![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems
In constant effort to eliminate mine danger, international mine action community has been developing safety, efficiency and cost-effectiveness of clearance methods. Demining machines have become necessary when conducting humanitarian demining where the mechanization of demining provides greater safety and productivity. Design of Demining Machines describes the development and testing of modern demining machines in humanitarian demining. Relevant data for design of demining machines are included to explain the machinery implemented and some innovative and inspiring development solutions. Development technologies, companies and projects are discussed to provide a comprehensive estimate of the effects of various design factors and to proper selection of optimal parameters for designing the demining machines. Covering the dynamic processes occurring in machine assemblies and their components to a broader understanding of demining machine as a whole, Design of Demining Machines is primarily tailored as a text for the study of the fundamentals and engineering techniques involved in the calculation and design of demining machines. It will prove as useful resource for engineers, designers, researchers and policy makers working in this field.
The topics discussed at the NATO Advanced Research Workshop Nanotechnology in the Security Systems" included nanophysics, nanotechnology, nanomaterials, sensors, biosensors security systems, explosivedetection. There have been many significant advances in the past two years and some entirely new directions of research are just opening up.Recent advances in nano science have demonstrated that fundamentally new physical phenomena are found when systems are reduced in size with dimensions, comparable to the fundamental microscopic length scales of the investigated material. Recent developments in nanotechnology and measurement techniques now allow experimental investigation of transport properties of nano devices. This work will be of interest to researchers working in spintronics, molecular electronicsand quantum information processing."
"Space Sleuths of the Cold War" relates for the first time the inside story of the amateur spies who monitored the Soviet space program during the Cold War. It is written by many of those "space sleuths" themselves and chronicles the key moments in their discovery of hidden history. This book shows that dedicated observers were often better than professionals at interpreting that information coming out of the USSR during the dark days of the Cold War. This book takes a unique approach to the history of Soviet spaceflight - looking at the personal stories of some of the researchers as well as the space secrets the Soviets tried to keep hidden. The fascinating account often reads like a Cold War espionage novel. "Space Sleuths of the Cold War" includes an impressive list of contributors, such as: Editor Dominic Phelan, giving an overall history of the Cold War hunt for Soviet space secrets. Space writer Brian Harvey reveals his own personal search through official Soviet radio and magazines to find out what they were (and weren't) revealing to the outside world at the height of the space race. Sven Grahn from Sweden details his own 40 year quest to understand what was happening on the other side of the Iron Curtain. Professional American historian Asif Siddiqi explores his own adventures in the once secret Russian archives - often seeing documents never before read by Westerners. Dutch cosmonaut researcher Bert Vis provides an inside account of the Yuri Gagarin training center in Moscow. Belgian researcher Bart Hendrickx's details his important translation of the 1960s' diaries of cosmonaut team leader General Kamanin. Pioneer space sleuth James Oberg's shares his memories of his own notable 'scoops.' Paris-based writer Christian Lardier recounts the efforts of French space sleuths - whose work was frequently overlooked in the USA and Britain because of the language barrier.
Multimedia surveillance systems is an emerging field that includes signal and image processing, communications, and computer vision. Multimedia Video-Based Surveillance Systems: Requirements, Issues and Solutions, combines the most recent research results from these areas for use by engineers and end-users involved in the design of surveillance systems in the fields of transportation and services. The book covers emerging surveillance requirements, including new digital sensors for real-time acquisition of surveillance data, low-level image processing algorithms, and event detection methods. It also discusses problems related to knowledge representation in surveillance systems, wireless and wired multimedia networks, and a new generation of surveillance communication tools. Timely information is presented on digital watermarking, broadband multimedia transmission, legal use of surveillance systems, performance evaluation criteria, and other new and emerging topics, along with applications for transports and pedestrian monitoring. The information contained in Multimedia Video-Based Surveillance Systems: Requirements, Issues and Solutions, bridges the distance between present practice and research findings, and the book is an indispensable reference tool for professional engineers.
