![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems
This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with concrete examples to enhance the reader's understanding. This volume achieves a balance between the theoretical and the practical components of modern information security. Readers will learn key principles of homomorphic encryption as well as their application in solving real world problems.
In constant effort to eliminate mine danger, international mine action community has been developing safety, efficiency and cost-effectiveness of clearance methods. Demining machines have become necessary when conducting humanitarian demining where the mechanization of demining provides greater safety and productivity. Design of Demining Machines describes the development and testing of modern demining machines in humanitarian demining. Relevant data for design of demining machines are included to explain the machinery implemented and some innovative and inspiring development solutions. Development technologies, companies and projects are discussed to provide a comprehensive estimate of the effects of various design factors and to proper selection of optimal parameters for designing the demining machines. Covering the dynamic processes occurring in machine assemblies and their components to a broader understanding of demining machine as a whole, Design of Demining Machines is primarily tailored as a text for the study of the fundamentals and engineering techniques involved in the calculation and design of demining machines. It will prove as useful resource for engineers, designers, researchers and policy makers working in this field.
The topics discussed at the NATO Advanced Research Workshop Nanotechnology in the Security Systems" included nanophysics, nanotechnology, nanomaterials, sensors, biosensors security systems, explosivedetection. There have been many significant advances in the past two years and some entirely new directions of research are just opening up.Recent advances in nano science have demonstrated that fundamentally new physical phenomena are found when systems are reduced in size with dimensions, comparable to the fundamental microscopic length scales of the investigated material. Recent developments in nanotechnology and measurement techniques now allow experimental investigation of transport properties of nano devices. This work will be of interest to researchers working in spintronics, molecular electronicsand quantum information processing."
"Space Sleuths of the Cold War" relates for the first time the inside story of the amateur spies who monitored the Soviet space program during the Cold War. It is written by many of those "space sleuths" themselves and chronicles the key moments in their discovery of hidden history. This book shows that dedicated observers were often better than professionals at interpreting that information coming out of the USSR during the dark days of the Cold War. This book takes a unique approach to the history of Soviet spaceflight - looking at the personal stories of some of the researchers as well as the space secrets the Soviets tried to keep hidden. The fascinating account often reads like a Cold War espionage novel. "Space Sleuths of the Cold War" includes an impressive list of contributors, such as: Editor Dominic Phelan, giving an overall history of the Cold War hunt for Soviet space secrets. Space writer Brian Harvey reveals his own personal search through official Soviet radio and magazines to find out what they were (and weren't) revealing to the outside world at the height of the space race. Sven Grahn from Sweden details his own 40 year quest to understand what was happening on the other side of the Iron Curtain. Professional American historian Asif Siddiqi explores his own adventures in the once secret Russian archives - often seeing documents never before read by Westerners. Dutch cosmonaut researcher Bert Vis provides an inside account of the Yuri Gagarin training center in Moscow. Belgian researcher Bart Hendrickx's details his important translation of the 1960s' diaries of cosmonaut team leader General Kamanin. Pioneer space sleuth James Oberg's shares his memories of his own notable 'scoops.' Paris-based writer Christian Lardier recounts the efforts of French space sleuths - whose work was frequently overlooked in the USA and Britain because of the language barrier.
Multimedia surveillance systems is an emerging field that includes signal and image processing, communications, and computer vision. Multimedia Video-Based Surveillance Systems: Requirements, Issues and Solutions, combines the most recent research results from these areas for use by engineers and end-users involved in the design of surveillance systems in the fields of transportation and services. The book covers emerging surveillance requirements, including new digital sensors for real-time acquisition of surveillance data, low-level image processing algorithms, and event detection methods. It also discusses problems related to knowledge representation in surveillance systems, wireless and wired multimedia networks, and a new generation of surveillance communication tools. Timely information is presented on digital watermarking, broadband multimedia transmission, legal use of surveillance systems, performance evaluation criteria, and other new and emerging topics, along with applications for transports and pedestrian monitoring. The information contained in Multimedia Video-Based Surveillance Systems: Requirements, Issues and Solutions, bridges the distance between present practice and research findings, and the book is an indispensable reference tool for professional engineers.
