![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems
This book is about the strategic relevance of quantum technologies. It debates the military-specific aspects of this technology. Various chapters of this book cohere around two specific themes. The first theme discusses the global pattern of ongoing civilian and military research on quantum computers, quantum cryptography, quantum communications and quantum internet. The second theme explicitly identifies the relevance of these technologies in the military domain and the possible nature of quantum technology-based weapons. This thread further debates on quantum (arms) race at a global level in general, and in the context of the USA and China, in particular. The book argues that the defence utility of these technologies is increasingly becoming obvious and is likely to change the nature of warfare in the future.
This book provides basics and selected advanced insights on how to generate reliability, safety and resilience within (socio) technical system developments. The focus is on working definitions, fundamental development processes, safety development processes and analytical methods on how to support such schemes. The method families of Hazard Analyses, Failure Modes and Effects Analysis and Fault Tree Analysis are explained in detail. Further main topics include semiformal graphical system modelling, requirements types, hazard log, reliability prediction standards, techniques and measures for reliable hardware and software with respect to systematic and statistical errors, and combination options of methods. The book is based on methods as applied during numerous applied research and development projects and the support and auditing of such projects, including highly safety-critical automated and autonomous systems. Numerous questions and answers challenge students and practitioners.
This book tells the story of government-sponsored wiretapping in Britain and the United States from the rise of telephony in the 1870s until the terrorist attacks of 9/11. It pays particular attention to the 1990s, which marked one of the most dramatic turns in the history of telecommunications interception. During that time, fiber optic and satellite networks rapidly replaced the copper-based analogue telephone system that had remained virtually unchanged since the 1870s. That remarkable technological advance facilitated the rise of the networked home computer, cellular telephony, and the Internet, and users hailed the dawn of the digital information age. However, security agencies such as the FBI and MI5 were concerned. Since the emergence of telegraphy in the 1830s, security services could intercept private messages using wiretaps, and this was facilitated by some of the world's largest telecommunications monopolies such as AT&T in the US and British Telecom in the UK. The new, digital networks were incompatible with traditional wiretap technology. To make things more complicated for the security services, these monopolies had been privatized and broken up into smaller companies during the 1980s, and in the new deregulated landscape the agencies had to seek assistance from thousands of startup companies that were often unwilling to help. So for the first time in history, technological and institutional changes posed a threat to the security services' wiretapping activities, and government officials in Washington and London acted quickly to protect their ability to spy, they sought to force the industry to change the very architecture of the digital telecommunications network. This book describes in detail the tense negotiations between governments, the telecommunications industry, and civil liberties groups during an unprecedented moment in history when the above security agencies were unable to wiretap. It reveals for the first time the thoughts of some of the protagonists in these crucial negotiations, and explains why their outcome may have forever altered the trajectory of our information society.
This book emphasizes recent advances in the creation of biometric identification systems for various applications in the field of human activity. The book displays the problems that arise in modern systems of biometric identification, as well as the level of development and prospects for the introduction of biometric technologies. The authors classify biometric technologies into two groups, distinguished according to the type of biometric characteristics used. The first group uses static biometric parameters: fingerprints, hand geometry, retina pattern, vein pattern on the finger, etc. The second group uses dynamic parameters for identification: the dynamics of the reproduction of a signature or a handwritten keyword, voice, gait, dynamics of work on the keyboard, etc. The directions of building information systems that use automatic personality identification based on the analysis of unique biometric characteristics of a person are discussed. The book is intended for professionals working and conducting research in the field of intelligent information processing, information security, and robotics and in the field of real-time identification systems. The book contains examples and problems/solutions throughout.
This book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future. The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies - weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that promise an increase in safety and security when it comes to the dangers posed by these terrorists. This part also includes a critical discussion of advantages and disadvantages of such technologies that are, quite often, sold as a 'silver bullet' approach in the fight against terrorism. Controversies such as those triggered by the abuse of millimeter wave scanners deployed at several Western European airports will demonstrate that there are costs involved with regard to human rights. The third, analytical part takes the critical discussion further by arguing that the uncritical fielding of new surveillance and control technologies in parallel with the on-going outsourcing and privatization of key services of the state could well lead to dystopias as envisaged in a rather prescient way by the so-called cyperpunk novels of the 1980s. The book concludes with the question that any liberal democracy should ask itself: how far can we go with regard to hardening our societies against terrorist threats?