In constant effort to eliminate mine danger, international mine action community has been developing safety, efficiency and cost-effectiveness of clearance methods. Demining machines have become necessary when conducting humanitarian demining where the mechanization of demining provides greater safety and productivity. "Design of Demining Machines" describes the development and testing of modern demining machines in humanitarian demining. Relevant data for design of demining machines are included to explain the machinery implemented and some innovative and inspiring development solutions. Development technologies, companies and projects are discussed to provide a comprehensive estimate of the effects of various design factors and to proper selection of optimal parameters for designing the demining machines. Covering the dynamic processes occurring in machine assemblies and their components to a broader understanding of demining machine as a whole, "Design of Demining Machines" is primarily tailored as a text for the study of the fundamentals and engineering techniques involved in the calculation and design of demining machines. It will prove as useful resource for engineers, designers, researchers and policy makers working in this field.
The threat of biological and chemical terrorism has driven the demand for timely techniques that can quickly detect the agent or agents used in an attack. The detection and/or prevention of these potential security threats provide significant scientific and technical challenges due to the combination of possible agents and modes of delivery available. This book will present a thorough look at the importance and technological challenges of mass spectrometry (MS) for the detection & identification of biological and chemical threats. This new contribution's general aims are to draw the attention of recognized practitioners, experts and graduate students trying to grasp the latest MS developments in the cutting-edge fields of MS-biodefense technologies for the rapid/early/specific sensitive threat detection of pathogens, viruses, explosives, mycotoxins, chemical agents, and biological markers of xenobiotic chemicals.
The threat of biological and chemical terrorism has driven the demand for timely techniques that can quickly detect the agent or agents used in an attack. The detection and/or prevention of these potential security threats provide significant scientific and technical challenges due to the combination of possible agents and modes of delivery available. This book will present a thorough look at the importance and technological challenges of mass spectrometry (MS) for the detection & identification of biological and chemical threats. This new contribution's general aims are to draw the attention of recognized practitioners, experts and graduate students trying to grasp the latest MS developments in the cutting-edge fields of MS-biodefense technologies for the rapid/early/specific sensitive threat detection of pathogens, viruses, explosives, mycotoxins, chemical agents, and biological markers of xenobiotic chemicals.
Designed for chemical engineers and other technical personnel involved in the design, operation, and maintenance of facilities and equipment where deflagration and detonation flame arresters (DDFAs) may be required, this book fosters effective application and operation of DDFAs through treatment of their principles of operation, selection, installation, and maintenance methods. This reference covers a broad range of issues concerning DDAs, including: An overview of deflagration and detonation prevention and protection practicesAn overview of combustion and flame propagation and how DDAs halt propagationDeflagration and detonation flame arrester technologyInstallation in process systemsRegulations, codes, and standardsIllustrative examples, calculations, and guidelines for DDA selectionAppendices, including a glossary, a flame arrester specification sheet for vendor quotation, and a listing of flame arrester manufacturers.
This book constitutes the refereed proceedings of the Second NSF Workshop on Biosurveillance Systems and Case Studies, BioSurveillance 2007, held in New Brunswick, NJ, USA in May 2007, co-located with the 2007 IEEE International Conference on Intelligence and Security Informatics (ISI 2007). The 17 revised full papers, 6 revised short papers presented together with 1 invited talk and 2 poster papers were carefully reviewed and selected for inclusion in the book. Bringing together infectious disease informatics (IDI) researchers and practitioners to discuss selected topics directly relevant to data sharing and analysis for real-time animal and public health surveillance, the workshop covers a wide range of backgrounds such as epidemiology, statistics, applied mathematics, information systems, computer science and machine learning/data mining.
This book provides an essential compilation of relevant and cutting edge academic and industry work on key cybersecurity applications topics. Further, it introduces cybersecurity applications to the public at large to develop their cybersecurity applications knowledge and awareness. The book concentrates on a wide range of advances related to Cybersecurity Applications which include, among others, applications in the areas of Data Science, Internet of Things, Artificial Intelligence, Robotics, Web, High-Tech Systems, Cyber-Physical Systems, Mobile Devices, Digital Media, and Cloud Computing. It introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity application specialists and educators for keeping current their cybersecurity applications knowledge. Further, it provides a glimpse of future directions where cybersecurity applications are headed. The book can be a valuable resource to applied cybersecurity experts towards their professional development efforts and to students as a supplement to their cybersecurity courses.
