0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (3)
  • R500+ (320)
  • -
Status
Format
Author / Contributor
Publisher

Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems

Introduction to Public Key Infrastructures (Hardcover, 2013 ed.): Johannes A. Buchmann, Evangelos Karatsiolis, Alexander... Introduction to Public Key Infrastructures (Hardcover, 2013 ed.)
Johannes A. Buchmann, Evangelos Karatsiolis, Alexander Wiesmaier
R2,881 Discovery Miles 28 810 Ships in 12 - 17 working days

The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC.

In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI.

This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.

CCTV for Security Professionals (Hardcover): Alan Matchett CCTV for Security Professionals (Hardcover)
Alan Matchett
R2,742 Discovery Miles 27 420 Ships in 12 - 17 working days

CCTV for Security Professionals provides the information necessary to design the ideal CCTV system. The chapters are stand-alone sources of information on their subjects and are presented in logical sequence to guide the reader from basic principles to more complex for a complete system understanding.
In his straight-forward and informative text, Alan Matchett approaches the camera systems from the user's point of view, providing the security manager with the knowledge to discuss the system, its desired features, and the areas of design concern within the context of an organization's business model. This can prove to be invaluable when evaluating an existing system, the use and components of a given system, or in evaluating a system design proposed by a vendor.
Installers and service personnel will benefit from the functions and possibilities that are available with the various components and by gaining an understanding of their customers' needs. Newer technicians will learn how to set up the system properly, and can familiarize themselves with the technologies that go into a CCTV system.
Security equipment sales personnel will also gain a better knowledge of the customer's needs as well as learn to determine exactly what questions they should be asking the customer and what the customer's responses mean. In this manner, the book will offer invaluable tips to ensure customers get exactly what they expect in a system.
* Provides a detailed explanation of CCTV components and the technology behind analog and digital CCTV systems.
* Establishes a "common language" for security professionals, CCTV system designers and sales personnel to use as a basis for system design.
* Provides a clear explanation of the design process and design principles.

Road Vehicle Automation 8 (Hardcover, 1st ed. 2022): Gereon Meyer, Sven Beiker Road Vehicle Automation 8 (Hardcover, 1st ed. 2022)
Gereon Meyer, Sven Beiker
R5,330 Discovery Miles 53 300 Ships in 10 - 15 working days

This book is the eight volume of a sub-series on Road Vehicle Automation, published as part of the Lecture Notes in Mobility. Written by researchers, engineers and analysts from around the globe, the contributions are based on oral and poster presentations from the Automated Vehicles Symposium (AVS) 2020, held on July 27-30, 2020, as a fully virtual event. The book explores public sector activities, human factors aspects, vehicle systems and other related technological developments, as well as transportation infrastructure planning, which are expect to foster and support road vehicle automation.

A Group Theoretic Approach to Quantum Information (Hardcover, 1st ed. 2017): Masahito Hayashi A Group Theoretic Approach to Quantum Information (Hardcover, 1st ed. 2017)
Masahito Hayashi
R2,394 Discovery Miles 23 940 Ships in 12 - 17 working days

This book is the first one addressing quantum information from the viewpoint of group symmetry. Quantum systems have a group symmetrical structure. This structure enables to handle systematically quantum information processing. However, there is no other textbook focusing on group symmetry for quantum information although there exist many textbooks for group representation. After the mathematical preparation of quantum information, this book discusses quantum entanglement and its quantification by using group symmetry. Group symmetry drastically simplifies the calculation of several entanglement measures although their calculations are usually very difficult to handle. This book treats optimal information processes including quantum state estimation, quantum state cloning, estimation of group action and quantum channel etc. Usually it is very difficult to derive the optimal quantum information processes without asymptotic setting of these topics. However, group symmetry allows to derive these optimal solutions without assuming the asymptotic setting. Next, this book addresses the quantum error correcting code with the symmetric structure of Weyl-Heisenberg groups. This structure leads to understand the quantum error correcting code systematically. Finally, this book focuses on the quantum universal information protocols by using the group SU(d). This topic can be regarded as a quantum version of the Csiszar-Korner's universal coding theory with the type method. The required mathematical knowledge about group representation is summarized in the companion book, Group Representation for Quantum Theory.

