![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems
This book presents materials on the implementation of modern technologies for aircraft information support and ground-based radio equipment for flights in the Russian Federation, especially in the Arctic and far Eastern regions, as well as new methods for monitoring the flight of civil aviation aircraft based on the use of local control and correction stations and optical systems that fully meet the requirements of international and domestic organizations for the reliability and integrity of transmitted information. The book is intended for engineering and technical specialists involved in the development, manufacturing and operation of aircraft avionics and ground-based radio electronic flight support systems, as well as graduate students and senior students of radio engineering specialties. It is useful to researchers and professionals whose activities are related to air traffic control.
This book tells the story of government-sponsored wiretapping in Britain and the United States from the rise of telephony in the 1870s until the terrorist attacks of 9/11. It pays particular attention to the 1990s, which marked one of the most dramatic turns in the history of telecommunications interception. During that time, fiber optic and satellite networks rapidly replaced the copper-based analogue telephone system that had remained virtually unchanged since the 1870s. That remarkable technological advance facilitated the rise of the networked home computer, cellular telephony, and the Internet, and users hailed the dawn of the digital information age. However, security agencies such as the FBI and MI5 were concerned. Since the emergence of telegraphy in the 1830s, security services could intercept private messages using wiretaps, and this was facilitated by some of the world's largest telecommunications monopolies such as AT&T in the US and British Telecom in the UK. The new, digital networks were incompatible with traditional wiretap technology. To make things more complicated for the security services, these monopolies had been privatized and broken up into smaller companies during the 1980s, and in the new deregulated landscape the agencies had to seek assistance from thousands of startup companies that were often unwilling to help. So for the first time in history, technological and institutional changes posed a threat to the security services' wiretapping activities, and government officials in Washington and London acted quickly to protect their ability to spy, they sought to force the industry to change the very architecture of the digital telecommunications network. This book describes in detail the tense negotiations between governments, the telecommunications industry, and civil liberties groups during an unprecedented moment in history when the above security agencies were unable to wiretap. It reveals for the first time the thoughts of some of the protagonists in these crucial negotiations, and explains why their outcome may have forever altered the trajectory of our information society.
This book emphasizes recent advances in the creation of biometric identification systems for various applications in the field of human activity. The book displays the problems that arise in modern systems of biometric identification, as well as the level of development and prospects for the introduction of biometric technologies. The authors classify biometric technologies into two groups, distinguished according to the type of biometric characteristics used. The first group uses static biometric parameters: fingerprints, hand geometry, retina pattern, vein pattern on the finger, etc. The second group uses dynamic parameters for identification: the dynamics of the reproduction of a signature or a handwritten keyword, voice, gait, dynamics of work on the keyboard, etc. The directions of building information systems that use automatic personality identification based on the analysis of unique biometric characteristics of a person are discussed. The book is intended for professionals working and conducting research in the field of intelligent information processing, information security, and robotics and in the field of real-time identification systems. The book contains examples and problems/solutions throughout.
This book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future. The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies - weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that promise an increase in safety and security when it comes to the dangers posed by these terrorists. This part also includes a critical discussion of advantages and disadvantages of such technologies that are, quite often, sold as a 'silver bullet' approach in the fight against terrorism. Controversies such as those triggered by the abuse of millimeter wave scanners deployed at several Western European airports will demonstrate that there are costs involved with regard to human rights. The third, analytical part takes the critical discussion further by arguing that the uncritical fielding of new surveillance and control technologies in parallel with the on-going outsourcing and privatization of key services of the state could well lead to dystopias as envisaged in a rather prescient way by the so-called cyperpunk novels of the 1980s. The book concludes with the question that any liberal democracy should ask itself: how far can we go with regard to hardening our societies against terrorist threats?
This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text for PhD and Master degree programmes in Digital Forensics and Cyber Security. Each chapter of this book is written by an internationally-renowned expert who has extensive experience in law enforcement, industry and academia. The increasing popularity in the use of IoT devices for criminal activities means that there is a maturing discipline and industry around IoT forensics. As technology becomes cheaper and easier to deploy in an increased number of discrete, everyday objects, scope for the automated creation of personalised digital footprints becomes greater. Devices which are presently included within the Internet of Things (IoT) umbrella have a massive potential to enable and shape the way that humans interact and achieve objectives. These also forge a trail of data that can be used to triangulate and identify individuals and their actions. As such, interest and developments in autonomous vehicles, unmanned drones and 'smart' home appliances are creating unprecedented opportunities for the research communities to investigate the production and evaluation of evidence through the discipline of digital forensics.
