![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems
This book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future. The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies - weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that promise an increase in safety and security when it comes to the dangers posed by these terrorists. This part also includes a critical discussion of advantages and disadvantages of such technologies that are, quite often, sold as a 'silver bullet' approach in the fight against terrorism. Controversies such as those triggered by the abuse of millimeter wave scanners deployed at several Western European airports will demonstrate that there are costs involved with regard to human rights. The third, analytical part takes the critical discussion further by arguing that the uncritical fielding of new surveillance and control technologies in parallel with the on-going outsourcing and privatization of key services of the state could well lead to dystopias as envisaged in a rather prescient way by the so-called cyperpunk novels of the 1980s. The book concludes with the question that any liberal democracy should ask itself: how far can we go with regard to hardening our societies against terrorist threats?
With our highly connected and interdependent world, the growing threat of infectious diseases and public health crisis has shed light on the requirement for global efforts to manage and combat highly pathogenic infectious diseases and other public health crisis on an unprecedented level. Such disease threats transcend borders. Reducing global threats posed by infectious disease outbreaks - whether naturally caused or resulting from a deliberate or accidental release - requires efforts that cross the disaster management pillars: mitigation, preparedness, response and recovery. This book addresses the issues of global health security along 4 themes: Emerging Threats; Mitigation, Preparedness, Response and Recovery; Exploring the Technology Landscape for Solutions; Leadership and Partnership. The authors of this volume highlight many of the challenges that confront our global security environment today. These range from politically induced disasters, to food insecurity, to zoonosis and terrorism. More optimistically, the authors also present some advances in technology that can help us combat these threats. Understanding the challenges that confront us and the tools we have to overcome them will allow us to face our future with confidence.
This book provides the conceptual foundation of security risk assessment and thereby enables reasoning about risk from first principles. It presents the underlying theory that is the basis of a rigorous and universally applicable security risk assessment methodology. Furthermore, the book identifies and explores concepts with profound operational implications that have traditionally been sources of ambiguity if not confusion in security risk management. Notably, the text provides a simple quantitative model for complexity, a significant driver of risk that is typically not addressed in security-related contexts. Risk and The Theory of Security Risk Assessment is a primer of security risk assessment pedagogy, but it also provides methods and metrics to actually estimate the magnitude of security risk. Concepts are explained using numerous examples, which are at times both enlightening and entertaining. As a result, the book bridges a longstanding gap between theory and practice, and therefore will be a useful reference to students, academics and security practitioners.
This book discusses recent brain research and the potentially dangerous dual-use applications of the findings of these research projects. The book is divided into three sections: Part I examines the rise in dual-use concerns within various state's chemical and biological non-proliferation regime's during this century, as well as the rapid technologically driven advances in neuroscience and the associated possible misuse considerations in the same period. Part II reviews the brain research projects in the EU, USA, Japan, China and several other countries with regard to their objectives, achievements and measures to deal with the problem of dual-use. Part III assesses the extent to which the results of this civil neuroscience work, which is intended to be benign, are being, and could be protected against future hostile applications in the development of novel chemical and biological weapons.
This volume presents selected contributions from the "Advanced Research Workshop on Explosives Detection" hosted by the Department of Information Engineering of the University of Florence, Italy in 2018. The main goal of the workshop was to find out how Science for Peace and Security projects in the field of Explosives Detection contribute to the development and/or refinement of scientific and technical knowledge and competencies. The findings of the workshop, presented in the last section of the book, determine future actions and direction of the SPS Programme in the field of explosives detection and management.The NATO Science for Peace and Security (SPS) Programme, promotes dialogue and practical cooperation between NATO member states and partner nations based on scientific research, technological innovation and knowledge exchange. Several initiatives were launched in the field of explosive detection and clearance, as part of NATO's enhanced role in the international fight against terrorism. Experts and scientists from NATO members and partner countries have been brought together in multi-year projects, within the framework of the SPS Programme, to cooperate in the scientific research in explosive detection field, developing new technologies and methods to be implemented in order to detect explosive substances in different contexts.