This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text for PhD and Master degree programmes in Digital Forensics and Cyber Security. Each chapter of this book is written by an internationally-renowned expert who has extensive experience in law enforcement, industry and academia. The increasing popularity in the use of IoT devices for criminal activities means that there is a maturing discipline and industry around IoT forensics. As technology becomes cheaper and easier to deploy in an increased number of discrete, everyday objects, scope for the automated creation of personalised digital footprints becomes greater. Devices which are presently included within the Internet of Things (IoT) umbrella have a massive potential to enable and shape the way that humans interact and achieve objectives. These also forge a trail of data that can be used to triangulate and identify individuals and their actions. As such, interest and developments in autonomous vehicles, unmanned drones and 'smart' home appliances are creating unprecedented opportunities for the research communities to investigate the production and evaluation of evidence through the discipline of digital forensics.
This book outlines the development of safety and cybersecurity, threats and activities in automotive vehicles. This book discusses the automotive vehicle applications and technological aspects considering its cybersecurity issues. Each chapter offers a suitable context for understanding the complexities of the connectivity and cybersecurity of intelligent and autonomous vehicles. A top-down strategy was adopted to introduce the vehicles' intelligent features and functionality. The area of vehicle-to-everything (V2X) communications aims to exploit the power of ubiquitous connectivity for the traffic safety and transport efficiency. The chapters discuss in detail about the different levels of autonomous vehicles, different types of cybersecurity issues, future trends and challenges in autonomous vehicles. Security must be thought as an important aspect during designing and implementation of the autonomous vehicles to prevent from numerous security threats and attacks. The book thus provides important information on the cybersecurity challenges faced by the autonomous vehicles and it seeks to address the mobility requirements of users, comfort, safety and security. This book aims to provide an outline of most aspects of cybersecurity in intelligent and autonomous vehicles. It is very helpful for automotive engineers, graduate students and technological administrators who want to know more about security technology as well as to readers with a security background and experience who want to know more about cybersecurity concerns in modern and future automotive applications and cybersecurity. In particular, this book helps people who need to make better decisions about automotive security and safety approaches. Moreover, it is beneficial to people who are involved in research and development in this exciting area. As seen from the table of contents, automotive security covers a wide variety of topics. In addition to being distributed through various technological fields, automotive cybersecurity is a recent and rapidly moving field, such that the selection of topics in this book is regarded as tentative solutions rather than a final word on what exactly constitutes automotive security. All of the authors have worked for many years in the area of embedded security and for a few years in the field of different aspects of automotive safety and security, both from a research and industry point of view.
This book is devoted to advanced materials and perspective sensors, which is one of the most important problems in nanotechnology and security. This book is useful for researchers, scientist and graduate students in the fields of solid state physics, nanotechnology and security.
With our highly connected and interdependent world, the growing threat of infectious diseases and public health crisis has shed light on the requirement for global efforts to manage and combat highly pathogenic infectious diseases and other public health crisis on an unprecedented level. Such disease threats transcend borders. Reducing global threats posed by infectious disease outbreaks - whether naturally caused or resulting from a deliberate or accidental release - requires efforts that cross the disaster management pillars: mitigation, preparedness, response and recovery. This book addresses the issues of global health security along 4 themes: Emerging Threats; Mitigation, Preparedness, Response and Recovery; Exploring the Technology Landscape for Solutions; Leadership and Partnership. The authors of this volume highlight many of the challenges that confront our global security environment today. These range from politically induced disasters, to food insecurity, to zoonosis and terrorism. More optimistically, the authors also present some advances in technology that can help us combat these threats. Understanding the challenges that confront us and the tools we have to overcome them will allow us to face our future with confidence.
This book strives to take stock of current achievements and existing challenges in nuclear verification, identify the available information and gaps that can act as drivers for exploring new approaches to verification strategies and technologies. With the practical application of the systems concept to nuclear disarmament scenarios and other, non-nuclear verification fields, it investigates, where greater transparency and confidence could be achieved in pursuit of new national or international nonproliferation and arms reduction efforts. A final discussion looks at how, in the absence of formal government-to-government negotiations, experts can take practical steps to advance the technical development of these concepts.