This book outlines the development of safety and cybersecurity, threats and activities in automotive vehicles. This book discusses the automotive vehicle applications and technological aspects considering its cybersecurity issues. Each chapter offers a suitable context for understanding the complexities of the connectivity and cybersecurity of intelligent and autonomous vehicles. A top-down strategy was adopted to introduce the vehicles' intelligent features and functionality. The area of vehicle-to-everything (V2X) communications aims to exploit the power of ubiquitous connectivity for the traffic safety and transport efficiency. The chapters discuss in detail about the different levels of autonomous vehicles, different types of cybersecurity issues, future trends and challenges in autonomous vehicles. Security must be thought as an important aspect during designing and implementation of the autonomous vehicles to prevent from numerous security threats and attacks. The book thus provides important information on the cybersecurity challenges faced by the autonomous vehicles and it seeks to address the mobility requirements of users, comfort, safety and security. This book aims to provide an outline of most aspects of cybersecurity in intelligent and autonomous vehicles. It is very helpful for automotive engineers, graduate students and technological administrators who want to know more about security technology as well as to readers with a security background and experience who want to know more about cybersecurity concerns in modern and future automotive applications and cybersecurity. In particular, this book helps people who need to make better decisions about automotive security and safety approaches. Moreover, it is beneficial to people who are involved in research and development in this exciting area. As seen from the table of contents, automotive security covers a wide variety of topics. In addition to being distributed through various technological fields, automotive cybersecurity is a recent and rapidly moving field, such that the selection of topics in this book is regarded as tentative solutions rather than a final word on what exactly constitutes automotive security. All of the authors have worked for many years in the area of embedded security and for a few years in the field of different aspects of automotive safety and security, both from a research and industry point of view.
With our highly connected and interdependent world, the growing threat of infectious diseases and public health crisis has shed light on the requirement for global efforts to manage and combat highly pathogenic infectious diseases and other public health crisis on an unprecedented level. Such disease threats transcend borders. Reducing global threats posed by infectious disease outbreaks - whether naturally caused or resulting from a deliberate or accidental release - requires efforts that cross the disaster management pillars: mitigation, preparedness, response and recovery. This book addresses the issues of global health security along 4 themes: Emerging Threats; Mitigation, Preparedness, Response and Recovery; Exploring the Technology Landscape for Solutions; Leadership and Partnership. The authors of this volume highlight many of the challenges that confront our global security environment today. These range from politically induced disasters, to food insecurity, to zoonosis and terrorism. More optimistically, the authors also present some advances in technology that can help us combat these threats. Understanding the challenges that confront us and the tools we have to overcome them will allow us to face our future with confidence.
This book provides the conceptual foundation of security risk assessment and thereby enables reasoning about risk from first principles. It presents the underlying theory that is the basis of a rigorous and universally applicable security risk assessment methodology. Furthermore, the book identifies and explores concepts with profound operational implications that have traditionally been sources of ambiguity if not confusion in security risk management. Notably, the text provides a simple quantitative model for complexity, a significant driver of risk that is typically not addressed in security-related contexts. Risk and The Theory of Security Risk Assessment is a primer of security risk assessment pedagogy, but it also provides methods and metrics to actually estimate the magnitude of security risk. Concepts are explained using numerous examples, which are at times both enlightening and entertaining. As a result, the book bridges a longstanding gap between theory and practice, and therefore will be a useful reference to students, academics and security practitioners.
This book discusses recent brain research and the potentially dangerous dual-use applications of the findings of these research projects. The book is divided into three sections: Part I examines the rise in dual-use concerns within various state's chemical and biological non-proliferation regime's during this century, as well as the rapid technologically driven advances in neuroscience and the associated possible misuse considerations in the same period. Part II reviews the brain research projects in the EU, USA, Japan, China and several other countries with regard to their objectives, achievements and measures to deal with the problem of dual-use. Part III assesses the extent to which the results of this civil neuroscience work, which is intended to be benign, are being, and could be protected against future hostile applications in the development of novel chemical and biological weapons.