Over the last decade, techniques for materials preparation and processing at nanometer scale have advanced rapidly, leading to the introduction of novel principles for a new generation of sensors and detectors. At the same time, the chemical industry, transport and agriculture produce huge amounts of dangerous waste gases and liquids, leading to soil, air and water contamination. One more modern threat - international terrorism - demands that scientists make efforts to apply new principles and technologies to protect society against chemical, biological, radiological and nuclear (CBRN) attacks and to develop novel effective technologies for the remediation of large contaminated areas. Accordingly, the main goal of this book is to bring together experts (theorists, experimentalists, engineers and technologists) for an extensive discussion covering: novel principles for functional nanostructures and detector fabrication and implementation, the development of novel technologies for the deactivation of CBRN agents, their experimental realization and their application in novel monitoring and control systems, and technological processes for soil and water remediation, with a view to environmental protection and defence against CBRN-based terrorism. In keeping with the book's main goal, the following topics are highlighted and discussed: - Sensors and detectors - detection of chemicals, principles of "artificial nose" and chemical "micro-lab on a chip" design, surface and underground water quality monitoring systems, molecular electronics, superconducting electronic devices, quantum detectors and Qubits. - Environmental protection and CBRN - detection of infrared, microwave, X-ray and terahertz radiation. Principles for novel IR-, UV-, and Terahertz-wave devices for the detection of low-contrast objects. - Novel technological processes for CBRN destruction and deactivation. All these topics are strongly interrelated, both with regard to fundamental aspects and to fabrication and implementation technologies; in addition, they are highly promising for application in novel functional devices, computer logics, sensing and detection of low-concentration chemicals, weak and extremely weak magnetic and microwave fields, infrared and ultraviolet radiation. Given its scope, the book will be a useful and interesting guide for a broad readership of engineers, scientists, PhD students and experts in the area of defence against environmental terrorism.
This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.
In this book, the authors present their theoretical, experimental and numerical investigations into concrete structures subjected to projectile and aircraft impacts in recent years. Innovative approaches to analyze the rigid, mass abrasive and eroding projectile penetration and perforation are proposed. Damage and failure analyses of nuclear power plant containments impacted by large commercial aircrafts are numerically and experimentally analyzed. Ultra-high performance concrete materials and structures against the projectile impact are developed and their capacities of resisting projectile impact are evaluated. This book is written for the researchers, engineers and graduate students in the fields of protective structures and terminal ballistics.
This book is devoted to advanced materials and perspective sensors, which is one of the most important problems in nanotechnology and security. This book is useful for researchers, scientist and graduate students in the fields of solid state physics, nanotechnology and security.
This book strives to take stock of current achievements and existing challenges in nuclear verification, identify the available information and gaps that can act as drivers for exploring new approaches to verification strategies and technologies. With the practical application of the systems concept to nuclear disarmament scenarios and other, non-nuclear verification fields, it investigates, where greater transparency and confidence could be achieved in pursuit of new national or international nonproliferation and arms reduction efforts. A final discussion looks at how, in the absence of formal government-to-government negotiations, experts can take practical steps to advance the technical development of these concepts.
This book presents a compendium of selected game- and decision-theoretic models to achieve and assess the security of critical infrastructures. Given contemporary reports on security incidents of various kinds, we can see a paradigm shift to attacks of an increasingly heterogeneous nature, combining different techniques into what we know as an advanced persistent threat. Security precautions must match these diverse threat patterns in an equally diverse manner; in response, this book provides a wealth of techniques for protection and mitigation. Much traditional security research has a narrow focus on specific attack scenarios or applications, and strives to make an attack "practically impossible." A more recent approach to security views it as a scenario in which the cost of an attack exceeds the potential reward. This does not rule out the possibility of an attack but minimizes its likelihood to the least possible risk. The book follows this economic definition of security, offering a management scientific view that seeks a balance between security investments and their resulting benefits. It focuses on optimization of resources in light of threats such as terrorism and advanced persistent threats. Drawing on the authors' experience and inspired by real case studies, the book provides a systematic approach to critical infrastructure security and resilience. Presenting a mixture of theoretical work and practical success stories, the book is chiefly intended for students and practitioners seeking an introduction to game- and decision-theoretic techniques for security. The required mathematical concepts are self-contained, rigorously introduced, and illustrated by case studies. The book also provides software tools that help guide readers in the practical use of the scientific models and computational frameworks.
This engaging and accessible book explains the scientific principles behind guns, both ancient and modern. It connects their evolution to advances in science, as well as tracing the developments of projectiles and propellants. It is not limited to small arms but also looks at the science of enormous guns such the Paris Gun, for example, and reviews the efforts to build a gun to launch projectiles into space. Extremely fast guns are also covered, such as two-stage guns and rail guns. Further, the book provides insight into the science of terminal ballistics and wound ballistics as well as the challenging subject of gun control. It is full of interesting facts for all who are curious about the science and history of guns, as well as those for whom the gun is an accessory of their profession.
This book comprehensively discusses essential aspects of terminal ballistics, combining experimental data, numerical simulations and analytical modeling. This new, 3rd edition reflects a number of recent advances in materials science, such as the use of polyurea layers on metallic plates in order to improve their ballistics. In addition, more data and analyses are now available on dwell and interface defeat in ceramic tiles coated with polymers, and are presented here. Lastly, the new edition includes new results, numerical and empirical, concerning the DIF issue in brittle solids, as well as the "upturn" phenomenon in the stress-strain curves of ductile solids.The author also added a new analysis of concrete penetration experiments which accounts for the scaling issue in this field. This is a new,and important, addition which we are happy to announce. They also added some new insights into the interaction of EEP's and FSP projectiles with metallic plates. Throughout the book, the authors demonstrate the advantages of the simulation approach in terms of understanding the basic physics behind the phenomena investigated, making it a must-read for all professionals who need to understand terminal ballistics.
