control algorithms, mechanics, data mining, navigation and integrated circuit (IC) with numerous valuable, useful and practical suggestions and solutions.
This book follows the methodologies of complex adaptive systems research in their application to addressing the problems of terrorism, specifically terrorist networks, their structure and various methods of mapping and interdicting them as well as exploring the complex landscape of network-centric and irregular warfare. A variety of new models and approaches are presented here, including Dynamic Network Analysis, DIME/PMESII models, percolation models and emergent models of insurgency. In addition, the analysis is informed by practical experience, with analytical and policy guidance from authors who have served within the U.S. Department of Defense, the British Ministry of Defence as well as those who have served in a civilian capacity as advisors on terrorism and counter-terrorism.
This book summarizes science and technology of a new generation of high-energy andinsensitive explosives. The objective is to provide professionals with comprehensiveinformation on the synthesis and the physicochemical and detonation properties ofthe explosives. Potential technologies applicable for treatment of contaminated wastestreams from manufacturing facilities and environmental matrices are also be included.This book provides the reader an insight into the depth and breadth of theoreticaland empirical models and experimental techniques currently being developed in thefield of energetic materials. It presents the latest research by DoD engineers andscientists, and some of DoD's academic and industrial researcher partners. The topicsexplored and the simulations developed or modified for the purposes of energetics mayfind application in other closely related fields, such as the pharmaceutical industry.One of the key features of the book is the treatment of wastewaters generated duringmanufacturing of these energetic materials. |
You may like...
Human Factors in Auditory Warnings
Judy Edworthy, Neville A. Stanton
Hardcover
R3,571
Discovery Miles 35 710
Handbook of Surveillance Technologies
Pamela Taylor, J. K. Petersen
Hardcover
R4,711
Discovery Miles 47 110
Physical Security 150 Things You Should…
Lawrence Fennelly, Louis Tyska
Paperback
Process Operational Safety and…
Zhe Wu, Panagiotis D. Christofides
Hardcover
R2,609
Discovery Miles 26 090
|