This book provides the conceptual foundation of security risk assessment and thereby enables reasoning about risk from first principles. It presents the underlying theory that is the basis of a rigorous and universally applicable security risk assessment methodology. Furthermore, the book identifies and explores concepts with profound operational implications that have traditionally been sources of ambiguity if not confusion in security risk management. Notably, the text provides a simple quantitative model for complexity, a significant driver of risk that is typically not addressed in security-related contexts. Risk and The Theory of Security Risk Assessment is a primer of security risk assessment pedagogy, but it also provides methods and metrics to actually estimate the magnitude of security risk. Concepts are explained using numerous examples, which are at times both enlightening and entertaining. As a result, the book bridges a longstanding gap between theory and practice, and therefore will be a useful reference to students, academics and security practitioners.
This book discusses recent brain research and the potentially dangerous dual-use applications of the findings of these research projects. The book is divided into three sections: Part I examines the rise in dual-use concerns within various state's chemical and biological non-proliferation regime's during this century, as well as the rapid technologically driven advances in neuroscience and the associated possible misuse considerations in the same period. Part II reviews the brain research projects in the EU, USA, Japan, China and several other countries with regard to their objectives, achievements and measures to deal with the problem of dual-use. Part III assesses the extent to which the results of this civil neuroscience work, which is intended to be benign, are being, and could be protected against future hostile applications in the development of novel chemical and biological weapons.
This volume presents selected contributions from the "Advanced Research Workshop on Explosives Detection" hosted by the Department of Information Engineering of the University of Florence, Italy in 2018. The main goal of the workshop was to find out how Science for Peace and Security projects in the field of Explosives Detection contribute to the development and/or refinement of scientific and technical knowledge and competencies. The findings of the workshop, presented in the last section of the book, determine future actions and direction of the SPS Programme in the field of explosives detection and management.The NATO Science for Peace and Security (SPS) Programme, promotes dialogue and practical cooperation between NATO member states and partner nations based on scientific research, technological innovation and knowledge exchange. Several initiatives were launched in the field of explosive detection and clearance, as part of NATO's enhanced role in the international fight against terrorism. Experts and scientists from NATO members and partner countries have been brought together in multi-year projects, within the framework of the SPS Programme, to cooperate in the scientific research in explosive detection field, developing new technologies and methods to be implemented in order to detect explosive substances in different contexts.
Over the last decade, techniques for materials preparation and processing at nanometer scale have advanced rapidly, leading to the introduction of novel principles for a new generation of sensors and detectors. At the same time, the chemical industry, transport and agriculture produce huge amounts of dangerous waste gases and liquids, leading to soil, air and water contamination. One more modern threat - international terrorism - demands that scientists make efforts to apply new principles and technologies to protect society against chemical, biological, radiological and nuclear (CBRN) attacks and to develop novel effective technologies for the remediation of large contaminated areas. Accordingly, the main goal of this book is to bring together experts (theorists, experimentalists, engineers and technologists) for an extensive discussion covering: novel principles for functional nanostructures and detector fabrication and implementation, the development of novel technologies for the deactivation of CBRN agents, their experimental realization and their application in novel monitoring and control systems, and technological processes for soil and water remediation, with a view to environmental protection and defence against CBRN-based terrorism. In keeping with the book's main goal, the following topics are highlighted and discussed: - Sensors and detectors - detection of chemicals, principles of "artificial nose" and chemical "micro-lab on a chip" design, surface and underground water quality monitoring systems, molecular electronics, superconducting electronic devices, quantum detectors and Qubits. - Environmental protection and CBRN - detection of infrared, microwave, X-ray and terahertz radiation. Principles for novel IR-, UV-, and Terahertz-wave devices for the detection of low-contrast objects. - Novel technological processes for CBRN destruction and deactivation. All these topics are strongly interrelated, both with regard to fundamental aspects and to fabrication and implementation technologies; in addition, they are highly promising for application in novel functional devices, computer logics, sensing and detection of low-concentration chemicals, weak and extremely weak magnetic and microwave fields, infrared and ultraviolet radiation. Given its scope, the book will be a useful and interesting guide for a broad readership of engineers, scientists, PhD students and experts in the area of defence against environmental terrorism.
This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.