This book constitutes the refereed proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection, RAID 2002, held in Zurich, Switzerland, in October 2002. The 16 revised full papers presented were carefully reviewed and selected from a total of 81 submissions. The papers are organized in topical sections on stepping stone detection, anomality detection, correlation, legal aspects and intrusion tolerance, assessment of intrusion detection systems, adaptive intrusion detection systems, intrusion detection analysis.
Private security is now a multi-billion pound industry employing more personnel than the police. The authors provide incisive insights into the security world, scanning its weaknesses and exploring its potential. Based upon original research, supported by years of experience, they suggest that new ways of looking at the modern security world are long overdue. Private Security is a highly innovative book containing a wealth of up-to-date material. It is the definitive guide to the security world.
This book follows the methodologies of complex adaptive systems research in their application to addressing the problems of terrorism, specifically terrorist networks, their structure and various methods of mapping and interdicting them as well as exploring the complex landscape of network-centric and irregular warfare. A variety of new models and approaches are presented here, including Dynamic Network Analysis, DIME/PMESII models, percolation models and emergent models of insurgency. In addition, the analysis is informed by practical experience, with analytical and policy guidance from authors who have served within the U.S. Department of Defense, the British Ministry of Defence as well as those who have served in a civilian capacity as advisors on terrorism and counter-terrorism.
Even before the outbreak of the COVID-19 pandemic, the Central Region faced numerous obstacles to building a stable and prosperous future. The region, which encompasses the Middle East, the Horn of Africa, Central Asia, and South Asia, has been plagued by economic and political uncertainty amidst dramatic shifts in the global power structure. With the pandemic now exacerbating the volatility in this already fragile region, the U.S.'s strategic objectives are rife for re-examination. A complicated stew of factors such as weakening of established governance systems, the emboldening of extremist individuals and groups through advances in digital technology, the humanitarian crises in Afghanistan and Syria, and the intensification of the great power competition with China and Russia are creating a fertile environment for the growth of violent extremist organizations (VEOs). Such organizations take advantage of vulnerable, aggrieved, and traumatized populations to fuel radicalization, recruitment, and unrest, which further undermine stability and the potential for peace and prosperity. While it is still early to fully understand how the ongoing response to the COVID-19 pandemic will impact U.S. policy, this book provides a timely analysis of relevant dynamics such as popular radicalization, digital information ecosystems, networks of influence, and new capabilities to recognize and prepare for other such black swan events in the region.
A collection of papers that address such issues as model limits and reliability, emerging expert systems and integrated gas and solid phase combustion simulation models.
The purpose of this book is to provide graduate students, professional engineers, military officers, and weapons-systems planners with a comprehensive grounding in the technology, evolution, functions, costs, impacts on society, utility, and limi tations of modern strategic weapons systems. Since the subject is often left to the specialists, this work should introduce the general reader to the fundamentals of such systems in an informed manner. Nowadays the intense interaction of means and ends sym bolized by strategic weapons has stimulated a changing dis cipline in which new missile systems and the intricate logic of nuclear force and counterforce hold the stage alongside the truths of conflict, alliances, fears, games, and subtle gains and losses. Many readers with new personal interest or public responsibility in this complex field will require an overall guide to it. This book will not prepare the reader to become an expert in the vast subject of strategic weapons systems. It will, however, enable him to understand, evaluate, and form reasonable opinions about these systems, their capabilities and effective ness. The subject is dealt with more from the viewpoint of the user (investor) rather than the architect (systems engineer) and builder (design engineer). While the user will be concerned with both political as well as technical options which may be available to solve a problem, the systems and design engineers are concerned with analyzing and building technological weapons devices once their requirements are generally known."
