0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (2)
  • R500+ (316)
  • -
Status
Format
Author / Contributor
Publisher

Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems

Nuclear Non-proliferation and Arms Control Verification - Innovative Systems Concepts (Paperback, 1st ed. 2020): Irmgard... Nuclear Non-proliferation and Arms Control Verification - Innovative Systems Concepts (Paperback, 1st ed. 2020)
Irmgard Niemeyer, Mona Dreicer, Gotthard Stein
R5,629 Discovery Miles 56 290 Ships in 10 - 15 working days

This book strives to take stock of current achievements and existing challenges in nuclear verification, identify the available information and gaps that can act as drivers for exploring new approaches to verification strategies and technologies. With the practical application of the systems concept to nuclear disarmament scenarios and other, non-nuclear verification fields, it investigates, where greater transparency and confidence could be achieved in pursuit of new national or international nonproliferation and arms reduction efforts. A final discussion looks at how, in the absence of formal government-to-government negotiations, experts can take practical steps to advance the technical development of these concepts.

Advances in Cyber Security Analytics and Decision Systems (Paperback, 1st ed. 2020): Shishir K. Shandilya, Neal Wagner, Atulya... Advances in Cyber Security Analytics and Decision Systems (Paperback, 1st ed. 2020)
Shishir K. Shandilya, Neal Wagner, Atulya K. Nagar
R4,309 Discovery Miles 43 090 Ships in 10 - 15 working days

This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.

Advanced Nanomaterials for Detection of CBRN (Paperback, 1st ed. 2020): Janez Bonca, Sergei Kruchinin Advanced Nanomaterials for Detection of CBRN (Paperback, 1st ed. 2020)
Janez Bonca, Sergei Kruchinin
R5,111 Discovery Miles 51 110 Ships in 10 - 15 working days

This book is devoted to advanced materials and perspective sensors, which is one of the most important problems in nanotechnology and security. This book is useful for researchers, scientist and graduate students in the fields of solid state physics, nanotechnology and security.

Disruptive and Game Changing Technologies in Modern Warfare - Development, Use, and Proliferation (Paperback, 1st ed. 2020):... Disruptive and Game Changing Technologies in Modern Warfare - Development, Use, and Proliferation (Paperback, 1st ed. 2020)
Margaret E. Kosal
R4,084 Discovery Miles 40 840 Ships in 10 - 15 working days

This book explores and analyzes emerging innovations within today's most cutting-edge science and technology (S&T) areas, which are cited as carrying the potential to revolutionize governmental structures, economies, and international security. Some have argued that such technologies will yield doomsday scenarios and that military applications of such technologies have even greater potential than nuclear weapons to radically change the balance of power. As the United States looks to the future - whether dominated by extremist groups co-opting advanced weapons in the world of globalized non-state actors or states engaged in persistent regional conflicts in areas of strategic interest - new adversaries and new science and technology will emerge. Choices made today that affect science and technology will impact how ably the US can and will respond. Chapters within the book look at the changing strategic environment in which security operations are planned and conducted; how these impact science and technology policy choices made today; and predictions of how science and technology may play a beneficial or deleterious role in the future. Some game changing technologies have received global attention, while others may be less well known; the new technologies discussed within this proposal, as well as future discoveries, may significantly alter military capabilities and may generate new threats against military and civilian sectors.

Practical Information Security - A Competency-Based Education Course (Paperback, Softcover reprint of the original 1st ed.... Practical Information Security - A Competency-Based Education Course (Paperback, Softcover reprint of the original 1st ed. 2018)
Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud, Abdallah Wahbeh, Mahmoud Al-Qudah, …
R2,271 Discovery Miles 22 710 Ships in 10 - 15 working days

This textbook presents a practical introduction to information security using the Competency Based Education (CBE) method of teaching. The content and ancillary assessment methods explicitly measure student progress in the three core categories: Knowledge, Skills, and Experience, giving students a balance between background knowledge, context, and skills they can put to work. Students will learn both the foundations and applications of information systems security; safeguarding from malicious attacks, threats, and vulnerabilities; auditing, testing, and monitoring; risk, response, and recovery; networks and telecommunications security; source code security; information security standards; and compliance laws. The book can be used in introductory courses in security (information, cyber, network or computer security), including classes that don't specifically use the CBE method, as instructors can adjust methods and ancillaries based on their own preferences. The book content is also aligned with the Cybersecurity Competency Model, proposed by department of homeland security. The author is an active member of The National Initiative for Cybersecurity Education (NICE), which is led by the National Institute of Standards and Technology (NIST). NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.