This book comprehensively discusses essential aspects of terminal ballistics, combining experimental data, numerical simulations and analytical modeling. This new, 3rd edition reflects a number of recent advances in materials science, such as the use of polyurea layers on metallic plates in order to improve their ballistics. In addition, more data and analyses are now available on dwell and interface defeat in ceramic tiles coated with polymers, and are presented here. Lastly, the new edition includes new results, numerical and empirical, concerning the DIF issue in brittle solids, as well as the "upturn" phenomenon in the stress-strain curves of ductile solids.The author also added a new analysis of concrete penetration experiments which accounts for the scaling issue in this field. This is a new,and important, addition which we are happy to announce. They also added some new insights into the interaction of EEP's and FSP projectiles with metallic plates. Throughout the book, the authors demonstrate the advantages of the simulation approach in terms of understanding the basic physics behind the phenomena investigated, making it a must-read for all professionals who need to understand terminal ballistics.
An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.
This book presents a compendium of selected game- and decision-theoretic models to achieve and assess the security of critical infrastructures. Given contemporary reports on security incidents of various kinds, we can see a paradigm shift to attacks of an increasingly heterogeneous nature, combining different techniques into what we know as an advanced persistent threat. Security precautions must match these diverse threat patterns in an equally diverse manner; in response, this book provides a wealth of techniques for protection and mitigation. Much traditional security research has a narrow focus on specific attack scenarios or applications, and strives to make an attack "practically impossible." A more recent approach to security views it as a scenario in which the cost of an attack exceeds the potential reward. This does not rule out the possibility of an attack but minimizes its likelihood to the least possible risk. The book follows this economic definition of security, offering a management scientific view that seeks a balance between security investments and their resulting benefits. It focuses on optimization of resources in light of threats such as terrorism and advanced persistent threats. Drawing on the authors' experience and inspired by real case studies, the book provides a systematic approach to critical infrastructure security and resilience. Presenting a mixture of theoretical work and practical success stories, the book is chiefly intended for students and practitioners seeking an introduction to game- and decision-theoretic techniques for security. The required mathematical concepts are self-contained, rigorously introduced, and illustrated by case studies. The book also provides software tools that help guide readers in the practical use of the scientific models and computational frameworks.
This engaging and accessible book explains the scientific principles behind guns, both ancient and modern. It connects their evolution to advances in science, as well as tracing the developments of projectiles and propellants. It is not limited to small arms but also looks at the science of enormous guns such the Paris Gun, for example, and reviews the efforts to build a gun to launch projectiles into space. Extremely fast guns are also covered, such as two-stage guns and rail guns. Further, the book provides insight into the science of terminal ballistics and wound ballistics as well as the challenging subject of gun control. It is full of interesting facts for all who are curious about the science and history of guns, as well as those for whom the gun is an accessory of their profession.
The book presents high-quality research papers presented at the 2nd American University in the Emirates International research conference, AUEIRC'18, organized by the American University in the Emirates, Dubai, held on November 13th-15th, 2018. The book is broadly divided into four sections: Sustainability and Smart Technology, Sustainability and Social Responsibility, Sustainability, Human Security and Legislation, Sustainability and Education. The topics covered under these sections are sustainable smart technology such as developing green curriculum for information technology, use ultrasonic velocity to predict quality of wheat, improve security features for visa system, factors affecting the cost of production of electricity and desalination plants, impact of smart traffic sensing in smart cities, smart healthcare system, simulation of Grey wolf optimization algorithm in painting digital forensics. The topics covered for sustainability and creative industries such as sustainable concrete production, multimedia applications in digital transformation art, integrating biomimicry principles in sustainable architecture. Sustainability, human security and legislation covered topics of urban performance and sustainable environment, Eco-certification as response on climate change, the criminal offence of tax evasion in law: case study, skills engineering in sustainable counter defense against Cyber extremism, the international law and challenges of trans-boundary water resources governance, the legal status of nuclear energy: case study, sustainable energy development and nuclear energy legislation in UAE, corruption specific safety challenge, environmental management and sustainability, sustainable farming models for desert agro-ecosystems, future directions of climate change, earth and built environment towards new concept of sustainability, institution building from emotional intelligence perspective, virtue ethics, technology and sustainability, the role of humor in a sustainable education, HEIs practices and strategic decisions toward planning for sustainable education programs, TQM in higher education for sustainable future. The papers in this book present high-quality original research work, findings and practical development experiences.