An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.
The book presents high-quality research papers presented at the 2nd American University in the Emirates International research conference, AUEIRC'18, organized by the American University in the Emirates, Dubai, held on November 13th-15th, 2018. The book is broadly divided into four sections: Sustainability and Smart Technology, Sustainability and Social Responsibility, Sustainability, Human Security and Legislation, Sustainability and Education. The topics covered under these sections are sustainable smart technology such as developing green curriculum for information technology, use ultrasonic velocity to predict quality of wheat, improve security features for visa system, factors affecting the cost of production of electricity and desalination plants, impact of smart traffic sensing in smart cities, smart healthcare system, simulation of Grey wolf optimization algorithm in painting digital forensics. The topics covered for sustainability and creative industries such as sustainable concrete production, multimedia applications in digital transformation art, integrating biomimicry principles in sustainable architecture. Sustainability, human security and legislation covered topics of urban performance and sustainable environment, Eco-certification as response on climate change, the criminal offence of tax evasion in law: case study, skills engineering in sustainable counter defense against Cyber extremism, the international law and challenges of trans-boundary water resources governance, the legal status of nuclear energy: case study, sustainable energy development and nuclear energy legislation in UAE, corruption specific safety challenge, environmental management and sustainability, sustainable farming models for desert agro-ecosystems, future directions of climate change, earth and built environment towards new concept of sustainability, institution building from emotional intelligence perspective, virtue ethics, technology and sustainability, the role of humor in a sustainable education, HEIs practices and strategic decisions toward planning for sustainable education programs, TQM in higher education for sustainable future. The papers in this book present high-quality original research work, findings and practical development experiences.
This proceedings volume presents new scientific works of the research workers and experts from the field of Wood Science & Fire. It looks into the properties of various tree species across the continents affecting the fire-technical properties of wood and wood-based materials, its modifications, fire-retardant methods and other technological processes that have an impact on wood ignition and burning. The results of these findings have a direct impact on Building Construction and Design describing the fire safety of wooden buildings, mainly large and multi-story ones. The results of these experiments and findings may be applied, or are directly implemented into Fire Science, Hazard Control, Building Safety which makes the application of wood and wood materials in buildings possible, while maintaining strict fire regulations. One part of the contributions focuses on the symbiosis of the material and the fire-fighting technologies. Wood burning has its own specific features, therefore, the fire protection technologies need to be updated regularly. It also includes the issue of the intervention of fire-fighting and rescue teams in the fires of wooden buildings. Presentations deal with the issue of forest fires influenced by the climate changes, relief, fuel models based on the type and the age of the forest stand.
This book introduces the core concepts of bloodstain pattern analysis that help to understand and make independent contributions to crime scenes accurately. It presents a bridge between new research results and the practical work field of crime scene investigation in bloodstain pattern analysis, by showing and detailing reports of two different scenarios. The scenarios presented have an extensive description of gathered evidence and are diversified with real crime scene photography and sketches. This kind of case report is rare in scientific books, but the author, as a researcher, has permission from the authorities to present the cases. The book finally concludes with the main problems of modern bloodstain pattern analysis and discusses the way forward.
This text provides training on the fundamental tools and methodologies used in active forensic laboratories for the complicated analysis of fire debris and explosives evidence. It is intended to serve as a gateway for students and transitioning forensic science or chemistry professionals. The book is divided between the two disciplines of fire debris and explosives, with a final pair of chapters devoted to the interplay between the two disciplines and with other disciplines, such as DNA and fingerprint analysis. It brings together a multi-national group of technical experts, ranging from academic researchers to active practitioners, including members of some of the premier forensic agencies of the world. Readers will gain knowledge of practical methods of analysis and will develop a strong foundation for laboratory work in forensic chemistry. End-of-chapter questions based on relevant topics and real-world data provide a realistic arena for learners to test newly-acquired techniques.
In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks. The author first briefly introduces Sun Tzu. Then each chapter in the book takes its inspiration from an original title in The Art of War, where the author offers a general introduction to the content and then describes its application in a cybersecurity setting. These chapters cover estimates; waging war; offensive strategy; how you prepare for an attack; energy; weaknesses and strengths; the variables that need consideration before embarking on a war; how infrastructure is related to the concept of ground; attack by fire or how skilled attackers hide behind noise; and employing secret agents. The book will be interesting for computer security researchers and professionals who would like some grounding in a security mindset.
