0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (1)
  • R500+ (312)
  • -
Status
Format
Author / Contributor
Publisher

Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems

Illustrated Encyclopedia of Building Services (Paperback): David Kut Illustrated Encyclopedia of Building Services (Paperback)
David Kut
R1,484 Discovery Miles 14 840 Ships in 10 - 15 working days

This book explains over 3,000 terms (over 200,000 words) and contains over 200 professionally drawn line illustrations. This practical handbook is intended for day to day use as a reference or as a source of enlightenment for anyone associated with the building and construction industry. It also provides comprehensive practical explanations of the many terms listed, giving guidance, examples of use and, in certain cases, cautionary remarks concerning aspects of the applications.

Nanostructured Materials for the Detection of CBRN (Paperback, 1st ed. 2018): Janez Bonca, Sergei Kruchinin Nanostructured Materials for the Detection of CBRN (Paperback, 1st ed. 2018)
Janez Bonca, Sergei Kruchinin
R4,032 Discovery Miles 40 320 Ships in 18 - 22 working days

This book includes topics in nanophysics, nanotechnology, nanomaterials, sensors, biosensors, security systems, and CBRN agents detection. There have been many significant advances in the past two years and some entirely new directions of research are just opening up. Recent developments in nanotechnology and measurement techniques now allow experimental investigation of the physical properties of nanostructured materials. The book presents new methods for the detection of chemical, biological, radiological and nuclear (CBRN) agents using chemical and biochemical sensors. Identification, protection and decontamination are the main scientific and technological responses for the modern challenges of CBRN agents.

Practical Lock Picking - A Physical Penetration Tester's Training Guide (Paperback, 2nd edition): Deviant Ollam Practical Lock Picking - A Physical Penetration Tester's Training Guide (Paperback, 2nd edition)
Deviant Ollam
R1,200 R873 Discovery Miles 8 730 Save R327 (27%) Ships in 10 - 15 working days

Practical Lock Picking, Second Edition, is an instructional manual that covers everything from straightforward lockpicking to quick-entry techniques such as shimming, bumping, and bypassing. Written by Deviant Ollam, one of the security industry's best-known lockpicking teachers, and winner of the Best Book Bejtlich Read in 2010 award, this book contains detailed photos that make learning as easy as picking a lock. Material is offered in easy-to-follow lessons that allow even beginners to acquire the knowledge very quickly. Whether the student will be hired at some point to penetrate security or simply trying to harden his or her own defenses, this book is essential. This edition has been updated to reflect the changing landscape of tools and tactics which have emerged in recent years. It consists of 6 chapters that discuss topics such as the fundamentals of pin tumbler and wafer locks; the basics of picking, with emphasis on how to exploit weaknesses; tips for beginners on how to get very good and very fast in picking locks; advanced training; quick-entry tricks about shimming, bumping, and bypassing; and pin tumblers in other configurations. This book is geared specifically toward penetration testers, security consultants, IT security professionals, and hackers.

Mobile and Wireless Technology 2015 (Paperback, Softcover reprint of the original 1st ed. 2015): Kuinam J. Kim, Naruemon... Mobile and Wireless Technology 2015 (Paperback, Softcover reprint of the original 1st ed. 2015)
Kuinam J. Kim, Naruemon Wattanapongsakorn
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications.  The proceedings of the 2nd International Conference on Mobile and Wireless Technology (ICMWT2015), it represents the outcome of a unique platform for researchers and practitioners from academia and industry to share cutting-edge developments in the field of mobile and wireless science technology, including those working on data management and mobile security. The contributions presented here describe the latest academic and industrial research from the international mobile and wireless community.  The scope covers four major topical areas: mobile and wireless networks and applications; security in mobile and wireless technology; mobile data management and applications; and mobile software.  The book will be a valuable reference for current researchers in academia and industry, and a useful resource for graduate-level students working on mobile and wireless technology.