Illustrated Encyclopedia of Building Services (Paperback): David Kut Illustrated Encyclopedia of Building Services (Paperback)
David Kut
R1,574 Discovery Miles 15 740 Ships in 12 - 19 working days

This book explains over 3,000 terms (over 200,000 words) and contains over 200 professionally drawn line illustrations. This practical handbook is intended for day to day use as a reference or as a source of enlightenment for anyone associated with the building and construction industry. It also provides comprehensive practical explanations of the many terms listed, giving guidance, examples of use and, in certain cases, cautionary remarks concerning aspects of the applications.

Transportation Security (Hardcover): Clifford Bragdon Transportation Security (Hardcover)
Clifford Bragdon
R2,792 R1,946 Discovery Miles 19 460 Save R846 (30%) Ships in 12 - 19 working days

Insecure transportation systems are costing our worldwide mobility-based economy as much as 6% of GDP annually. The effectiveness of security measures vary widely. In the United States, depending on the mode of transportation, it ranges from medium effectiveness for airports to low effectiveness for maritime, rail, transit, and intermodal activities. Situational awareness and interoperability are lacking as we try to deal with both natural and man-made disasters. Regardless of the transport mode, improvements are essential if governments and corporations are to address security planning, response, and national preparedness. Transportation Security examines this problem in a comprehensive manner and addresses security-based technologies and solutions to minimize risk.
* Covers air, sea, roadway, rail and public transport modes
* Offers technological solutions for mobility based problems in planning, logistics and policy to improve security, combat terrorism and ensure national preparedness
* Includes work of international experts & global examples related to transportation security"

Security by Design - Innovative Perspectives on Complex Problems (Paperback, Softcover reprint of the original 1st ed. 2018):... Security by Design - Innovative Perspectives on Complex Problems (Paperback, Softcover reprint of the original 1st ed. 2018)
Anthony J. Masys
R3,398 Discovery Miles 33 980 Ships in 10 - 15 working days

This edited book captures salient global security challenges and presents 'design' solutions in dealing with wicked problems. Through case studies and applied research this book reveals the many perspectives, tools and approaches to support security design. Security design thereby can support risk and threat analysis, risk communication, problem framing and development of interventions strategies. From the refugee crisis to economic slowdowns in emerging markets, from ever-rising numbers of terrorist and cyberattacks to global water shortages, to the proliferation of the Internet of Things and its impact on the security of our homes, cities and critical infrastructure, the current security landscape is diverse and complex. These global risks have been in the headlines in the last year (Global Risks Report) and pose significant security challenges both nationally and globally. In fact, national security is no longer just national. Non-state actors, cyber NGO, rising powers, and hybrid wars and crimes in strategic areas pose complex challenges to global security. In the words of Horst Rittel (1968):"Design is an activity, which aims at the production of a plan, which plan -if implemented- is intended to bring about a situation with specific desired characteristics without creating unforeseen and undesired side and after effects."

Evolution, Monitoring and Predicting Models of Rockburst - Precursor Information for Rock Failure (Paperback, Softcover reprint... Evolution, Monitoring and Predicting Models of Rockburst - Precursor Information for Rock Failure (Paperback, Softcover reprint of the original 1st ed. 2018)
Chunlai Wang
R1,644 Discovery Miles 16 440 Ships in 10 - 15 working days

This open access book focuses on investigating predicting precursor information and key points of rockburst in mining engineering through laboratory experiment, theoretical analysis, numerical simulation and case studies. Understanding the evolution patterns for the microstructure instability of rock is a prerequisite for rockburst prediction. The book provides a guide for readers seeking to understand the evolution patterns for the microstrucure of rock failure, the predicting key point of rock failure and the rockburst predicting model. It will be an essential reference to understand mechanism of rockburst and sheds new light on dynamic disasters prediction. Chapters are carefully developed to cover (1) The evolution patterns for the microstructure instability of rock; (2) Rockburst hazard monitoring and predicting criterion and predicting models. The book addresses the issue with a holistic and systematic approach that investigates the occurrence mechanism of rockburst based on the evolution patterns for the microstructure of rock failure and establishes the predicting model of rockburst. This book will be of interest to researchers of mining engineering, rock mechanics engineering and safety engineering.