This volume presents selected contributions from the "Advanced Research Workshop on Explosives Detection" hosted by the Department of Information Engineering of the University of Florence, Italy in 2018. The main goal of the workshop was to find out how Science for Peace and Security projects in the field of Explosives Detection contribute to the development and/or refinement of scientific and technical knowledge and competencies. The findings of the workshop, presented in the last section of the book, determine future actions and direction of the SPS Programme in the field of explosives detection and management.The NATO Science for Peace and Security (SPS) Programme, promotes dialogue and practical cooperation between NATO member states and partner nations based on scientific research, technological innovation and knowledge exchange. Several initiatives were launched in the field of explosive detection and clearance, as part of NATO's enhanced role in the international fight against terrorism. Experts and scientists from NATO members and partner countries have been brought together in multi-year projects, within the framework of the SPS Programme, to cooperate in the scientific research in explosive detection field, developing new technologies and methods to be implemented in order to detect explosive substances in different contexts.
Over the last decade, techniques for materials preparation and processing at nanometer scale have advanced rapidly, leading to the introduction of novel principles for a new generation of sensors and detectors. At the same time, the chemical industry, transport and agriculture produce huge amounts of dangerous waste gases and liquids, leading to soil, air and water contamination. One more modern threat - international terrorism - demands that scientists make efforts to apply new principles and technologies to protect society against chemical, biological, radiological and nuclear (CBRN) attacks and to develop novel effective technologies for the remediation of large contaminated areas. Accordingly, the main goal of this book is to bring together experts (theorists, experimentalists, engineers and technologists) for an extensive discussion covering: novel principles for functional nanostructures and detector fabrication and implementation, the development of novel technologies for the deactivation of CBRN agents, their experimental realization and their application in novel monitoring and control systems, and technological processes for soil and water remediation, with a view to environmental protection and defence against CBRN-based terrorism. In keeping with the book's main goal, the following topics are highlighted and discussed: - Sensors and detectors - detection of chemicals, principles of "artificial nose" and chemical "micro-lab on a chip" design, surface and underground water quality monitoring systems, molecular electronics, superconducting electronic devices, quantum detectors and Qubits. - Environmental protection and CBRN - detection of infrared, microwave, X-ray and terahertz radiation. Principles for novel IR-, UV-, and Terahertz-wave devices for the detection of low-contrast objects. - Novel technological processes for CBRN destruction and deactivation. All these topics are strongly interrelated, both with regard to fundamental aspects and to fabrication and implementation technologies; in addition, they are highly promising for application in novel functional devices, computer logics, sensing and detection of low-concentration chemicals, weak and extremely weak magnetic and microwave fields, infrared and ultraviolet radiation. Given its scope, the book will be a useful and interesting guide for a broad readership of engineers, scientists, PhD students and experts in the area of defence against environmental terrorism.
This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.
In this book, the authors present their theoretical, experimental and numerical investigations into concrete structures subjected to projectile and aircraft impacts in recent years. Innovative approaches to analyze the rigid, mass abrasive and eroding projectile penetration and perforation are proposed. Damage and failure analyses of nuclear power plant containments impacted by large commercial aircrafts are numerically and experimentally analyzed. Ultra-high performance concrete materials and structures against the projectile impact are developed and their capacities of resisting projectile impact are evaluated. This book is written for the researchers, engineers and graduate students in the fields of protective structures and terminal ballistics.
This book is devoted to advanced materials and perspective sensors, which is one of the most important problems in nanotechnology and security. This book is useful for researchers, scientist and graduate students in the fields of solid state physics, nanotechnology and security.
This book strives to take stock of current achievements and existing challenges in nuclear verification, identify the available information and gaps that can act as drivers for exploring new approaches to verification strategies and technologies. With the practical application of the systems concept to nuclear disarmament scenarios and other, non-nuclear verification fields, it investigates, where greater transparency and confidence could be achieved in pursuit of new national or international nonproliferation and arms reduction efforts. A final discussion looks at how, in the absence of formal government-to-government negotiations, experts can take practical steps to advance the technical development of these concepts.