In constant effort to eliminate mine danger, international mine action community has been developing safety, efficiency and cost-effectiveness of clearance methods. Demining machines have become necessary when conducting humanitarian demining where the mechanization of demining provides greater safety and productivity. "Design of Demining Machines" describes the development and testing of modern demining machines in humanitarian demining. Relevant data for design of demining machines are included to explain the machinery implemented and some innovative and inspiring development solutions. Development technologies, companies and projects are discussed to provide a comprehensive estimate of the effects of various design factors and to proper selection of optimal parameters for designing the demining machines. Covering the dynamic processes occurring in machine assemblies and their components to a broader understanding of demining machine as a whole, "Design of Demining Machines" is primarily tailored as a text for the study of the fundamentals and engineering techniques involved in the calculation and design of demining machines. It will prove as useful resource for engineers, designers, researchers and policy makers working in this field.
The threat of biological and chemical terrorism has driven the demand for timely techniques that can quickly detect the agent or agents used in an attack. The detection and/or prevention of these potential security threats provide significant scientific and technical challenges due to the combination of possible agents and modes of delivery available. This book will present a thorough look at the importance and technological challenges of mass spectrometry (MS) for the detection & identification of biological and chemical threats. This new contribution's general aims are to draw the attention of recognized practitioners, experts and graduate students trying to grasp the latest MS developments in the cutting-edge fields of MS-biodefense technologies for the rapid/early/specific sensitive threat detection of pathogens, viruses, explosives, mycotoxins, chemical agents, and biological markers of xenobiotic chemicals.
The threat of biological and chemical terrorism has driven the demand for timely techniques that can quickly detect the agent or agents used in an attack. The detection and/or prevention of these potential security threats provide significant scientific and technical challenges due to the combination of possible agents and modes of delivery available. This book will present a thorough look at the importance and technological challenges of mass spectrometry (MS) for the detection & identification of biological and chemical threats. This new contribution's general aims are to draw the attention of recognized practitioners, experts and graduate students trying to grasp the latest MS developments in the cutting-edge fields of MS-biodefense technologies for the rapid/early/specific sensitive threat detection of pathogens, viruses, explosives, mycotoxins, chemical agents, and biological markers of xenobiotic chemicals.
This book constitutes the refereed proceedings of the Second NSF Workshop on Biosurveillance Systems and Case Studies, BioSurveillance 2007, held in New Brunswick, NJ, USA in May 2007, co-located with the 2007 IEEE International Conference on Intelligence and Security Informatics (ISI 2007). The 17 revised full papers, 6 revised short papers presented together with 1 invited talk and 2 poster papers were carefully reviewed and selected for inclusion in the book. Bringing together infectious disease informatics (IDI) researchers and practitioners to discuss selected topics directly relevant to data sharing and analysis for real-time animal and public health surveillance, the workshop covers a wide range of backgrounds such as epidemiology, statistics, applied mathematics, information systems, computer science and machine learning/data mining.
This book constitutes the refereed proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection, RAID 2002, held in Zurich, Switzerland, in October 2002. The 16 revised full papers presented were carefully reviewed and selected from a total of 81 submissions. The papers are organized in topical sections on stepping stone detection, anomality detection, correlation, legal aspects and intrusion tolerance, assessment of intrusion detection systems, adaptive intrusion detection systems, intrusion detection analysis.
Private security is now a multi-billion pound industry employing more personnel than the police. The authors provide incisive insights into the security world, scanning its weaknesses and exploring its potential. Based upon original research, supported by years of experience, they suggest that new ways of looking at the modern security world are long overdue. Private Security is a highly innovative book containing a wealth of up-to-date material. It is the definitive guide to the security world.