While it has become increasingly apparent that individuals and organizations need a security metrics program, it has been exceedingly difficult to define exactly what that means in a given situation. There are hundreds of metrics to choose from and an organization's mission, industry, and size will affect the nature and scope of the task as well as the metrics and combinations of metrics appropriate to accomplish it. Finding the correct formula for a specific scenario calls for a clear concise guide with which to navigate this sea of information. Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI defines more than 900 ready to use metrics that measure compliance, resiliency, and return on investment. The author explains what needs to be measured, why and how to measure it, and how to tie security and privacy metrics to business goals and objectives. The book addresses measuring compliance with current legislation, regulations, and standards in the US, EC, and Canada including Sarbanes-Oxley, HIPAA, and the Data Protection Act-UK. The metrics covered are scaled by information sensitivity, asset criticality, and risk, and aligned to correspond with different lateral and hierarchical functions within an organization. They are flexible in terms of measurement boundaries and can be implemented individually or in combination to assess a single security control, system, network, region, or the entire enterprise at any point in the security engineering lifecycle. The text includes numerous examples and sample reports to illustrate these concepts and stresses a complete assessment by evaluating the interaction and interdependence between physical, personnel, IT, and operational security controls. Bringing a wealth of complex information into comprehensible focus, this book is ideal for corporate officers, security managers, internal and independent auditors, and system developers and integrators.
This text provides training on the fundamental tools and methodologies used in active forensic laboratories for the complicated analysis of fire debris and explosives evidence. It is intended to serve as a gateway for students and transitioning forensic science or chemistry professionals. The book is divided between the two disciplines of fire debris and explosives, with a final pair of chapters devoted to the interplay between the two disciplines and with other disciplines, such as DNA and fingerprint analysis. It brings together a multi-national group of technical experts, ranging from academic researchers to active practitioners, including members of some of the premier forensic agencies of the world. Readers will gain knowledge of practical methods of analysis and will develop a strong foundation for laboratory work in forensic chemistry. End-of-chapter questions based on relevant topics and real-world data provide a realistic arena for learners to test newly-acquired techniques.
Equipment developed for wartime is now being seen more often in everyday institutions, and even our schools have become sites of high-tech security and, some would say, paranoia. The justification for the presence of this network of surveillance, screening, detection and tracking systems is that it is the only sensible reaction to the fears for personal safety brought about by the school shootings and terrorist attacks of recent years - we must protect our children, perhaps even from their school friends. Casella here questions this assumption, shining an investigative light on the political and commercial forces that have led to the present climate of fear. He shows how expensive security equipment is sold in the same slick business-like way as any other commodity, and highlights the trend of turning schools into corporatized and militarized zones that prepare young people for a life spent accepting limitations of certain freedoms in return for an ill-defined and problematic concept of safety.
This book aims to provide new research methods, theories and applications from various areas of industrial economics and engineering. In detail, the included scientific papers analyse and describe communication processes in the fields of industrial economics, industrial system, industrial security and engineering and other related areas. The variety of the papers delivers added value for both scholars and practitioners. This book is the documentation of the IEIS 2021 conference. The book covers a great deal of research achievements in industrial restructuring strategy, industrial organization, industrial policy, departmental economic research, industrial competitiveness, regional industrial structure, national industrial economic security theory and empirical research, and it emphasizes on combining theory with practice. The book aims to discuss the issues in industrial economics and industrial security theories and practices. It is the documentation of IEIS 2021 conference, which took place at Shandong University. Due to the impact of COVID-19, it took place online as a virtual conference.
This open access book is a pedagogical, examples-based guide to using the Monte Carlo N-Particle (MCNP (R)) code for nuclear safeguards and non-proliferation applications. The MCNP code, general-purpose software for particle transport simulations, is widely used in the field of nuclear safeguards and non-proliferation for numerous applications including detector design and calibration, and the study of scenarios such as measurement of fresh and spent fuel. This book fills a gap in the existing MCNP software literature by teaching MCNP software usage through detailed examples that were selected based on both student feedback and the real-world experience of the nuclear safeguards group at Los Alamos National Laboratory. MCNP input and output files are explained, and the technical details used in MCNP input file preparation are linked to the MCNP code manual. Benefiting from the authors' decades of experience in MCNP simulation, this book is essential reading for students, academic researchers, and practitioners whose work in nuclear physics or nuclear engineering is related to non-proliferation or nuclear safeguards. Each chapter comes with downloadable input files for the user to easily reproduce the examples in the text.