Battlefield Acoustics (Paperback, Softcover reprint of the original 1st ed. 2015): Thyagaraju Damarla Battlefield Acoustics (Paperback, Softcover reprint of the original 1st ed. 2015)
Thyagaraju Damarla
R3,119 Discovery Miles 31 190 Ships in 18 - 22 working days

This book presents all aspects of situational awareness using acoustic signals. It starts by presenting the science behind understanding and interpretation of sound signals. The book then goes on to provide various signal processing techniques used in acoustics to find the direction of sound source, localize gunfire, track vehicles and detect people. The necessary mathematical background and various classification and fusion techniques are presented. The book contains majority of the things one would need to process acoustic signals for all aspects of situational awareness in one location. The book also presents array theory, which is pivotal in finding the direction of arrival of acoustic signals. In addition, the book presents techniques to fuse the information from multiple homogeneous/heterogeneous sensors for better detection. MATLAB code is provided for majority of the real application, which is a valuable resource in not only understanding the theory but readers can also use the code as a spring-board to develop their own application based software code.

Railway Infrastructure Security (Paperback, Softcover reprint of the original 1st ed. 2015): Roberto Setola, Antonio Sforza,... Railway Infrastructure Security (Paperback, Softcover reprint of the original 1st ed. 2015)
Roberto Setola, Antonio Sforza, Valeria Vittorini, Concetta Pragliola
R3,303 Discovery Miles 33 030 Ships in 18 - 22 working days

This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railway infrastructure security. Based on analyses by academics, technology providers and railway operators, it explains how to assess terrorist and criminal threats, design countermeasures, and implement effective security strategies. In so doing, it draws upon a range of experiences from different countries in Europe and beyond. The book is the first to be devoted entirely to this subject. It will serve as a timely reminder of the attractiveness of the railway infrastructure system as a target for criminals and terrorists and, more importantly, as a valuable resource for stakeholders and professionals in the railway security field aiming to develop effective security based on a mix of methodological, technological and organizational tools. Besides researchers and decision makers in the field, the book will appeal to students interested in critical infrastructure protection.

Security Issues in Mobile NFC Devices (Paperback, Softcover reprint of the original 1st ed. 2015): Michael Roland Security Issues in Mobile NFC Devices (Paperback, Softcover reprint of the original 1st ed. 2015)
Michael Roland
R3,371 Discovery Miles 33 710 Ships in 18 - 22 working days

This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with NFC tags and on card emulation. The current security architectures of NFC-enabled cellular phones are evaluated with regard to the identified security aspects.

Ear Biometrics in 2D and 3D - Localization and Recognition (Paperback, Softcover reprint of the original 1st ed. 2015): Surya... Ear Biometrics in 2D and 3D - Localization and Recognition (Paperback, Softcover reprint of the original 1st ed. 2015)
Surya Prakash, Phalguni Gupta
R2,954 Discovery Miles 29 540 Ships in 18 - 22 working days

This book presents the state-of-the-art techniques and recent research progress on Ear Biometrics. Among the various physiological traits, the reasons for the ear to gain much attention in recent years are many folds. It has been found to be a reliable biometrics for human verification and identification. Ears are remarkably consistent and unlike face, it does not change shape with different expressions or age, and remain fixed in the middle of the side of the head against a predictable background. The book contains figures, tables and plots to illustrate the techniques in an easy and lucid manner. The book also provides an extensive literature on the subject, where readers have the benefit of receiving all the relevant material at one place in a very comprehensive manner. This book caters students, academics, researchers, practitioners who are interested in the field of Ear Biometrics and its applications in face recognition and security.

The Risks of Nuclear Energy Technology - Safety Concepts of Light Water Reactors (Paperback, Softcover reprint of the original... The Risks of Nuclear Energy Technology - Safety Concepts of Light Water Reactors (Paperback, Softcover reprint of the original 1st ed. 2014)
Gunter Kessler, Anke Veser, Franz-Hermann Schluter, Wolfgang Raskob, Claudia Landman, …
R3,836 Discovery Miles 38 360 Ships in 18 - 22 working days

The book analyses the risks of nuclear power stations. The security concept of reactors is explained. Measures against the spread of radioactivity after a severe accident, accidents of core melting and a possible crash of an air plane on reactor containment are discussed. The book covers three scientific subjects of the safety concepts of Light Water Reactors: - A first part describes the basic safety design concepts of operating German Pressurized Water Reactors and Boiling Water Reactors including accident management measures introduced after the reactor accidents of Three Mile Island and Chernobyl. These safety concepts are also compared with the experiences of the Fukushima accidents. In addition, the safety design concepts of the future modern European Pressurized Water Reactor (EPR) and of the future modern Boiling Water Reactor SWR-1000 (KERENA) are presented. These are based on new safety research results of the past decades. - In a second, part the possible crash of military or heavy commercial air planes on reactor containment is analyzed. It is shown that reactor containments can be designed to resist to such an airplane crash. - In a third part, an online decision system is presented. It allows to analyze the distribution of radioactivity in the atmosphere and to the environment after a severe reactor accident. It provides data for decisions to be taken by authorities for the minimization of radiobiological effects to the population. This book appeals to readers who have an interest in save living conditions and some understanding for physics or engineering.