This book explores and analyzes emerging innovations within today's most cutting-edge science and technology (S&T) areas, which are cited as carrying the potential to revolutionize governmental structures, economies, and international security. Some have argued that such technologies will yield doomsday scenarios and that military applications of such technologies have even greater potential than nuclear weapons to radically change the balance of power. As the United States looks to the future - whether dominated by extremist groups co-opting advanced weapons in the world of globalized non-state actors or states engaged in persistent regional conflicts in areas of strategic interest - new adversaries and new science and technology will emerge. Choices made today that affect science and technology will impact how ably the US can and will respond. Chapters within the book look at the changing strategic environment in which security operations are planned and conducted; how these impact science and technology policy choices made today; and predictions of how science and technology may play a beneficial or deleterious role in the future. Some game changing technologies have received global attention, while others may be less well known; the new technologies discussed within this proposal, as well as future discoveries, may significantly alter military capabilities and may generate new threats against military and civilian sectors.
This open access book explores the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. It defines the concepts of safety and security, and discusses the methodological, organizational and institutional implications that accompany approaching them as separate entities and combining them, respectively. The book explores the coupling of safety and security from different perspectives, especially: the concepts and methods of risk, safety and security; the managerial aspects; user experiences in connection with safety and security. Given its scope, the book will be of interest to researchers and practitioners in the fields of safety and security, and to anyone working at a business or in an industry concerned with how safety and security should be managed.
This book presents the results of an experiment assessing the impact of spruce wood joints on the creation and development of fire when these joints are applied within a facade. The book includes an extensive analysis of wooden cladding, which is a flammable material in which the elements are connected lengthwise using various types of joint. The parameters of the experiment, as well as the setting, material criteria and evaluation criteria are described in detail. The results confirm that the joint type used has an impact on the selected evaluation criteria and thus also on the potential spread of fire.
This book summarizes science and technology of a new generation of high-energy andinsensitive explosives. The objective is to provide professionals with comprehensiveinformation on the synthesis and the physicochemical and detonation properties ofthe explosives. Potential technologies applicable for treatment of contaminated wastestreams from manufacturing facilities and environmental matrices are also be included.This book provides the reader an insight into the depth and breadth of theoreticaland empirical models and experimental techniques currently being developed in thefield of energetic materials. It presents the latest research by DoD engineers andscientists, and some of DoD's academic and industrial researcher partners. The topicsexplored and the simulations developed or modified for the purposes of energetics mayfind application in other closely related fields, such as the pharmaceutical industry.One of the key features of the book is the treatment of wastewaters generated duringmanufacturing of these energetic materials.
This textbook presents a practical introduction to information security using the Competency Based Education (CBE) method of teaching. The content and ancillary assessment methods explicitly measure student progress in the three core categories: Knowledge, Skills, and Experience, giving students a balance between background knowledge, context, and skills they can put to work. Students will learn both the foundations and applications of information systems security; safeguarding from malicious attacks, threats, and vulnerabilities; auditing, testing, and monitoring; risk, response, and recovery; networks and telecommunications security; source code security; information security standards; and compliance laws. The book can be used in introductory courses in security (information, cyber, network or computer security), including classes that don't specifically use the CBE method, as instructors can adjust methods and ancillaries based on their own preferences. The book content is also aligned with the Cybersecurity Competency Model, proposed by department of homeland security. The author is an active member of The National Initiative for Cybersecurity Education (NICE), which is led by the National Institute of Standards and Technology (NIST). NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.
This book investigates the susceptibility of intrinsic physically unclonable function (PUF) implementations on reconfigurable hardware to optical semi-invasive attacks from the chip backside. It explores different classes of optical attacks, particularly photonic emission analysis, laser fault injection, and optical contactless probing. By applying these techniques, the book demonstrates that the secrets generated by a PUF can be predicted, manipulated or directly probed without affecting the behavior of the PUF. It subsequently discusses the cost and feasibility of launching such attacks against the very latest hardware technologies in a real scenario. The author discusses why PUFs are not tamper-evident in their current configuration, and therefore, PUFs alone cannot raise the security level of key storage. The author then reviews the potential and already implemented countermeasures, which can remedy PUFs' security-related shortcomings and make them resistant to optical side-channel and optical fault attacks. Lastly, by making selected modifications to the functionality of an existing PUF architecture, the book presents a prototype tamper-evident sensor for detecting optical contactless probing attempts. |
You may like...
Deep Learning for Sustainable…
Ramesh Poonia, Vijander Singh, …
Paperback
R2,957
Discovery Miles 29 570
Event Mining for Explanatory Modeling
Laleh Jalali, Ramesh Jain
Hardcover
R1,302
Discovery Miles 13 020
Stuff We Wish We Knew Before Getting…
Mo Grootboom, Phindi Grootboom
Paperback
|