Fault Tolerant Architectures for Cryptography and Hardware Security (Paperback, Softcover reprint of the original 1st ed.... Fault Tolerant Architectures for Cryptography and Hardware Security (Paperback, Softcover reprint of the original 1st ed. 2018)
Sikhar Patranabis, Debdeep Mukhopadhyay
R4,102 Discovery Miles 41 020 Ships in 10 - 15 working days

This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.

Game Theory for Managing Security in Chemical Industrial Areas (Paperback, Softcover reprint of the original 1st ed. 2018):... Game Theory for Managing Security in Chemical Industrial Areas (Paperback, Softcover reprint of the original 1st ed. 2018)
Laobing Zhang, Genserik Reniers
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book systematically studies how game theory can be used to improve security in chemical industrial areas, capturing the intelligent interactions between security managers and potential adversaries. The recent unfortunate terrorist attacks on critical infrastructures show that adversaries are intelligent and strategic. Game theoretic models have been extensively used in some domains to model these strategic adversaries. However, there is a lack of such advanced models to be employed by chemical security managers. In this book, game theoretic models for protecting chemical plants as well as clusters are proposed. Different equilibrium concepts are explored, with user-friendly explanation of how to reflect them to realistic cases. Based on efficient analysis of the properties of security issues in chemical plants/clusters, models in this book are capable to support resources allocations, cost-effectiveness analysis, cooperation incentives and alike.

Active Interrogation in Nuclear Security - Science, Technology and Systems (Paperback, Softcover reprint of the original 1st... Active Interrogation in Nuclear Security - Science, Technology and Systems (Paperback, Softcover reprint of the original 1st ed. 2018)
Igor Jovanovic, Anna S. Erickson
R4,618 Discovery Miles 46 180 Ships in 10 - 15 working days

This volume constitutes the state-of-the-art in active interrogation, widely recognized as indispensable methods for addressing current and future nuclear security needs. Written by a leading group of science and technology experts, this comprehensive reference presents technologies and systems in the context of the fundamental physics challenges and practical requirements. It compares the features, limitations, technologies, and impact of passive and active measurement techniques; describes radiation sources for active interrogation including electron and ion accelerators, intense lasers, and radioisotope-based sources; and it describes radiation detectors used for active interrogation. Entire chapters are devoted to data acquisition and processing systems, modeling and simulation, data interpretation and algorithms, and a survey of working active measurement systems. Active Interrogation in Nuclear Security is structured to appeal to a range of audiences, including graduate students, active researchers in the field, and policy analysts. The first book devoted entirely to active interrogation Presents a focused review of the relevant physics Surveys available technology Analyzes scientific and technology trends Provides historical and policy context Igor Jovanovic is a Professor of Nuclear Engineering and Radiological Sciences at the University of Michigan and has previously also taught at Penn State University and Purdue University. He received his Ph.D. from University of California, Berkeley and worked as physicist at Lawrence Livermore National Laboratory. Dr. Jovanovic has made numerous contributions to the science and technology of radiation detection, as well as the radiation sources for use in active interrogation in nuclear security. He has taught numerous undergraduate and graduate courses in areas that include radiation detection, nuclear physics, and nuclear security. At University of Michigan Dr. Jovanovic is the director of Neutron Science Laboratory and is also associated with the Center for Ultrafast Optical Science. Anna Erickson is an Assistant Professor in the Nuclear and Radiological Engineering Program of the G.W. Woodruff School of Mechanical Engineering at Georgia Institute of Technology. Previously, she was a postdoctoral researcher in the Advanced Detectors Group at Lawrence Livermore National Laboratory. Dr. Erickson received her PhD from Massachusetts Institute of Technology with a focus on radiation detection for active interrogation applications. Her research interests focus on nuclear non-proliferation including antineutrino analysis and non-traditional detector design and characterization. She teaches courses in advanced experimental detection for reactor and nuclear nonproliferation applications, radiation dosimetry and fast reactor analysis.