Design of Low Power and Low Area Passive Sigma Delta Modulators for Audio Applications (Paperback, 1st ed. 2017): David Fouto,... Design of Low Power and Low Area Passive Sigma Delta Modulators for Audio Applications (Paperback, 1st ed. 2017)
David Fouto, Nuno Paulino
R1,592 Discovery Miles 15 920 Ships in 18 - 22 working days

This book presents the study, design, modulation, optimization and implementation of low power, passive DT- Ms for use in audio applications. The high gain and bandwidth amplifier normally used for integration in modulation, is replaced by passive, switched-capacitor branches working under the Ultra Incomplete Settling (UIS) condition, leading to a reduction of the consumed power. The authors describe a design process that uses high level models and an optimization process based in genetic algorithms to achieve the desired performance.

Forensic GIS - The Role of Geospatial Technologies for Investigating Crime and Providing Evidence (Paperback, Softcover reprint... Forensic GIS - The Role of Geospatial Technologies for Investigating Crime and Providing Evidence (Paperback, Softcover reprint of the original 1st ed. 2014)
Gregory A. Elmes, George Roedl, Jamison Conley
R4,810 Discovery Miles 48 100 Ships in 18 - 22 working days

A variety of disciplines and professions have embraced geospatial technologies for collecting, storing, manipulating, analyzing and displaying spatial data to investigate crime, prosecute and convict offenders, exonerate suspects and submit evidence in civil lawsuits. The applications, acceptability and relevance and procedural legality of each geospatial technologies vary. The purpose of this book is to explain the nature of geospatial technologies, demonstrate a variety of geospatial applications used to investigate and litigate civil and criminal activities and to provide a reference of current acceptability of geospatial technology in the production of evidence. This book is an introductory overview designed to appeal to researchers and practitioners across disciplinary boundaries. The authors of this book are researchers and practitioners across disciplines and professions, experts in the field.

The Hash Function BLAKE (Paperback, Softcover reprint of the original 1st ed. 2014): Jean-Philippe Aumasson, Willi Meier,... The Hash Function BLAKE (Paperback, Softcover reprint of the original 1st ed. 2014)
Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan, Luca Henzen
R2,642 Discovery Miles 26 420 Ships in 18 - 22 working days

This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using BLAKE, with a focus on software implementation. In the first two chapters, the authors offer a short introduction to cryptographic hashing, the SHA3 competition and BLAKE. They review applications of cryptographic hashing, they describe some basic notions such as security definitions and state-of-the-art collision search methods and they present SHA1, SHA2 and the SHA3 finalists. In the chapters that follow, the authors give a complete description of the four instances BLAKE-256, BLAKE-512, BLAKE-224 and BLAKE-384; they describe applications of BLAKE, including simple hashing with or without a salt and HMAC and PBKDF2 constructions; they review implementation techniques, from portable C and Python to AVR assembly and vectorized code using SIMD CPU instructions; they describe BLAKE’s properties with respect to hardware design for implementation in ASICs or FPGAs; they explain BLAKE's design rationale in detail, from NIST’s requirements to the choice of internal parameters; they summarize the known security properties of BLAKE and describe the best attacks on reduced or modified variants; and they present BLAKE2, the successor of BLAKE, starting with motivations and also covering its performance and security aspects. The book concludes with detailed test vectors, a reference portable C implementation of BLAKE, and a list of third-party software implementations of BLAKE and BLAKE2. The book is oriented towards practice – engineering and craftsmanship – rather than theory. It is suitable for developers, engineers and security professionals engaged with BLAKE and cryptographic hashing in general and for applied cryptography researchers and students who need a consolidated reference and a detailed description of the design process, or guidelines on how to design a cryptographic algorithm.