This book follows the methodologies of complex adaptive systems research in their application to addressing the problems of terrorism, specifically terrorist networks, their structure and various methods of mapping and interdicting them as well as exploring the complex landscape of network-centric and irregular warfare. A variety of new models and approaches are presented here, including Dynamic Network Analysis, DIME/PMESII models, percolation models and emergent models of insurgency. In addition, the analysis is informed by practical experience, with analytical and policy guidance from authors who have served within the U.S. Department of Defense, the British Ministry of Defence as well as those who have served in a civilian capacity as advisors on terrorism and counter-terrorism.
Even before the outbreak of the COVID-19 pandemic, the Central Region faced numerous obstacles to building a stable and prosperous future. The region, which encompasses the Middle East, the Horn of Africa, Central Asia, and South Asia, has been plagued by economic and political uncertainty amidst dramatic shifts in the global power structure. With the pandemic now exacerbating the volatility in this already fragile region, the U.S.'s strategic objectives are rife for re-examination. A complicated stew of factors such as weakening of established governance systems, the emboldening of extremist individuals and groups through advances in digital technology, the humanitarian crises in Afghanistan and Syria, and the intensification of the great power competition with China and Russia are creating a fertile environment for the growth of violent extremist organizations (VEOs). Such organizations take advantage of vulnerable, aggrieved, and traumatized populations to fuel radicalization, recruitment, and unrest, which further undermine stability and the potential for peace and prosperity. While it is still early to fully understand how the ongoing response to the COVID-19 pandemic will impact U.S. policy, this book provides a timely analysis of relevant dynamics such as popular radicalization, digital information ecosystems, networks of influence, and new capabilities to recognize and prepare for other such black swan events in the region.
The purpose of this book is to provide graduate students, professional engineers, military officers, and weapons-systems planners with a comprehensive grounding in the technology, evolution, functions, costs, impacts on society, utility, and limi tations of modern strategic weapons systems. Since the subject is often left to the specialists, this work should introduce the general reader to the fundamentals of such systems in an informed manner. Nowadays the intense interaction of means and ends sym bolized by strategic weapons has stimulated a changing dis cipline in which new missile systems and the intricate logic of nuclear force and counterforce hold the stage alongside the truths of conflict, alliances, fears, games, and subtle gains and losses. Many readers with new personal interest or public responsibility in this complex field will require an overall guide to it. This book will not prepare the reader to become an expert in the vast subject of strategic weapons systems. It will, however, enable him to understand, evaluate, and form reasonable opinions about these systems, their capabilities and effective ness. The subject is dealt with more from the viewpoint of the user (investor) rather than the architect (systems engineer) and builder (design engineer). While the user will be concerned with both political as well as technical options which may be available to solve a problem, the systems and design engineers are concerned with analyzing and building technological weapons devices once their requirements are generally known."
A collection of papers that address such issues as model limits and reliability, emerging expert systems and integrated gas and solid phase combustion simulation models.
While it has become increasingly apparent that individuals and organizations need a security metrics program, it has been exceedingly difficult to define exactly what that means in a given situation. There are hundreds of metrics to choose from and an organization's mission, industry, and size will affect the nature and scope of the task as well as the metrics and combinations of metrics appropriate to accomplish it. Finding the correct formula for a specific scenario calls for a clear concise guide with which to navigate this sea of information. Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI defines more than 900 ready to use metrics that measure compliance, resiliency, and return on investment. The author explains what needs to be measured, why and how to measure it, and how to tie security and privacy metrics to business goals and objectives. The book addresses measuring compliance with current legislation, regulations, and standards in the US, EC, and Canada including Sarbanes-Oxley, HIPAA, and the Data Protection Act-UK. The metrics covered are scaled by information sensitivity, asset criticality, and risk, and aligned to correspond with different lateral and hierarchical functions within an organization. They are flexible in terms of measurement boundaries and can be implemented individually or in combination to assess a single security control, system, network, region, or the entire enterprise at any point in the security engineering lifecycle. The text includes numerous examples and sample reports to illustrate these concepts and stresses a complete assessment by evaluating the interaction and interdependence between physical, personnel, IT, and operational security controls. Bringing a wealth of complex information into comprehensible focus, this book is ideal for corporate officers, security managers, internal and independent auditors, and system developers and integrators.