Counter-Terrorism Technologies - A Critical Assessment (Hardcover, 1st ed. 2019): Peter Lehr Counter-Terrorism Technologies - A Critical Assessment (Hardcover, 1st ed. 2019)
Peter Lehr
R3,809 Discovery Miles 38 090 Ships in 10 - 15 working days

This book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future. The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies - weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that promise an increase in safety and security when it comes to the dangers posed by these terrorists. This part also includes a critical discussion of advantages and disadvantages of such technologies that are, quite often, sold as a 'silver bullet' approach in the fight against terrorism. Controversies such as those triggered by the abuse of millimeter wave scanners deployed at several Western European airports will demonstrate that there are costs involved with regard to human rights. The third, analytical part takes the critical discussion further by arguing that the uncritical fielding of new surveillance and control technologies in parallel with the on-going outsourcing and privatization of key services of the state could well lead to dystopias as envisaged in a rather prescient way by the so-called cyperpunk novels of the 1980s. The book concludes with the question that any liberal democracy should ask itself: how far can we go with regard to hardening our societies against terrorist threats?

Don't Tell the Boss! - How Poor Communication on Risks within Organizations Causes Major Catastrophes (Hardcover, 1st ed.... Don't Tell the Boss! - How Poor Communication on Risks within Organizations Causes Major Catastrophes (Hardcover, 1st ed. 2022)
Dmitry Chernov, Didier Sornette, Giovanni Sansavini, Ali Ayoub
R1,224 R1,045 Discovery Miles 10 450 Save R179 (15%) Ships in 10 - 15 working days

The book reviews existing research on the challenges of voice and silence in organizations. After a major disaster, when investigators are piecing together the story of what happened, a striking fact often emerges: before disaster struck, some people in the organization involved were aware of dangerous conditions that had the potential to escalate to a critical level. But for a variety of reasons, this crucial information did not reach decision-makers. So, the organization moved ever closer to catastrophe, effectively unaware of the possible threat-despite the fact that some of its employees could see it coming. What is the problem with communication about risk in an organization, and why does this problem exist? What stops people in organizations or project teams from freely reporting and discussing critical risks? This book seeks to answer these questions, starting from a deep analysis of 20 disasters where the concealment of risks played a major part. These case studies are drawn from around the world and span a range of industries: civil nuclear power, coal, oil and gas production, hydropower energy, metals and mining, space exploration, transport, finance, retail manufacturing and even the response of governments to wars, famines and epidemics. Together, case studies give an insight into why people hesitate to report risks-and even when they do, why their superiors often prefer to ignore the news. The book reviews existing research on the challenges of voice and silence in organizations. This helps to explain more generally why people dread passing on bad news to others-and why in the workplace they prefer to keep quiet about unpleasant facts or potential risks when they are talking to superiors and colleagues. The discussion section of the book includes important examples of concealment within the Chinese state hierarchy as well as by leading epidemiologists and governments in the West during the novel coronavirus outbreak in Wuhan in 2019-2020. The full picture of the very early stage of the COVID-19 pandemic remains unclear, and further research is obviously needed to better understand what motivated some municipal, provincial and national officials in China as well as Western counterparts to obfuscate facts in their internal communications about many issues associated with the outbreak.