Emerging Energetic Materials: Synthesis, Physicochemical, and Detonation Properties (Paperback, Softcover reprint of the... Emerging Energetic Materials: Synthesis, Physicochemical, and Detonation Properties (Paperback, Softcover reprint of the original 1st ed. 2018)
Dabir S. Viswanath, Tushar K. Ghosh, Veera M. Boddu
R3,668 Discovery Miles 36 680 Ships in 10 - 15 working days

This book summarizes science and technology of a new generation of high-energy andinsensitive explosives. The objective is to provide professionals with comprehensiveinformation on the synthesis and the physicochemical and detonation properties ofthe explosives. Potential technologies applicable for treatment of contaminated wastestreams from manufacturing facilities and environmental matrices are also be included.This book provides the reader an insight into the depth and breadth of theoreticaland empirical models and experimental techniques currently being developed in thefield of energetic materials. It presents the latest research by DoD engineers andscientists, and some of DoD's academic and industrial researcher partners. The topicsexplored and the simulations developed or modified for the purposes of energetics mayfind application in other closely related fields, such as the pharmaceutical industry.One of the key features of the book is the treatment of wastewaters generated duringmanufacturing of these energetic materials.

Information Security Practices - Emerging Threats and Perspectives (Paperback, Softcover reprint of the original 1st ed. 2017):... Information Security Practices - Emerging Threats and Perspectives (Paperback, Softcover reprint of the original 1st ed. 2017)
Issa Traore, Ahmed Awad, Isaac Woungang
R3,635 Discovery Miles 36 350 Ships in 10 - 15 working days

This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners.

Biometric Security and Privacy - Opportunities & Challenges in The Big Data Era (Paperback, Softcover reprint of the original... Biometric Security and Privacy - Opportunities & Challenges in The Big Data Era (Paperback, Softcover reprint of the original 1st ed. 2017)
Richard Jiang, Somaya Al-Maadeed, Ahmed Bouridane, Prof. Danny Crookes, Azeddine Beghdadi
R4,388 Discovery Miles 43 880 Ships in 10 - 15 working days

This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as cancellable biometrics and soft biometrics. The book also focuses on several emerging topics such as big data issues, internet of things, medical biometrics, healthcare, and robot-human interactions. The authors show how these new applications have triggered a number of new biometric approaches. They show, as an example, how fuzzy extractor has become a useful tool for key generation in biometric banking, and vein/heart rates from medical records can also be used to identify patients. The contributors cover the topics, their methods, and their applications in depth.

Nanostructured Materials for the Detection of CBRN (Paperback, 1st ed. 2018): Janez Bonca, Sergei Kruchinin Nanostructured Materials for the Detection of CBRN (Paperback, 1st ed. 2018)
Janez Bonca, Sergei Kruchinin
R4,371 Discovery Miles 43 710 Ships in 10 - 15 working days

This book includes topics in nanophysics, nanotechnology, nanomaterials, sensors, biosensors, security systems, and CBRN agents detection. There have been many significant advances in the past two years and some entirely new directions of research are just opening up. Recent developments in nanotechnology and measurement techniques now allow experimental investigation of the physical properties of nanostructured materials. The book presents new methods for the detection of chemical, biological, radiological and nuclear (CBRN) agents using chemical and biochemical sensors. Identification, protection and decontamination are the main scientific and technological responses for the modern challenges of CBRN agents.

Compressive Sensing Based Algorithms for Electronic Defence (Paperback, Softcover reprint of the original 1st ed. 2017): Amit... Compressive Sensing Based Algorithms for Electronic Defence (Paperback, Softcover reprint of the original 1st ed. 2017)
Amit Kumar Mishra, Ryno Strauss Verster
R3,611 Discovery Miles 36 110 Ships in 10 - 15 working days

This book details some of the major developments in the implementation of compressive sensing in radio applications for electronic defense and warfare communication use. It provides a comprehensive background to the subject and at the same time describes some novel algorithms. It also investigates application value and performance-related parameters of compressive sensing in scenarios such as direction finding, spectrum monitoring, detection, and classification.

Multimedia Forensics and Security - Foundations, Innovations, and Applications (Paperback, Softcover reprint of the original... Multimedia Forensics and Security - Foundations, Innovations, and Applications (Paperback, Softcover reprint of the original 1st ed. 2017)
Aboul Ella Hassanien, Mohamed Mostafa Fouad, Azizah Abdul Manaf, Mazdak Zamani, Rabiah Ahmad, …
R2,912 Discovery Miles 29 120 Ships in 10 - 15 working days

This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court.