Conflict and Complexity - Countering Terrorism, Insurgency, Ethnic and Regional Violence (Paperback, Softcover reprint of the... Conflict and Complexity - Countering Terrorism, Insurgency, Ethnic and Regional Violence (Paperback, Softcover reprint of the original 1st ed. 2015)
Philip vos Fellman, Yaneer Bar-Yam, Ali A. Minai
R3,635 Discovery Miles 36 350 Ships in 18 - 22 working days

This book follows the methodologies of complex adaptive systems research in their application to addressing the problems of terrorism, specifically terrorist networks, their structure and various methods of mapping and interdicting them as well as exploring the complex landscape of network-centric and irregular warfare. A variety of new models and approaches are presented here, including Dynamic Network Analysis, DIME/PMESII models, percolation models and emergent models of insurgency. In addition, the analysis is informed by practical experience, with analytical and policy guidance from authors who have served within the U.S. Department of Defense, the British Ministry of Defence as well as those who have served in a civilian capacity as advisors on terrorism and counter-terrorism.

Networks and Network Analysis for Defence and Security (Paperback, Softcover reprint of the original 1st ed. 2014): Anthony J.... Networks and Network Analysis for Defence and Security (Paperback, Softcover reprint of the original 1st ed. 2014)
Anthony J. Masys
R3,419 Discovery Miles 34 190 Ships in 18 - 22 working days

Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic and cyber domains. Threats to national security, such as that against critical infrastructures not only stem from man-made acts but also from natural hazards. Katrina (2005), Fukushima (2011) and Hurricane Sandy (2012) are examples highlighting the vulnerability of critical infrastructures to natural hazards and the crippling effect they have on the social and economic well-being of a community and a nation. With this dynamic and complex threat landscape, network analysis has emerged as a key enabler in supporting defence and security. With the advent of ‘big data’ and increasing processing power, network analysis can reveal insights with regards to structural and dynamic properties thereby facilitating greater understanding of complex networks, their entities, interdependencies, vulnerabilities to produce insights for creative solutions. This book will be well positioned to inform defence, security and intelligence professionals and researchers with regards to leading methodologies and approaches.

Disaster Management: Enabling Resilience (Paperback, Softcover reprint of the original 1st ed. 2015): Anthony Masys Disaster Management: Enabling Resilience (Paperback, Softcover reprint of the original 1st ed. 2015)
Anthony Masys
R5,131 Discovery Miles 51 310 Ships in 18 - 22 working days

The present work will discuss relevant theoretical frameworks and applications pertaining to enabling resilience within the risk, crisis and disaster management domain. The contributions to this book focus on resilience thinking along 4 broad themes: Urban Domain; Cyber Domain; Organizational/Social domain; and Socio-ecological domain. This book would serve as a valuable reference for courses on risk, crisis and disaster management, international development, social innovation and resilience. This will be of particular interest to those working in the risk, crisis and disaster management domain as it will provide valuable insights into enabling resilience. This book will be well positioned to inform disaster management professionals, policy makers and academics on strategies and perspectives regarding disaster resilience.

Cybercrime, Digital Forensics and Jurisdiction (Paperback, Softcover reprint of the original 1st ed. 2015): Mohamed Chawki,... Cybercrime, Digital Forensics and Jurisdiction (Paperback, Softcover reprint of the original 1st ed. 2015)
Mohamed Chawki, Ashraf Darwish, Mohammad Ayoub Khan, Sapna Tyagi
R3,491 Discovery Miles 34 910 Ships in 18 - 22 working days

The purpose of law is to prevent the society from harm by declaring what conduct is criminal, and prescribing the punishment to be imposed for such conduct. The pervasiveness of the internet and its anonymous nature make cyberspace a lawless frontier where anarchy prevails. Historically, economic value has been assigned to visible and tangible assets. With the increasing appreciation that intangible data disseminated through an intangible medium can possess economic value, cybercrime is also being recognized as an economic asset. The Cybercrime, Digital Forensics and Jurisdiction disseminate knowledge for everyone involved with understanding and preventing cybercrime - business entities, private citizens, and government agencies. The book is firmly rooted in the law demonstrating that a viable strategy to confront cybercrime must be international in scope.

