![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems
This open access book focuses on investigating predicting precursor information and key points of rockburst in mining engineering through laboratory experiment, theoretical analysis, numerical simulation and case studies. Understanding the evolution patterns for the microstructure instability of rock is a prerequisite for rockburst prediction. The book provides a guide for readers seeking to understand the evolution patterns for the microstrucure of rock failure, the predicting key point of rock failure and the rockburst predicting model. It will be an essential reference to understand mechanism of rockburst and sheds new light on dynamic disasters prediction. Chapters are carefully developed to cover (1) The evolution patterns for the microstructure instability of rock; (2) Rockburst hazard monitoring and predicting criterion and predicting models. The book addresses the issue with a holistic and systematic approach that investigates the occurrence mechanism of rockburst based on the evolution patterns for the microstructure of rock failure and establishes the predicting model of rockburst. This book will be of interest to researchers of mining engineering, rock mechanics engineering and safety engineering.
This volume constitutes the state-of-the-art in active interrogation, widely recognized as indispensable methods for addressing current and future nuclear security needs. Written by a leading group of science and technology experts, this comprehensive reference presents technologies and systems in the context of the fundamental physics challenges and practical requirements. It compares the features, limitations, technologies, and impact of passive and active measurement techniques; describes radiation sources for active interrogation including electron and ion accelerators, intense lasers, and radioisotope-based sources; and it describes radiation detectors used for active interrogation. Entire chapters are devoted to data acquisition and processing systems, modeling and simulation, data interpretation and algorithms, and a survey of working active measurement systems. Active Interrogation in Nuclear Security is structured to appeal to a range of audiences, including graduate students, active researchers in the field, and policy analysts. The first book devoted entirely to active interrogation Presents a focused review of the relevant physics Surveys available technology Analyzes scientific and technology trends Provides historical and policy context Igor Jovanovic is a Professor of Nuclear Engineering and Radiological Sciences at the University of Michigan and has previously also taught at Penn State University and Purdue University. He received his Ph.D. from University of California, Berkeley and worked as physicist at Lawrence Livermore National Laboratory. Dr. Jovanovic has made numerous contributions to the science and technology of radiation detection, as well as the radiation sources for use in active interrogation in nuclear security. He has taught numerous undergraduate and graduate courses in areas that include radiation detection, nuclear physics, and nuclear security. At University of Michigan Dr. Jovanovic is the director of Neutron Science Laboratory and is also associated with the Center for Ultrafast Optical Science. Anna Erickson is an Assistant Professor in the Nuclear and Radiological Engineering Program of the G.W. Woodruff School of Mechanical Engineering at Georgia Institute of Technology. Previously, she was a postdoctoral researcher in the Advanced Detectors Group at Lawrence Livermore National Laboratory. Dr. Erickson received her PhD from Massachusetts Institute of Technology with a focus on radiation detection for active interrogation applications. Her research interests focus on nuclear non-proliferation including antineutrino analysis and non-traditional detector design and characterization. She teaches courses in advanced experimental detection for reactor and nuclear nonproliferation applications, radiation dosimetry and fast reactor analysis.
This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and professionals including government and military workers, policy-makers and law-makers working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference.
This book presents the latest developments in biometrics technologies and reports on new approaches, methods, findings, and technologies developed or being developed by the research community and the industry. The book focuses on introducing fundamental principles and concepts of key enabling technologies for biometric systems applied for both physical and cyber security. The authors disseminate recent research and developing efforts in this area, investigate related trends and challenges, and present case studies and examples such as fingerprint, face, iris, retina, keystroke dynamics, and voice applications . The authors also investigate the advances and future outcomes in research and development in biometric security systems. The book is applicable to students, instructors, researchers, industry practitioners, and related government agencies staff. Each chapter is accompanied by a set of PowerPoint slides for use by instructors.
This edited book captures salient global security challenges and presents 'design' solutions in dealing with wicked problems. Through case studies and applied research this book reveals the many perspectives, tools and approaches to support security design. Security design thereby can support risk and threat analysis, risk communication, problem framing and development of interventions strategies. From the refugee crisis to economic slowdowns in emerging markets, from ever-rising numbers of terrorist and cyberattacks to global water shortages, to the proliferation of the Internet of Things and its impact on the security of our homes, cities and critical infrastructure, the current security landscape is diverse and complex. These global risks have been in the headlines in the last year (Global Risks Report) and pose significant security challenges both nationally and globally. In fact, national security is no longer just national. Non-state actors, cyber NGO, rising powers, and hybrid wars and crimes in strategic areas pose complex challenges to global security. In the words of Horst Rittel (1968):"Design is an activity, which aims at the production of a plan, which plan -if implemented- is intended to bring about a situation with specific desired characteristics without creating unforeseen and undesired side and after effects."