This book presents a compendium of selected game- and decision-theoretic models to achieve and assess the security of critical infrastructures. Given contemporary reports on security incidents of various kinds, we can see a paradigm shift to attacks of an increasingly heterogeneous nature, combining different techniques into what we know as an advanced persistent threat. Security precautions must match these diverse threat patterns in an equally diverse manner; in response, this book provides a wealth of techniques for protection and mitigation. Much traditional security research has a narrow focus on specific attack scenarios or applications, and strives to make an attack "practically impossible." A more recent approach to security views it as a scenario in which the cost of an attack exceeds the potential reward. This does not rule out the possibility of an attack but minimizes its likelihood to the least possible risk. The book follows this economic definition of security, offering a management scientific view that seeks a balance between security investments and their resulting benefits. It focuses on optimization of resources in light of threats such as terrorism and advanced persistent threats. Drawing on the authors' experience and inspired by real case studies, the book provides a systematic approach to critical infrastructure security and resilience. Presenting a mixture of theoretical work and practical success stories, the book is chiefly intended for students and practitioners seeking an introduction to game- and decision-theoretic techniques for security. The required mathematical concepts are self-contained, rigorously introduced, and illustrated by case studies. The book also provides software tools that help guide readers in the practical use of the scientific models and computational frameworks.
This engaging and accessible book explains the scientific principles behind guns, both ancient and modern. It connects their evolution to advances in science, as well as tracing the developments of projectiles and propellants. It is not limited to small arms but also looks at the science of enormous guns such the Paris Gun, for example, and reviews the efforts to build a gun to launch projectiles into space. Extremely fast guns are also covered, such as two-stage guns and rail guns. Further, the book provides insight into the science of terminal ballistics and wound ballistics as well as the challenging subject of gun control. It is full of interesting facts for all who are curious about the science and history of guns, as well as those for whom the gun is an accessory of their profession.
This book comprehensively discusses essential aspects of terminal ballistics, combining experimental data, numerical simulations and analytical modeling. This new, 3rd edition reflects a number of recent advances in materials science, such as the use of polyurea layers on metallic plates in order to improve their ballistics. In addition, more data and analyses are now available on dwell and interface defeat in ceramic tiles coated with polymers, and are presented here. Lastly, the new edition includes new results, numerical and empirical, concerning the DIF issue in brittle solids, as well as the "upturn" phenomenon in the stress-strain curves of ductile solids.The author also added a new analysis of concrete penetration experiments which accounts for the scaling issue in this field. This is a new,and important, addition which we are happy to announce. They also added some new insights into the interaction of EEP's and FSP projectiles with metallic plates. Throughout the book, the authors demonstrate the advantages of the simulation approach in terms of understanding the basic physics behind the phenomena investigated, making it a must-read for all professionals who need to understand terminal ballistics.
An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.
The book presents high-quality research papers presented at the 2nd American University in the Emirates International research conference, AUEIRC'18, organized by the American University in the Emirates, Dubai, held on November 13th-15th, 2018. The book is broadly divided into four sections: Sustainability and Smart Technology, Sustainability and Social Responsibility, Sustainability, Human Security and Legislation, Sustainability and Education. The topics covered under these sections are sustainable smart technology such as developing green curriculum for information technology, use ultrasonic velocity to predict quality of wheat, improve security features for visa system, factors affecting the cost of production of electricity and desalination plants, impact of smart traffic sensing in smart cities, smart healthcare system, simulation of Grey wolf optimization algorithm in painting digital forensics. The topics covered for sustainability and creative industries such as sustainable concrete production, multimedia applications in digital transformation art, integrating biomimicry principles in sustainable architecture. Sustainability, human security and legislation covered topics of urban performance and sustainable environment, Eco-certification as response on climate change, the criminal offence of tax evasion in law: case study, skills engineering in sustainable counter defense against Cyber extremism, the international law and challenges of trans-boundary water resources governance, the legal status of nuclear energy: case study, sustainable energy development and nuclear energy legislation in UAE, corruption specific safety challenge, environmental management and sustainability, sustainable farming models for desert agro-ecosystems, future directions of climate change, earth and built environment towards new concept of sustainability, institution building from emotional intelligence perspective, virtue ethics, technology and sustainability, the role of humor in a sustainable education, HEIs practices and strategic decisions toward planning for sustainable education programs, TQM in higher education for sustainable future. The papers in this book present high-quality original research work, findings and practical development experiences.