Equipment developed for wartime is now being seen more often in everyday institutions, and even our schools have become sites of high-tech security and, some would say, paranoia. The justification for the presence of this network of surveillance, screening, detection and tracking systems is that it is the only sensible reaction to the fears for personal safety brought about by the school shootings and terrorist attacks of recent years - we must protect our children, perhaps even from their school friends. Casella here questions this assumption, shining an investigative light on the political and commercial forces that have led to the present climate of fear. He shows how expensive security equipment is sold in the same slick business-like way as any other commodity, and highlights the trend of turning schools into corporatized and militarized zones that prepare young people for a life spent accepting limitations of certain freedoms in return for an ill-defined and problematic concept of safety.
This timely book examines how the South African National Defence Force has adapted to the country's new security, political and social environment since 1994. In South Africa's changed political state, how has civilian control of the military been implemented and what does this mean for 'defence in a democracy'? This book presents an overview of the security environment, how the mission focus of the military has changed and the implications for force procurement, force preparation, force employment and force sustainability. The author addresses other issues, such as: * the effect of integrating former revolutionary soldiers into a professional armed force * the effect of affirmative action on meritocracy, recruitment and retention * military veterans, looking at the difficulties they face in reintegrating back into society and finding gainful employment * gender equality and mainstreaming * the rise of military unions and why a confrontational, instead of a more corporatist approach to labour relations has emerged * HIV/AIDS and the consequences this holds for the military in terms of its operational effectiveness. In closing, the author highlights key events that have caused the SANDF to become 'lost in transition and transformation', spelling out some lessons learned. The conclusions she draws are pertinent for the future of defence, security and civil-military relations of countries around the world.
This book provides an essential compilation of relevant and cutting edge academic and industry work on key cybersecurity applications topics. Further, it introduces cybersecurity applications to the public at large to develop their cybersecurity applications knowledge and awareness. The book concentrates on a wide range of advances related to Cybersecurity Applications which include, among others, applications in the areas of Data Science, Internet of Things, Artificial Intelligence, Robotics, Web, High-Tech Systems, Cyber-Physical Systems, Mobile Devices, Digital Media, and Cloud Computing. It introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity application specialists and educators for keeping current their cybersecurity applications knowledge. Further, it provides a glimpse of future directions where cybersecurity applications are headed. The book can be a valuable resource to applied cybersecurity experts towards their professional development efforts and to students as a supplement to their cybersecurity courses.
This book aims to provide new research methods, theories and applications from various areas of industrial economics and engineering. In detail, the included scientific papers analyse and describe communication processes in the fields of industrial economics, industrial system, industrial security and engineering and other related areas. The variety of the papers delivers added value for both scholars and practitioners. This book is the documentation of the IEIS 2021 conference. The book covers a great deal of research achievements in industrial restructuring strategy, industrial organization, industrial policy, departmental economic research, industrial competitiveness, regional industrial structure, national industrial economic security theory and empirical research, and it emphasizes on combining theory with practice. The book aims to discuss the issues in industrial economics and industrial security theories and practices. It is the documentation of IEIS 2021 conference, which took place at Shandong University. Due to the impact of COVID-19, it took place online as a virtual conference.
This book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future. The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies - weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that promise an increase in safety and security when it comes to the dangers posed by these terrorists. This part also includes a critical discussion of advantages and disadvantages of such technologies that are, quite often, sold as a 'silver bullet' approach in the fight against terrorism. Controversies such as those triggered by the abuse of millimeter wave scanners deployed at several Western European airports will demonstrate that there are costs involved with regard to human rights. The third, analytical part takes the critical discussion further by arguing that the uncritical fielding of new surveillance and control technologies in parallel with the on-going outsourcing and privatization of key services of the state could well lead to dystopias as envisaged in a rather prescient way by the so-called cyperpunk novels of the 1980s. The book concludes with the question that any liberal democracy should ask itself: how far can we go with regard to hardening our societies against terrorist threats?