Integrating Safety and Security Management to Protect Chemical Industrial Areas from Domino Effects (Hardcover, 1st ed. 2022):... Integrating Safety and Security Management to Protect Chemical Industrial Areas from Domino Effects (Hardcover, 1st ed. 2022)
Chao Chen, Genserik Reniers, Ming Yang
R4,667 Discovery Miles 46 670 Ships in 12 - 17 working days

This book provides insight into domino effects in industrial chemical sites and process industries. It is about the integration of safety and security resources to prevent and mitigate domino effects in the process industries. It explains how chemical industrial areas, comprised of various hazardous installations, are susceptible to a chain of undesired events, or domino effects, triggered by accidental events or intentional attacks and then presents solutions to prevent them. Firstly, the book provides a dynamic graph approach to model the domino effects induced by accidental fire or intentional fire, considering the spatial-temporal evolution of fires. Then, a dynamic risk assessment method based on a discrete dynamic event tree is proposed to assess the likelihood of VCEs and the vulnerability of installations, addressing the time dependencies in vapor cloud dispersion and the uncertainty of delayed ignitions. A dynamic methodology based on dynamic graphs and Monte Carlo is provided to assess the vulnerability of individuals and installations exposed to multi-hazards, such as fire, explosion and toxic release during escalation events. Based on these domino effect models, an economic approach is developed to integrate safe and security resources, obtaining the most cost-benefit protection strategy for preventing domino effects. Finally, a resilience-based approach is provided to find out the most cost-resilient way to protect chemical industrial areas, addressing possible domino effects. This integrated approach will be of interest to researchers, industrial engineers, chemical engineers and safety managers and will help professionals to new solutions in the area of safety and security.

CCTV Surveillance - Video Practices and Technology (Hardcover, 2nd edition): Herman Kruegle CCTV Surveillance - Video Practices and Technology (Hardcover, 2nd edition)
Herman Kruegle
R3,194 Discovery Miles 31 940 Ships in 12 - 17 working days

This revision of the classic book on CCTV technology, " CCTV Surveillance, " provides a comprehensive examination of CCTV, covering the applications of various systems, how to design and install a system, and how to choose the right hardware. Taking into account the ever-changing advances in technology using digital techniques and the Internet, " CCTV Surveillance, Second Edition, " is completely updated with the recent advancements in digital cameras and digital recorders, remote monitoring via the Internet, and CCTV integration with other security systems.
Continuing in the celebrated tradition of the first edition, the second edition is written to serve as a useful resource for the end-user as well as the technical practitioner. Each chapter begins with an overview, and presents the latest information on the relevant equipment, describing the characteristics, features and application of each device. Coverage of aging or obsolete technology is reduced to a historical perspective, and eight brand new chapters cover digital video technology, multiplexers, integrated camera-lens-housing, smart domes, and rapid deployment CCTV systems.
* Serves as an indispensable resource on CCTV theory
* Includes eight new chapters on the use of digital components and other related technologies that have seen a recent explosion in use
* Fully illustrated, the book contains completely updated photographs and diagrams that represent the latest in CCTV technology advancements

Breakthroughs in Digital Biometrics and Forensics (Hardcover, 1st ed. 2022): Kevin Daimi, Guillermo Francia III, Luis Hernandez... Breakthroughs in Digital Biometrics and Forensics (Hardcover, 1st ed. 2022)
Kevin Daimi, Guillermo Francia III, Luis Hernandez Encinas
R3,094 Discovery Miles 30 940 Ships in 10 - 15 working days

This book focuses on a wide range of breakthroughs related to digital biometrics and forensics. The authors introduce the concepts, techniques, methods, approaches and trends needed by cybersecurity specialists and educators for keeping current their biometrics and forensics knowledge. Furthermore, the book provides a glimpse of future directions where biometrics and forensics techniques, policies, applications, and theories are headed. Topics include multimodal biometrics, soft biometrics, mobile biometrics, vehicle biometrics, vehicle forensics, integrity verification of digital content, people identification, biometric-based cybercrime investigation, among others. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse digital biometrics and forensics experts in the listed fields and edited by prominent biometrics and forensics researchers and specialists.