Physics of Societal Issues - Calculations on National Security, Environment, and Energy (Paperback, Softcover reprint of the... Physics of Societal Issues - Calculations on National Security, Environment, and Energy (Paperback, Softcover reprint of the original 2nd ed. 2014)
David Hafemeister
R1,578 Discovery Miles 15 780 Ships in 18 - 22 working days

This book provides the reader with essential tools needed to analyze complex societal issues and demonstrates the transition from physics to modern-day laws and treaties. This second edition features new equation-oriented material and extensive data sets drawing upon current information from experts in their fields. Problems to challenge the reader and extend discussion are presented on three timely issues: * National Security: Weapons, Offense, Defense, Verification, Nuclear Proliferation, Terrorism * Environment: Air/Water, Nuclear, Climate Change, EM Fields/Epidemiology * Energy: Current Energy Situation, Buildings, Solar Buildings, Renewable Energy, Enhanced End-Use Efficiency, Transportation, Economics Praise for the first edition: "This insight is needed in Congress and the Executive Branch. Hafemeister, a former Congressional fellow with wide Washington experience, has written a book for physicists, chemists and engineers who want to learn science and policy on weapons, energy, and the environment. Scientists who want to make a difference will want this book." Richard Scribner, first Director, Congressional Science and Engineering Fellow Program, AAAS "Hafemeister shows how much one can understand about nuclear weapons and missile issues through simple back-of-the-envelope calculations. He also provides compact explanations of the partially successful attempts that have been made over the past 60 years to control these weapons of mass destruction. Hopefully, Physics of Societal Issues will help interest a new generation of physicists in continuing this work." Frank von Hippel, Professor, Princeton, former Assistant Director, National Security, White House, OSTP "Energy policy must be quantitative. People who don't calculate economic tradeoffs often champion simplistic hardware. 'The solution is more... nuclear power, or electric cars, or photovoltaics, etc.' Some simple physics will show that the true solution matches supply and demand as an 'integrated resource plan.' Physics of Societal Issues is a good place to begin this journey." Arthur Rosenfeld, former California Energy Commissioner, Professor-emeritus, U. of California-Berkeley

Signal and Image Processing for Biometrics (Paperback, Softcover reprint of the original 1st ed. 2014): Jacob Scharcanski, Hugo... Signal and Image Processing for Biometrics (Paperback, Softcover reprint of the original 1st ed. 2014)
Jacob Scharcanski, Hugo Proença, Eliza Du
R3,515 Discovery Miles 35 150 Ships in 18 - 22 working days

This volume offers a guide to the state of the art in the fast evolving field of biometric recognition to newcomers and experienced practitioners. It is focused on the emerging strategies to perform biometric recognition under uncontrolled data acquisition conditions. The mainstream research work in this field is presented in an organized manner, so the reader can easily follow the trends that best suits her/his interests in this growing field. The book chapters cover the recent advances in less controlled / covert data acquisition frameworks, segmentation of poor quality biometric data, biometric data quality assessment, normalization of poor quality biometric data. contactless biometric recognition strategies, biometric recognition robustness, data resolution, illumination, distance, pose, motion, occlusions, multispectral biometric recognition, multimodal biometrics, fusion at different levels, high confidence automatic surveillance.

Infrared Thermography for Thermo-Fluid-Dynamics (Paperback, 2013 ed.): Tommaso Astarita, Giovanni Maria Carlomagno Infrared Thermography for Thermo-Fluid-Dynamics (Paperback, 2013 ed.)
Tommaso Astarita, Giovanni Maria Carlomagno
R2,640 Discovery Miles 26 400 Ships in 18 - 22 working days

Infrared thermography is a measurement technique that enables to obtain non intrusive measurements of surface temperatures. One of the interesting features of this technique is its ability to measure a full two dimensional map of the surface temperature and for this reason it has been widely used as a flow visualization technique. Since the temperature measurements can be extremely accurate it is possible, by using a heat flux sensor, also to measure convective heat transfer coefficient distributions on a surface making the technique de facto quantitative. This book, starting from the basic theory of infrared thermography and heat flux sensor guides, both the experienced researcher and the young student, in the correct application of this powerful technique to various practical problems. A significant number of examples and applications are also examined in detail.