SiGe-based Re-engineering of Electronic Warfare Subsystems (Paperback, Softcover reprint of the original 1st ed. 2017): Wynand... SiGe-based Re-engineering of Electronic Warfare Subsystems (Paperback, Softcover reprint of the original 1st ed. 2017)
Wynand Lambrechts, Saurabh Sinha
R2,890 Discovery Miles 28 900 Ships in 10 - 15 working days

This book provides readers a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for electronic warfare and defensive countermeasures in military contexts. It explains in detail the theoretical and technical background, and addresses all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne / spaceborne electronic warfare, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, to date only limited information has been available on its use in electronic warfare systems, especially in developing nations. Addressing that need, this book offers essential engineering guidelines that especially focus on the speed and reliability of current-generation SiGe circuits and highlight emerging innovations that help to ensure the sustainable long-term integration of SiGe into electronic warfare systems.

Computational Personality Analysis - Introduction, Practical Applications and Novel Directions (Paperback, Softcover reprint of... Computational Personality Analysis - Introduction, Practical Applications and Novel Directions (Paperback, Softcover reprint of the original 1st ed. 2016)
Yair Neuman
R2,628 Discovery Miles 26 280 Ships in 10 - 15 working days

The emergence of intelligent technologies, sophisticated natural language processing methodologies and huge textual repositories, invites a new approach for the challenge of automatically identifying personality dimensions through the analysis of textual data. This short book aims to (1) introduce the challenge of computational personality analysis, (2) present a unique approach to personality analysis and (3) illustrate this approach through case studies and worked-out examples. This book is of special relevance to psychologists, especially those interested in the new insights offered by new computational and data-intensive tools, and to computational social scientists interested in human personality and language processing.

Dynamics and Design of Space Nets for Orbital Capture (Paperback, Softcover reprint of the original 1st ed. 2017): Leping Yang,... Dynamics and Design of Space Nets for Orbital Capture (Paperback, Softcover reprint of the original 1st ed. 2017)
Leping Yang, Qingbin Zhang, Ming Zhen, Haitao Liu
R3,373 Discovery Miles 33 730 Ships in 10 - 15 working days

This book covers the topics of theoretical principles, dynamics model and algorithm, mission analysis, system design and experimental studies of space nets system, aiming to provide an initial framework in this field and serve as a ready reference for those interested. Space nets system represents a forefront field in future development of aerospace technologies. However, it involves new challenges and problems such as nonlinear and distorted nets structure, complex rigid flexible coupling dynamics, orbital transfer of space flexible composite and dynamics control. Currently, no comprehensive books on space nets dynamics and design are available, so potential readers can get to know the working mechanism, dynamics elements, and mission design of the space nets system from a Chinese perspective.

Unconventional Conflict - A Modeling Perspective (Paperback, Softcover reprint of the original 1st ed. 2017): Dean S. Hartley... Unconventional Conflict - A Modeling Perspective (Paperback, Softcover reprint of the original 1st ed. 2017)
Dean S. Hartley III
R2,382 Discovery Miles 23 820 Ships in 10 - 15 working days

This book describes issues in modeling unconventional conflict and suggests a new way to do the modeling. It presents an ontology that describes the unconventional conflict domain, which allows for greater ease in modeling unconventional conflict. Supporting holistic modeling, which means that we can see the entire picture of what needs to be modeled, the ontology allows us to make informed decisions about what to model and what to omit. The unconventional conflict ontology also separates the things we understand best from the things we understand least. This separation means that we can perform verification, validation and accreditation (VV&A) more efficiently and can describe the competence of the model more accurately. However, before this message can be presented in its entirety the supporting body of knowledge has to be explored. For this reason, the book offers chapters that focus on the description of unconventional conflict and the analyses that have been performed, modeling, with a concentration on past efforts at modeling unconventional conflict, the precursors to the ontology, and VV&A. Unconventional conflict is a complex, messy thing. It normally involves multiple actors, with their own conflicting agendas and differing concepts of legitimate actions. This book will present a useful introduction for researchers and professionals within the field.