This proceedings volume presents new scientific works of the research workers and experts from the field of Wood Science & Fire. It looks into the properties of various tree species across the continents affecting the fire-technical properties of wood and wood-based materials, its modifications, fire-retardant methods and other technological processes that have an impact on wood ignition and burning. The results of these findings have a direct impact on Building Construction and Design describing the fire safety of wooden buildings, mainly large and multi-story ones. The results of these experiments and findings may be applied, or are directly implemented into Fire Science, Hazard Control, Building Safety which makes the application of wood and wood materials in buildings possible, while maintaining strict fire regulations. One part of the contributions focuses on the symbiosis of the material and the fire-fighting technologies. Wood burning has its own specific features, therefore, the fire protection technologies need to be updated regularly. It also includes the issue of the intervention of fire-fighting and rescue teams in the fires of wooden buildings. Presentations deal with the issue of forest fires influenced by the climate changes, relief, fuel models based on the type and the age of the forest stand.
This timely book examines how the South African National Defence Force has adapted to the country's new security, political and social environment since 1994. In South Africa's changed political state, how has civilian control of the military been implemented and what does this mean for 'defence in a democracy'? This book presents an overview of the security environment, how the mission focus of the military has changed and the implications for force procurement, force preparation, force employment and force sustainability. The author addresses other issues, such as: * the effect of integrating former revolutionary soldiers into a professional armed force * the effect of affirmative action on meritocracy, recruitment and retention * military veterans, looking at the difficulties they face in reintegrating back into society and finding gainful employment * gender equality and mainstreaming * the rise of military unions and why a confrontational, instead of a more corporatist approach to labour relations has emerged * HIV/AIDS and the consequences this holds for the military in terms of its operational effectiveness. In closing, the author highlights key events that have caused the SANDF to become 'lost in transition and transformation', spelling out some lessons learned. The conclusions she draws are pertinent for the future of defence, security and civil-military relations of countries around the world.
This book introduces the core concepts of bloodstain pattern analysis that help to understand and make independent contributions to crime scenes accurately. It presents a bridge between new research results and the practical work field of crime scene investigation in bloodstain pattern analysis, by showing and detailing reports of two different scenarios. The scenarios presented have an extensive description of gathered evidence and are diversified with real crime scene photography and sketches. This kind of case report is rare in scientific books, but the author, as a researcher, has permission from the authorities to present the cases. The book finally concludes with the main problems of modern bloodstain pattern analysis and discusses the way forward.
This text provides training on the fundamental tools and methodologies used in active forensic laboratories for the complicated analysis of fire debris and explosives evidence. It is intended to serve as a gateway for students and transitioning forensic science or chemistry professionals. The book is divided between the two disciplines of fire debris and explosives, with a final pair of chapters devoted to the interplay between the two disciplines and with other disciplines, such as DNA and fingerprint analysis. It brings together a multi-national group of technical experts, ranging from academic researchers to active practitioners, including members of some of the premier forensic agencies of the world. Readers will gain knowledge of practical methods of analysis and will develop a strong foundation for laboratory work in forensic chemistry. End-of-chapter questions based on relevant topics and real-world data provide a realistic arena for learners to test newly-acquired techniques.
In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks. The author first briefly introduces Sun Tzu. Then each chapter in the book takes its inspiration from an original title in The Art of War, where the author offers a general introduction to the content and then describes its application in a cybersecurity setting. These chapters cover estimates; waging war; offensive strategy; how you prepare for an attack; energy; weaknesses and strengths; the variables that need consideration before embarking on a war; how infrastructure is related to the concept of ground; attack by fire or how skilled attackers hide behind noise; and employing secret agents. The book will be interesting for computer security researchers and professionals who would like some grounding in a security mindset. |
You may like...
Advanced Video Coding: Principles and…
K.N. Ngan, T. Meier, …
Hardcover
R3,886
Discovery Miles 38 860
Compressive Sensing Based Algorithms for…
Amit Kumar Mishra, Ryno Strauss Verster
Hardcover
R3,935
Discovery Miles 39 350
Electrician's Guide to Fire Detection…
The Institution of Engineering and Technology
Spiral bound
R996
Discovery Miles 9 960
Methods and Techniques for Fire…
A. Enis Cetin, Bart Merci, …
Hardcover
R1,450
Discovery Miles 14 500
Global Health Security - Recognizing…
Anthony J. Masys, Ricardo Izurieta, …
Hardcover
R3,399
Discovery Miles 33 990
Safety and Security Engineering IX
Giorgio Passerini, Fabio Farzia, …
Hardcover
R4,325
Discovery Miles 43 250
|