Practical School Security - Basic Guidelines for Safe and Secure Schools (Hardcover): Kenneth Trump Practical School Security - Basic Guidelines for Safe and Secure Schools (Hardcover)
Kenneth Trump
R1,574 Discovery Miles 15 740 Ships in 12 - 17 working days

"Covers every possible security issue. A practical, ?nuts-and bolts? approach with concrete ideas that are usable in all schools."
Larry Leapley, Principal
Trenton High School, Trenton, Michigan

"Practical, cost-effective security strategies. A great reference book!"
Chief John R. Fechko
Seven Hills Police Department, Ohio

If not ? and even if you think it is ? this book will help you

Recognize real threats to your school
Get past any political obstacles to securing your school
Conduct a security assessment and implement needed security procedures
Decide which security strategies work best for your school

Trump provides a well-thought-out, thorough guide to creating and implementing a workable safety and security plan for your school. The author covers all aspects of making (and keeping) a school safe and secure including internal school security, physical security, and the use of drug-sniffing dogs and metal detectors. He gives you practical, realistic advice you can use to make your school safer now.

You?ll find ideas for working with community leaders, police, parents, businesses, and political officials to improve school and community safety and security.

Read and use this guide to keep your students and your staff safe.


Statistical Reliability Engineering - Methods, Models and Applications (Hardcover, 1st ed. 2022): Hoang Pham Statistical Reliability Engineering - Methods, Models and Applications (Hardcover, 1st ed. 2022)
Hoang Pham
R3,304 Discovery Miles 33 040 Ships in 12 - 17 working days

This book presents the state-of-the-art methodology and detailed analytical models and methods used to assess the reliability of complex systems and related applications in statistical reliability engineering. It is a textbook based mainly on the author's recent research and publications as well as experience of over 30 years in this field. The book covers a wide range of methods and models in reliability, and their applications, including: statistical methods and model selection for machine learning; models for maintenance and software reliability; statistical reliability estimation of complex systems; and statistical reliability analysis of k out of n systems, standby systems and repairable systems. Offering numerous examples and solved problems within each chapter, this comprehensive text provides an introduction to reliability engineering graduate students, a reference for data scientists and reliability engineers, and a thorough guide for researchers and instructors in the field.

Design for Secure Residential Environments (Paperback): S. Crouch, Henry Shaftoe, Roy Fleming Design for Secure Residential Environments (Paperback)
S. Crouch, Henry Shaftoe, Roy Fleming
R1,217 Discovery Miles 12 170 Ships in 12 - 17 working days

There is currently a great deal of interest in crime prevention and how it can be reduced through better design. Design for a Secure Residential Environment provides the framework on which the risk of crime can be reduced through sensible design of the vulnerable parts of houses, community buildings and small commercial premises and the environment immediately surrounding the buildings. This book looks at how buildings should be assessed for security measures. It then looks at the design of external and communal areas, how lighting can improve security and then covers methods of making doors and windows secure. It describes various methods of electronic security and concludes with a chapter on how to plan and implement suitable security measures.

Human Factors in Auditory Warnings (Hardcover): Judy Edworthy, Neville A. Stanton Human Factors in Auditory Warnings (Hardcover)
Judy Edworthy, Neville A. Stanton
R4,132 Discovery Miles 41 320 Ships in 12 - 17 working days

First published in 1999, this book provides answers to many of the problems associated with the design and application of auditory warnings. It represents the position of contemporary auditory warnings research and development in a single unique volume. Application domains include air traffic control, aviation, emergency services, manufacturing, medicine, military and nuclear power. The contributors constitute many key experts in this area, some of whom are psychoacousticians, some psychologists and some ergonomists. Correspondingly, the chapters range from those covering basic topics such as audibility and localization of warnings, through psychological issues concerned with the relationship between design, understanding and the behavioural response, to the more general ergonomic issues of implementing the warnings in a particular context. Although each of the chapters takes a slightly different perspective, they all balance theoretical underpinning with practical application. The editors have undertaken to draw all of the contributions together by providing an overview of warnings research at the beginning of the book and summary of the contributions at the end. This book will appeal to all involved in the research, development, design and implementation of auditory warnings.