This book comprises a set of chapters that introduce various topics pertinent to novel approaches towards enhancing cyber-physical measures for increased security and resilience levels in control systems. The unifying theme of these approaches lies in the utilization of knowledge and models of the physical systems, rather than an attempt to reinvigorate conventional IT-based security measures. The contributing authors present perspectives on network security, game theory, and control, as well as views on how these disciplines can be combined to design resilient, safe, and secure control systems. The book explores how attacks in different forms, such as false data injections and denial-of-service can be very harmful, and may not be detected unless the security measures exploit the physical models. Several applications are discussed, power systems being considered most thoroughly. Because of its interdisciplinary nature-techniques from systems control, game theory, signal processing and computer science all make contributions-Security and Resilience of Control Systems will be of interest to academics, practitioners and graduate students with a broad spectrum of interests.
This book aims to provide new research methods, theories and applications from various areas of industrial economics and engineering. In detail, the included scientific papers analyse and describe communication processes in the fields of industrial economics, industrial system, industrial security and engineering and other related areas. The variety of the papers delivers added value for both scholars and practitioners. This book is the documentation of the IEIS 2021 conference. The book covers a great deal of research achievements in industrial restructuring strategy, industrial organization, industrial policy, departmental economic research, industrial competitiveness, regional industrial structure, national industrial economic security theory and empirical research, and it emphasizes on combining theory with practice. The book aims to discuss the issues in industrial economics and industrial security theories and practices. It is the documentation of IEIS 2021 conference, which took place at Shandong University. Due to the impact of COVID-19, it took place online as a virtual conference.
This book offers a comprehensive approach to the question of how artificial intelligence (AI) impacts politics, economy, and the society today. In this view, it is quintessential for understanding the complex nature of AI and its role in today's world. The book has been divided into three parts. Part one is devoted to the question of how AI will be used for security and defense purposes, including combat in war zones. Part two looks at the value added of AI and machine learning for decision-making in the fields of politics and business. Part three consists of case studies-covering the EU, the USA, Saudi Arabia, Portugal, and Poland-that discuss how AI is being used in the realms of politics, security and defense. The discussion in the book opens with the question of the nature of AI, as well as of ethics and the use of AI in combat. Subsequently, the argument covers issues as diverse as the militarization of AI, the use of AI in strategic studies and military strategy design. These topics are followed by an insight into AI and strategic communication (StratCom), including disinformation, as well as into AI and finance. The case-studies included in part 3 of the book offer a captivating overview of how AI is being employed to stimulate growth and development, to promote data- and evidence-driven policy-making, to enable efficient and inclusive digital transformation and other related issues. Written by academics and practitioners in an academically sound, yet approachable manner, this volume queries issues and topics that form the thrust of processes that transform world politics, economics and society. As such, this volume will serve as the primer for students, researchers, lectures and other professionals who seek to understand and engage with the variety of issues AI implicates.
This hands-on textbook introduces physics and nuclear engineering students to the experimental and theoretical aspects of fission physics for research and applications through worked examples and problem sets. The study of nuclear fission is currently undergoing a renaissance. Recent advances in the field create the opportunity to develop more reliable models of fission predictability and to supply measurements and data to critical applications including nuclear energy, national security and counter-proliferation, and medical isotope production. An Introduction to Nuclear Fission provides foundational knowledge for the next generation of researchers to contribute to nuclear fission physics. |
You may like...
Optics, Photonics and Laser Technology
Paulo A. Ribeiro, Maria Raposo
Hardcover
R2,674
Discovery Miles 26 740
Bifurcation and Buckling in Structures
Kiyohiro Ikeda, Kazuo Murota
Paperback
R2,517
Discovery Miles 25 170
The Entire Animal Kingdom - Perfect for…
Alison Steven
Hardcover
Designing with Computational…
Nadia Nedjah, Heitor Silverio Lopes, …
Hardcover
|