Distributed Video Sensor Networks (Paperback, 2011 ed.): Bir Bhanu, Chinya V. Ravishankar, Amit K. Roy-chowdhury, Hamid... Distributed Video Sensor Networks (Paperback, 2011 ed.)
Bir Bhanu, Chinya V. Ravishankar, Amit K. Roy-chowdhury, Hamid Aghajan, Demetri Terzopoulos
R4,068 Discovery Miles 40 680 Ships in 18 - 22 working days

Large-scale video networks are of increasing importance in a wide range of applications. However, the development of automated techniques for aggregating and interpreting information from multiple video streams in real-life scenarios is a challenging area of research. Collecting the work of leading researchers from a broad range of disciplines, this timely text/reference offers an in-depth survey of the state of the art in distributed camera networks. The book addresses a broad spectrum of critical issues in this highly interdisciplinary field: current challenges and future directions; video processing and video understanding; simulation, graphics, cognition and video networks; wireless video sensor networks, communications and control; embedded cameras and real-time video analysis; applications of distributed video networks; and educational opportunities and curriculum-development. Topics and features: presents an overview of research in areas of motion analysis, invariants, multiple cameras for detection, object tracking and recognition, and activities in video networks; provides real-world applications of distributed video networks, including force protection, wide area activities, port security, and recognition in night-time environments; describes the challenges in graphics and simulation, covering virtual vision, network security, human activities, cognitive architecture, and displays; examines issues of multimedia networks, registration, control of cameras (in simulations and real networks), localization and bounds on tracking; discusses system aspects of video networks, with chapters on providing testbed environments, data collection on activities, new integrated sensors for airborne sensors, face recognition, and building sentient spaces; investigates educational opportunities and curriculum development from the perspective of computer science and electrical engineering. This unique text will be of great interest to researchers and graduate students of computer vision and pattern recognition, computer graphics and simulation, image processing and embedded systems, and communications, networks and controls. The large number of example applications will also appeal to application engineers.

Sustainable Cities and Military Installations (Paperback, 2014 ed.): Igor Linkov Sustainable Cities and Military Installations (Paperback, 2014 ed.)
Igor Linkov
R6,270 Discovery Miles 62 700 Ships in 18 - 22 working days

Access to reliable and affordable energy, water, and services is an important determinant of the prosperity of cities along with effective mission sustainment at military installations. The idea for this book was conceived at the NATO Advanced Research Workshop (ARW) in June 2012 in Hella, Iceland. The workshop was attended by 50 scientists, engineers, and policymakers representing 15 different nations and multiple fields of expertise, reflecting the global and interdisciplinary nature of climate change and sustainability research. The focus of the workshop was on ways in which military installations and small cities can integrate energy, water, and infrastructure sustainability strategies into city and installation management plans that account for climate change uncertainties. The organization of the book reflects major topic sessions and discussions during the workshop.

Magnetic Resonance Detection of Explosives and Illicit Materials (Paperback, 2014 ed.): Tomaz Apih, Bulat Rameev, Georgy... Magnetic Resonance Detection of Explosives and Illicit Materials (Paperback, 2014 ed.)
Tomaz Apih, Bulat Rameev, Georgy Mozzhukhin, Jamie Barras
R4,499 Discovery Miles 44 990 Ships in 18 - 22 working days

Detection of concealed explosives is a notoriously difficult problem, and many different approaches have been proposed to solve this problem. Nuclear quadrupole resonance (NQR) is unique in many ways. It operates in a safe AM radio frequency range, and it can remotely detect unique fingerprint (NQR spectrum) of many explosives, such as TNT or RDX. As such, the detection of target does not depend on the shape or material of the container, or the presence of metallic object such as triggers etc. Spectra of chemically similar compounds differ enough that their presence never causes interference or false alarms. Unfortunately, widespread use is prevented due to low sensitivity, radiofrequency interference from the noisy environment, and inability to detect liquid explosives. This book presents current state of the art of the attempts to overcome NQR sensitivity problem, either by increasing the strengths of signals generated, or by increasing the specificity of the technique through a better understanding of the factors that affect the quadrupolar parameters of specific explosives. The use of these specific quadrupolar parameters is demonstrated on signal processing techniques that can detect weak signals, which are hidden in a noisy background. The problem of differentiation of liquid explosives and benign liquids in closed containers is approached by measurements of different nuclear magnetic resonance (NMR) parameters. As shown, a couple of solutions has reached a prototype stage and could find their use in a near future."