Electrician's Guide to Fire Detection and Fire Alarm Systems (Spiral bound, 3rd edition): The Institution of Engineering... Electrician's Guide to Fire Detection and Fire Alarm Systems (Spiral bound, 3rd edition)
The Institution of Engineering and Technology
R1,074 Discovery Miles 10 740 Ships in 9 - 15 working days

The Electrician's Guide to Fire Detection and Fire Alarm Systems, 3rd Edition is ideal for individuals involved in the design and installation of fire detection systems as part of electrical installations. It offers information, advice, and guidance on managing BS 7671 and BS 5839 requirements. This Guide is an essential publication for all fire alarm designers, installers, specifiers, electricians, electrical contractors, installation designers and students in further education and/or professional training. Key Features include: Ideal for individuals involved in the design and installation of fire detection systems as part of electrical installations Includes essential advice on special fire risk, systems design and integration, and installation competency Provides information, advice and guidance on managing BS 7671:2018 and BS 5839 requirements Updated to accommodate the changes, revisions and new information made to IET's 18th Edition, BS 7671:2018 regulations Updated to include changes, revision and new information added to the BS 5839-1 and BS 5839-6 requirements An essential publication for all fire alarm designers, installers, specifiers, electricians, electrical contractors, installation designers and students in further education and/or professional training

Handbook of Surveillance Technologies (Hardcover, 3rd edition): Pamela Taylor, J. K. Petersen Handbook of Surveillance Technologies (Hardcover, 3rd edition)
Pamela Taylor, J. K. Petersen
R5,145 Discovery Miles 51 450 Ships in 12 - 17 working days

From officially sanctioned, high-tech operations to budget spy cameras and cell phone video, this updated and expanded edition of a bestselling handbook reflects the rapid and significant growth of the surveillance industry. The Handbook of Surveillance Technologies, Third Edition is the only comprehensive work to chronicle the background and current applications of the full-range of surveillance technologies-offering the latest in surveillance and privacy issues. Cutting-Edge-updates its bestselling predecessor with discussions on social media, GPS circuits in cell phones and PDAs, new GIS systems, Google street-viewing technology, satellite surveillance, sonar and biometric surveillance systems, and emerging developments Comprehensive-from sonar and biometric surveillance systems to satellites, it describes spy devices, legislation, and privacy issues-from their historical origins to current applications-including recent controversies and changes in the structure of the intelligence community at home and abroad Modular-chapters can be read in any order-browse as a professional reference on an as-needed basis-or use as a text forSurveillance Studies courses Using a narrative style and more than 950 illustrations, this handbook will help journalists/newscasters, privacy organizations, and civic planners grasp technical aspects while also providing professional-level information for surveillance studies, sociology and political science educators, law enforcement personnel, and forensic trainees. It includes extensive resource information for further study at the end of each chapter. Covers the full spectrum of surveillance systems, including: Radar * Sonar * RF/ID * Satellite * Ultraviolet * Infrared * Biometric * Genetic * Animal * Biochemical * Computer * Wiretapping * Audio * Cryptologic * Chemical * Biological * X-Ray * Magnetic

Conflict and Complexity - Countering Terrorism, Insurgency, Ethnic and Regional Violence (Hardcover, 2015 ed.): Philip vos... Conflict and Complexity - Countering Terrorism, Insurgency, Ethnic and Regional Violence (Hardcover, 2015 ed.)
Philip vos Fellman, Yaneer Bar-Yam, Ali A. Minai
R3,689 Discovery Miles 36 890 Ships in 12 - 17 working days

This book follows the methodologies of complex adaptive systems research in their application to addressing the problems of terrorism, specifically terrorist networks, their structure and various methods of mapping and interdicting them as well as exploring the complex landscape of network-centric and irregular warfare. A variety of new models and approaches are presented here, including Dynamic Network Analysis, DIME/PMESII models, percolation models and emergent models of insurgency. In addition, the analysis is informed by practical experience, with analytical and policy guidance from authors who have served within the U.S. Department of Defense, the British Ministry of Defence as well as those who have served in a civilian capacity as advisors on terrorism and counter-terrorism.

Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms (Paperback, 1st ed. 2021): Krishnendu... Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms (Paperback, 1st ed. 2021)
Krishnendu Guha, Sangeet Saha, Amlan Chakrabarti
R2,993 Discovery Miles 29 930 Ships in 10 - 15 working days

This book focuses on how real-time task schedules for reconfigurable hardware-based embedded platforms may be affected due to the vulnerability of hardware and proposes self-aware security strategies to counteract the various threats. The emergence of Industry 4.0 has witnessed the deployment of reconfigurable hardware or field programmable gate arrays (FPGAs) in diverse embedded applications. These are associated with the execution of several real-time tasks arranged in schedules. However, they are associated with several issues. Development of fully and partially reconfigurable task schedules are discussed that eradicates the existing problems. However, such real-time task schedules may be jeopardized due to hardware threats. Analysis of such threats is discussed and self-aware security techniques are proposed that can detect and mitigate such threats at runtime.

Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems - The Fifth International Symposium on... Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems - The Fifth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (ISNPP) (Paperback, 1st ed. 2021)
Yang Xu, Yongbin Sun, Yanyang Liu, Feng Gao, Pengfei Gu, …
R4,722 Discovery Miles 47 220 Ships in 10 - 15 working days

This book is a compilation of selected papers from the fifth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in November 2020 in Beijing, China. The purpose of this symposium is to discuss Inspection, test, certification and research for the software and hardware of Instrument and Control (I&C) systems in nuclear power plants (NPP), such as sensors, actuators and control system. It aims to provide a platform of technical exchange and experience sharing for those broad masses of experts and scholars and nuclear power practitioners, and for the combination of production, teaching and research in universities and enterprises to promote the safe development of nuclear power plant. Readers will find a wealth of valuable insights into achieving safer and more efficient instrumentation and control systems.

The Great Power Competition Volume 1 - Regional Perspectives on Peace and Security (Paperback, 1st ed. 2021): Adib Farhadi,... The Great Power Competition Volume 1 - Regional Perspectives on Peace and Security (Paperback, 1st ed. 2021)
Adib Farhadi, Anthony J. Masys
R4,360 Discovery Miles 43 600 Ships in 10 - 15 working days

Over the past decade, the international political system has come to be characterized as a Great Power Competition in which multiple would-be hegemons compete for power and influence. Instead of a global climate of unchallenged United States dominance, revisionist powers, notably China and Russia alongside other regional powers, are vying for dominance through political, military, and economic means. A critical battleground in the Great Power Competition is the Middle East, the Horn of Africa, and the Central Asia South Asia (CASA), also known as the Central Region. With the planned withdrawal of U.S. military forces from Afghanistan, the U.S. has stated its intention of shifting attention away from the CASA Region in favor of a more isolationist foreign policy approach. This book provides an in-depth understanding of the implications for this shift related to regional diplomacy & politics, economic opportunities & rivalries, security considerations & interests, and the information environment. Amplifying the vital importance of success in the Central Region to U.S. prosperity and security, this volume advances dialogue in identifying key issues for stakeholders within and beyond the Central Region to gain a holistic perspective that better informs decision-making at various levels. This collection of work comes from scholars, strategic thinkers, and subject matter experts who participated in the Great Power Competition Conference hosted by the University of South Florida, in partnership with the National Defense University Near East South Asia Center for Strategic Strategies in January 2020.

Safety, Security and Privacy for Cyber-Physical Systems (Paperback, 1st ed. 2021): Riccardo M.G. Ferrari, Andre M. H. Teixeira Safety, Security and Privacy for Cyber-Physical Systems (Paperback, 1st ed. 2021)
Riccardo M.G. Ferrari, Andre M. H. Teixeira
R4,864 Discovery Miles 48 640 Ships in 10 - 15 working days

This book presents an in-depth overview of recent work related to the safety, security, and privacy of cyber-physical systems (CPSs). It brings together contributions from leading researchers in networked control systems and closely related fields to discuss overarching aspects of safety, security, and privacy; characterization of attacks; and solutions to detecting and mitigating such attacks. The book begins by providing an insightful taxonomy of problems, challenges and techniques related to safety, security, and privacy for CPSs. It then moves through a thorough discussion of various control-based solutions to these challenges, including cooperative fault-tolerant and resilient control and estimation, detection of attacks and security metrics, watermarking and encrypted control, privacy and a novel defense approach based on deception. The book concludes by discussing risk management and cyber-insurance challenges in CPSs, and by presenting the future outlook for this area of research as a whole. Its wide-ranging collection of varied works in the emerging fields of security and privacy in networked control systems makes this book a benefit to both academic researchers and advanced practitioners interested in implementing diverse applications in the fields of IoT, cooperative autonomous vehicles and the smart cities of the future.