This proceedings volume presents new scientific works of the research workers and experts from the field of Wood Science & Fire. It looks into the properties of various tree species across the continents affecting the fire-technical properties of wood and wood-based materials, its modifications, fire-retardant methods and other technological processes that have an impact on wood ignition and burning. The results of these findings have a direct impact on Building Construction and Design describing the fire safety of wooden buildings, mainly large and multi-story ones. The results of these experiments and findings may be applied, or are directly implemented into Fire Science, Hazard Control, Building Safety which makes the application of wood and wood materials in buildings possible, while maintaining strict fire regulations. One part of the contributions focuses on the symbiosis of the material and the fire-fighting technologies. Wood burning has its own specific features, therefore, the fire protection technologies need to be updated regularly. It also includes the issue of the intervention of fire-fighting and rescue teams in the fires of wooden buildings. Presentations deal with the issue of forest fires influenced by the climate changes, relief, fuel models based on the type and the age of the forest stand.
This book introduces the core concepts of bloodstain pattern analysis that help to understand and make independent contributions to crime scenes accurately. It presents a bridge between new research results and the practical work field of crime scene investigation in bloodstain pattern analysis, by showing and detailing reports of two different scenarios. The scenarios presented have an extensive description of gathered evidence and are diversified with real crime scene photography and sketches. This kind of case report is rare in scientific books, but the author, as a researcher, has permission from the authorities to present the cases. The book finally concludes with the main problems of modern bloodstain pattern analysis and discusses the way forward.
This text provides training on the fundamental tools and methodologies used in active forensic laboratories for the complicated analysis of fire debris and explosives evidence. It is intended to serve as a gateway for students and transitioning forensic science or chemistry professionals. The book is divided between the two disciplines of fire debris and explosives, with a final pair of chapters devoted to the interplay between the two disciplines and with other disciplines, such as DNA and fingerprint analysis. It brings together a multi-national group of technical experts, ranging from academic researchers to active practitioners, including members of some of the premier forensic agencies of the world. Readers will gain knowledge of practical methods of analysis and will develop a strong foundation for laboratory work in forensic chemistry. End-of-chapter questions based on relevant topics and real-world data provide a realistic arena for learners to test newly-acquired techniques.
In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks. The author first briefly introduces Sun Tzu. Then each chapter in the book takes its inspiration from an original title in The Art of War, where the author offers a general introduction to the content and then describes its application in a cybersecurity setting. These chapters cover estimates; waging war; offensive strategy; how you prepare for an attack; energy; weaknesses and strengths; the variables that need consideration before embarking on a war; how infrastructure is related to the concept of ground; attack by fire or how skilled attackers hide behind noise; and employing secret agents. The book will be interesting for computer security researchers and professionals who would like some grounding in a security mindset.
This book explores and analyzes emerging innovations within today's most cutting-edge science and technology (S&T) areas, which are cited as carrying the potential to revolutionize governmental structures, economies, and international security. Some have argued that such technologies will yield doomsday scenarios and that military applications of such technologies have even greater potential than nuclear weapons to radically change the balance of power. As the United States looks to the future - whether dominated by extremist groups co-opting advanced weapons in the world of globalized non-state actors or states engaged in persistent regional conflicts in areas of strategic interest - new adversaries and new science and technology will emerge. Choices made today that affect science and technology will impact how ably the US can and will respond. Chapters within the book look at the changing strategic environment in which security operations are planned and conducted; how these impact science and technology policy choices made today; and predictions of how science and technology may play a beneficial or deleterious role in the future. Some game changing technologies have received global attention, while others may be less well known; the new technologies discussed within this proposal, as well as future discoveries, may significantly alter military capabilities and may generate new threats against military and civilian sectors. |
You may like...
Disciple - Walking With God
Rorisang Thandekiso, Nkhensani Manabe
Paperback
(1)
|