Fire Detection in Warehouse Facilities (Paperback, 2012 ed.): Joshua Dinaburg, Daniel T. Gottuk Fire Detection in Warehouse Facilities (Paperback, 2012 ed.)
Joshua Dinaburg, Daniel T. Gottuk
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Automatic sprinklers systems are the primary fire protection system in warehouse and storage facilities. The effectiveness of this strategy has come into question due to the challenges presented by modern warehouse facilities, including increased storage heights and areas, automated storage retrieval systems (ASRS), limitations on water supplies, and changes in firefighting strategies. The application of fire detection devices used to provide early warning and notification of incipient warehouse fire events is being considered as a component of modern warehouse fire protection. Fire Detection in Warehouse Facilities provides technical information to aid in the development of guidelines and standards for the use of fire detection technologies for modern warehouse fire protection. The authors share their thorough literature review, analyze characteristic fire hazards for modern warehouse facilities, and identify information gaps in the field. The book concludes with recommendations for the development of guidelines and standards for the use of detection technologies in warehouse fire protection design, including a research plan for implementation. This book is intended for practitioners seeking an understanding of the issues surrounding warehouse design and fire protection. The book will also prove valuable for fire hazard researchers and those involved with fire department response, applicable detection systems, and fire growth suppression.

Advanced Sensors for Safety and Security (Paperback, 2013 ed.): Ashok Vaseashta, Surik Khudaverdyan Advanced Sensors for Safety and Security (Paperback, 2013 ed.)
Ashok Vaseashta, Surik Khudaverdyan
R6,121 Discovery Miles 61 210 Ships in 18 - 22 working days

This book results from a NATO Advanced Research Workshop titled "Technological Innovations in CBRNE Sensing and Detection for Safety, Security, and Sustainability" held in Yerevan, Armenia in 2012. The objective was to discuss and exchange views as to how fusion of advanced technologies can lead to improved sensors/detectors in support of defense, security, and situational awareness. The chapters range from policy and implementation, advanced sensor platforms using stand-off (THz and optical) and point-contact methods for detection of chemical, nuclear, biological, nuclear and explosive agents and contaminants in water, to synthesis methods for several materials used for sensors. In view of asymmetric, kinetic, and distributed nature of threat vectors, an emphasis is placed to examine new generation of sensors/detectors that utilize an ecosystems of innovation and advanced sciences convergence in support of effective counter-measures against CBRNE threats. The book will be of considerable interest and value to those already pursuing or considering careers in the field of nanostructured materials, and sensing/detection of CBRNE agents and water-borne contaminants. For policy implementation and compliance standpoint, the book serves as a resource of several informative contributions. In general, it serves as a valuable source of information for those interested in how nanomaterials and nanotechnologies are advancing the field of sensing and detection using nexus of advanced technologies for scientists, technologists, policy makers, and soldiers and commanders.

Homomorphic Encryption and Applications (Paperback, 2014 ed.): Xun Yi, Russell Paulet, Elisa Bertino Homomorphic Encryption and Applications (Paperback, 2014 ed.)
Xun Yi, Russell Paulet, Elisa Bertino
R2,568 Discovery Miles 25 680 Ships in 18 - 22 working days

This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with concrete examples to enhance the reader's understanding. This volume achieves a balance between the theoretical and the practical components of modern information security. Readers will learn key principles of homomorphic encryption as well as their application in solving real world problems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mobile and Wireless Technology 2015
Kuinam J. Kim, Naruemon Wattanapongsakorn Hardcover R5,202 R4,610 Discovery Miles 46 100
Compressive Sensing Based Algorithms for…
Amit Kumar Mishra, Ryno Strauss Verster Hardcover R3,935 Discovery Miles 39 350
High-Security Mechanical Locks - An…
Graham Pulford Hardcover R2,131 Discovery Miles 21 310
Methods and Techniques for Fire…
A. Enis Cetin, Bart Merci, … Hardcover R1,450 Discovery Miles 14 500
Advances in Cyber Security Analytics and…
Shishir K. Shandilya, Neal Wagner, … Hardcover R4,011 Discovery Miles 40 110
Enhancing CBRNE Safety & Security…
Andrea Malizia, Marco D'Arienzo Hardcover R2,728 Discovery Miles 27 280
Air Insulation Prediction Theory and…
Zhibin Qiu, Jiangjun Ruan, … Hardcover R2,660 Discovery Miles 26 600
Physical Security 150 Things You Should…
Lawrence Fennelly, Louis Tyska Paperback R1,357 Discovery Miles 13 570
Home Security - Alarms, Sensors and…
Vivian Capel Paperback R1,286 Discovery Miles 12 860
Palmprint Authentication
8#, Xingyi Road,Chang Ning District 16/F, Maxdo Center Hardcover R2,672 Discovery Miles 26 720

 

Partners