Sensemaking for Security (Paperback, 1st ed. 2021): Anthony J. Masys Sensemaking for Security (Paperback, 1st ed. 2021)
Anthony J. Masys
R4,572 Discovery Miles 45 720 Ships in 10 - 15 working days

This book presents sensemaking strategies to support security planning and design. Threats to security are becoming complex and multifaceted and increasingly challenging traditional notions of security. The security landscape is characterized as 'messes' and 'wicked problems' that proliferate in this age of complexity. Designing security solutions in the face of interconnectedness, volatility and uncertainty, we run the risk of providing the right answer to the wrong problem thereby resulting in unintended consequences. Sensemaking is the activity that enables us to turn the ongoing complexity of the world into a "situation that is comprehended explicitly in words and that serves as a springboard into action" (Weick, Sutcliffe, Obstfeld, 2005). It is about creating an emerging picture of our world through data collection, analysis, action, and reflection. The importance of sensemaking to security is that it enables us to plan, design and act when the world as we knew it seems to have shifted. Leveraging the relevant theoretical grounding and thought leadership in sensemaking, key examples are provided, thereby illustrating how sensemaking strategies can support security planning and design. This is a critical analytical and leadership requirement in this age of volatility, uncertainty, complexity and ambiguity that characterizes the security landscape. This book is useful for academics, graduate students in global security, and government and security planning practitioners.

Beyond Fear - Thinking Sensibly About Security in an Uncertain World (Hardcover, 1st ed. 2003. Corr. 2nd printing 2006): Bruce... Beyond Fear - Thinking Sensibly About Security in an Uncertain World (Hardcover, 1st ed. 2003. Corr. 2nd printing 2006)
Bruce Schneier
R1,277 R1,069 Discovery Miles 10 690 Save R208 (16%) Ships in 10 - 15 working days

Why must we design security systems that work and fail well? Why are national ID cards a technically unsound, even dangerous idea? Why is buying online safe? Why should we definitely NOT invest in biometrics- based scanners for airports? Surprising assessments and advice from a leading security expert.Schneier, the highly regarded author of "Applied Cryptography and Secrets and Lies", turns his iconoclastic mind on the broader issues of security, including the vast infrastructure we already have in place, and the vaster systems -- some useful, others useless or worse -- that we're being asked to submit to and pay for. Rather than heavy-handed proselytizing, Schneier helps the reader to understand the issues at stake, and how to best come to one's own conclusions.

Process Operational Safety and Cybersecurity - A Feedback Control Approach (Paperback, 1st ed. 2021): Zhe Wu, Panagiotis D.... Process Operational Safety and Cybersecurity - A Feedback Control Approach (Paperback, 1st ed. 2021)
Zhe Wu, Panagiotis D. Christofides
R3,023 Discovery Miles 30 230 Ships in 10 - 15 working days