A Group Theoretic Approach to Quantum Information (Paperback, Softcover reprint of the original 1st ed. 2017): Masahito Hayashi A Group Theoretic Approach to Quantum Information (Paperback, Softcover reprint of the original 1st ed. 2017)
Masahito Hayashi
R2,170 Discovery Miles 21 700 Ships in 10 - 15 working days

This book is the first one addressing quantum information from the viewpoint of group symmetry. Quantum systems have a group symmetrical structure. This structure enables to handle systematically quantum information processing. However, there is no other textbook focusing on group symmetry for quantum information although there exist many textbooks for group representation. After the mathematical preparation of quantum information, this book discusses quantum entanglement and its quantification by using group symmetry. Group symmetry drastically simplifies the calculation of several entanglement measures although their calculations are usually very difficult to handle. This book treats optimal information processes including quantum state estimation, quantum state cloning, estimation of group action and quantum channel etc. Usually it is very difficult to derive the optimal quantum information processes without asymptotic setting of these topics. However, group symmetry allows to derive these optimal solutions without assuming the asymptotic setting. Next, this book addresses the quantum error correcting code with the symmetric structure of Weyl-Heisenberg groups. This structure leads to understand the quantum error correcting code systematically. Finally, this book focuses on the quantum universal information protocols by using the group SU(d). This topic can be regarded as a quantum version of the Csiszar-Korner's universal coding theory with the type method. The required mathematical knowledge about group representation is summarized in the companion book, Group Representation for Quantum Theory.

Global Insecurity - Futures of Global Chaos and Governance (Paperback, Softcover reprint of the original 1st ed. 2017): Anthony... Global Insecurity - Futures of Global Chaos and Governance (Paperback, Softcover reprint of the original 1st ed. 2017)
Anthony Burke, Rita Parker
R3,622 Discovery Miles 36 220 Ships in 10 - 15 working days

This innovative volume gathers some of the world's best scholars to analyse the world's collective international efforts to address globalised threats through global security governance. Addressing global and planetary forms of insecurity that include nuclear weapons, conventional arms, gender violence, climate change, disease, bio weapons, cyber-conflict, children in conflict, crimes against humanity, and refugees, this timely book critiques how they are addressed by global institutions and regimes, and advocates important conceptual, institutional, and policy reforms. This is an invaluable resource for students, scholars and policymakers in international health, security and development.

Reforming Civil-Military Relations in New Democracies - Democratic Control and Military Effectiveness in Comparative... Reforming Civil-Military Relations in New Democracies - Democratic Control and Military Effectiveness in Comparative Perspectives (Paperback, Softcover reprint of the original 1st ed. 2017)
Aurel Croissant, David Kuehn
R4,348 Discovery Miles 43 480 Ships in 10 - 15 working days

This book addresses the challenge of reforming defense and military policy-making in newly democratized nations. By tracing the development of civil-military relations in various new democracies from a comparative perspective, it links two bodies of scholarship that thus far have remained largely separate: the study of emerging (or failed) civilian control over armed forces on the one hand; and work on the roots and causes of military effectiveness to guarantee the protection and security of citizens on the other. The empirical and theoretical findings presented here will appeal to scholars of civil-military relations, democratization and security issues, as well as to defense policy-makers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Statistical Mechanics of Financial…
Johannes Voit Hardcover R2,198 Discovery Miles 21 980
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R3,056 Discovery Miles 30 560
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, … Paperback R2,667 R2,514 Discovery Miles 25 140
Open Source Cloud Computing Systems…
Luis M. Vaquero, Juan Caceres, … Hardcover R5,319 Discovery Miles 53 190
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,473 Discovery Miles 24 730
Robust Chaos And Its Applications
Zeraoulia Elhadj, Julien Clinton Sprott Hardcover R4,417 Discovery Miles 44 170
Networks-on-Chip - From Implementations…
Sheng Ma, Libo Huang, … Paperback R1,321 Discovery Miles 13 210
Management Principles - A Contemporary…
T. Botha, M. Vrba, … Paperback R550 R520 Discovery Miles 5 200
Best Practices and New Perspectives in…
Patricia Ordonez De Pablos, Robert Tennyson Hardcover R5,128 Discovery Miles 51 280
Manhunter - The Art of Tracking
Ian Maxwell Hardcover R619 R572 Discovery Miles 5 720

 

Partners