In this book, the authors present their theoretical, experimental and numerical investigations into concrete structures subjected to projectile and aircraft impacts in recent years. Innovative approaches to analyze the rigid, mass abrasive and eroding projectile penetration and perforation are proposed. Damage and failure analyses of nuclear power plant containments impacted by large commercial aircrafts are numerically and experimentally analyzed. Ultra-high performance concrete materials and structures against the projectile impact are developed and their capacities of resisting projectile impact are evaluated. This book is written for the researchers, engineers and graduate students in the fields of protective structures and terminal ballistics.
This book comprises a set of chapters that introduce various topics pertinent to novel approaches towards enhancing cyber-physical measures for increased security and resilience levels in control systems. The unifying theme of these approaches lies in the utilization of knowledge and models of the physical systems, rather than an attempt to reinvigorate conventional IT-based security measures. The contributing authors present perspectives on network security, game theory, and control, as well as views on how these disciplines can be combined to design resilient, safe, and secure control systems. The book explores how attacks in different forms, such as false data injections and denial-of-service can be very harmful, and may not be detected unless the security measures exploit the physical models. Several applications are discussed, power systems being considered most thoroughly. Because of its interdisciplinary nature-techniques from systems control, game theory, signal processing and computer science all make contributions-Security and Resilience of Control Systems will be of interest to academics, practitioners and graduate students with a broad spectrum of interests.
This book aims to provide new research methods, theories and applications from various areas of industrial economics and engineering. In detail, the included scientific papers analyse and describe communication processes in the fields of industrial economics, industrial system, industrial security and engineering and other related areas. The variety of the papers delivers added value for both scholars and practitioners. This book is the documentation of the IEIS 2021 conference. The book covers a great deal of research achievements in industrial restructuring strategy, industrial organization, industrial policy, departmental economic research, industrial competitiveness, regional industrial structure, national industrial economic security theory and empirical research, and it emphasizes on combining theory with practice. The book aims to discuss the issues in industrial economics and industrial security theories and practices. It is the documentation of IEIS 2021 conference, which took place at Shandong University. Due to the impact of COVID-19, it took place online as a virtual conference.
This book offers a comprehensive approach to the question of how artificial intelligence (AI) impacts politics, economy, and the society today. In this view, it is quintessential for understanding the complex nature of AI and its role in today's world. The book has been divided into three parts. Part one is devoted to the question of how AI will be used for security and defense purposes, including combat in war zones. Part two looks at the value added of AI and machine learning for decision-making in the fields of politics and business. Part three consists of case studies-covering the EU, the USA, Saudi Arabia, Portugal, and Poland-that discuss how AI is being used in the realms of politics, security and defense. The discussion in the book opens with the question of the nature of AI, as well as of ethics and the use of AI in combat. Subsequently, the argument covers issues as diverse as the militarization of AI, the use of AI in strategic studies and military strategy design. These topics are followed by an insight into AI and strategic communication (StratCom), including disinformation, as well as into AI and finance. The case-studies included in part 3 of the book offer a captivating overview of how AI is being employed to stimulate growth and development, to promote data- and evidence-driven policy-making, to enable efficient and inclusive digital transformation and other related issues. Written by academics and practitioners in an academically sound, yet approachable manner, this volume queries issues and topics that form the thrust of processes that transform world politics, economics and society. As such, this volume will serve as the primer for students, researchers, lectures and other professionals who seek to understand and engage with the variety of issues AI implicates. |
You may like...
McGuffey's Fifth Eclectic Reader Revised…
William Holmes 1800-1873 McGuffey
Hardcover
R919
Discovery Miles 9 190
|