This book is focused on the development of rigorous, yet practical, methods for the design of advanced process control systems to improve process operational safety and cybersecurity for a wide range of nonlinear process systems. Process Operational Safety and Cybersecurity develops designs for novel model predictive control systems accounting for operational safety considerations, presents theoretical analysis on recursive feasibility and simultaneous closed-loop stability and safety, and discusses practical considerations including data-driven modeling of nonlinear processes, characterization of closed-loop stability regions and computational efficiency. The text then shifts focus to the design of integrated detection and model predictive control systems which improve process cybersecurity by efficiently detecting and mitigating the impact of intelligent cyber-attacks. The book explores several key areas relating to operational safety and cybersecurity including: machine-learning-based modeling of nonlinear dynamical systems for model predictive control; a framework for detection and resilient control of sensor cyber-attacks for nonlinear systems; insight into theoretical and practical issues associated with the design of control systems for process operational safety and cybersecurity; and a number of numerical simulations of chemical process examples and Aspen simulations of large-scale chemical process networks of industrial relevance. A basic knowledge of nonlinear system analysis, Lyapunov stability techniques, dynamic optimization, and machine-learning techniques will help readers to understand the methodologies proposed. The book is a valuable resource for academic researchers and graduate students pursuing research in this area as well as for process control engineers. Advances in Industrial Control reports and encourages the transfer of technology in control engineering. The rapid development of control technology has an impact on all areas of the control discipline. The series offers an opportunity for researchers to present an extended exposition of new work in all aspects of industrial control.

Principles of Integrated Airborne Avionics (Paperback, 1st ed. 2021): Igor Victorovich Avtin, Vladimir Ivanovich Baburov, Boris... Principles of Integrated Airborne Avionics (Paperback, 1st ed. 2021)
Igor Victorovich Avtin, Vladimir Ivanovich Baburov, Boris Victorovich Ponomarenko, Yuri Grigorievich Shatrakov
R3,836 Discovery Miles 38 360 Ships in 10 - 15 working days

This book discusses the principles, approaches, concepts and development programs for integrated aircraft avionics. The functional tasks of integrated on-board radio electronic equipment (avionics) of navigation, landing, data exchange and air traffic control are formulated that meet the modern requirements of civil and military aviation, and the principles of avionics integration are proposed. The modern approaches to the joint processing of information in navigation and landing complexes are analyzed. Algorithms of multichannel information processing in integrated avionics are considered, and examples of its implementation are presented. This book is intended for scientists and professionals in the field of aviation equipment, students and graduate students of relevant specialties.

Risk Management Methods in the Aviation Enterprise (Paperback, 1st ed. 2021): Valery Dmitryevich Sharov, Vadim Vadimovich... Risk Management Methods in the Aviation Enterprise (Paperback, 1st ed. 2021)
Valery Dmitryevich Sharov, Vadim Vadimovich Vorobyov, Dmitry Alexandrovich Zatuchny
R3,259 Discovery Miles 32 590 Ships in 10 - 15 working days

This book provides a comprehensive content for professionals engaged in the development of flight safety regulatory framework, as well as in the design and operation of ground-based or on-board flight support radio electronic systems. It presents mathematical tools and methods of probabilistic theory, mathematical statistics and graph theory, along with some provisions of decision-making theory and multi-criteria analysis. This book helps as a good guide for those involved in aviation risk assessment and air traffic management.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Fall of Jerusalem - a Dramatic Poem
Henry Hart Milman Paperback R576 Discovery Miles 5 760
Culture and Customs of Jamaica
Martin Mordecai, Pamela Mordecai Hardcover R2,216 Discovery Miles 22 160
Advances in Computers, Volume 126
Suyel Namasudra Hardcover R5,084 Discovery Miles 50 840
Activating the Citizen - Dilemmas of…
J. Debardeleben, J. Pammett Hardcover R3,038 Discovery Miles 30 380
Limitless Encounters vol. 1
Andrew Hand, Michael E Johnson, … Hardcover R1,423 Discovery Miles 14 230
Law of Commerce in South Africa
Dumile Baqwa, Elizabeth de Stadler, … Paperback R838 Discovery Miles 8 380
One and Many Mirrors - on graphic design…
Luke & Wood Paperback R689 Discovery Miles 6 890
United States Circuit Court of Appeals…
United States Court of Appeals Hardcover R886 Discovery Miles 8 860
2 Sisters Detective Agency
James Patterson, Candice Fox Paperback R316 R288 Discovery Miles 2 880
Fugitive Pieces on Various Subjects - a…
Robert Dodsley Paperback R611 Discovery Miles 6 110

 

Partners