This book contributes to the current knowledge and research on conflict and cross-cultural dialogue, emphasizing how respect, tolerance and dialogue may be quite effective tools for bridging the diverse cultures and, consequently, for solving many of the conflicts of today's world, characterized by a dynamic interchange of populations with very diverse cultural and ethnic backgrounds. For this purpose, we rely on reputed scholars from ten different countries, and from different cultures and fields of expertise, which allows for diverse contributions from a valuable interdisciplinary perspective. The first section of the book deals with the correlation between cultural differences and conflict, while also showing how such conflicts can be prevented and, should they arise, managed and solved. The second section addresses a different, more specific issue: how cultural expression means and tools for cultural communication may lead to conflict whereas they may help to avoid it as well. Finally, the third section analyzes how legal and justice systems deal with cross-cultural conflicts as well as with situations which may lead to cross-cultural conflicts, thus assessing to which extent such systems contribute to avoid and/or solve such kind of conflicts.
This book presents the proceedings of SICC 2017, a conference devoted to promoting the dissemination of the different methodologies, techniques, theories, strategies, technologies and best practices on the prevention and mitigation of CBRNE risks. As the first scientific international conference on safety & security issues in the CBRNE field, SICC 2017 attracted contributions resulting from fruitful inter-professional collaborations between university and military experts, specialized operators, decision makers and the industry. As such, these proceedings are primarily intended for academics and professionals from public, private and military entities. It is the first trans-disciplinary collection of scientific papers from the numerous fields related to CBRNE.
This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.
This book addresses the challenge of reforming defense and military policy-making in newly democratized nations. By tracing the development of civil-military relations in various new democracies from a comparative perspective, it links two bodies of scholarship that thus far have remained largely separate: the study of emerging (or failed) civilian control over armed forces on the one hand; and work on the roots and causes of military effectiveness to guarantee the protection and security of citizens on the other. The empirical and theoretical findings presented here will appeal to scholars of civil-military relations, democratization and security issues, as well as to defense policy-makers.
This innovative volume gathers some of the world's best scholars to analyse the world's collective international efforts to address globalised threats through global security governance. Addressing global and planetary forms of insecurity that include nuclear weapons, conventional arms, gender violence, climate change, disease, bio weapons, cyber-conflict, children in conflict, crimes against humanity, and refugees, this timely book critiques how they are addressed by global institutions and regimes, and advocates important conceptual, institutional, and policy reforms. This is an invaluable resource for students, scholars and policymakers in international health, security and development.
This book covers the topics of theoretical principles, dynamics model and algorithm, mission analysis, system design and experimental studies of space nets system, aiming to provide an initial framework in this field and serve as a ready reference for those interested. Space nets system represents a forefront field in future development of aerospace technologies. However, it involves new challenges and problems such as nonlinear and distorted nets structure, complex rigid flexible coupling dynamics, orbital transfer of space flexible composite and dynamics control. Currently, no comprehensive books on space nets dynamics and design are available, so potential readers can get to know the working mechanism, dynamics elements, and mission design of the space nets system from a Chinese perspective.
This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners.
This book describes issues in modeling unconventional conflict and suggests a new way to do the modeling. It presents an ontology that describes the unconventional conflict domain, which allows for greater ease in modeling unconventional conflict. Supporting holistic modeling, which means that we can see the entire picture of what needs to be modeled, the ontology allows us to make informed decisions about what to model and what to omit. The unconventional conflict ontology also separates the things we understand best from the things we understand least. This separation means that we can perform verification, validation and accreditation (VV&A) more efficiently and can describe the competence of the model more accurately. However, before this message can be presented in its entirety the supporting body of knowledge has to be explored. For this reason, the book offers chapters that focus on the description of unconventional conflict and the analyses that have been performed, modeling, with a concentration on past efforts at modeling unconventional conflict, the precursors to the ontology, and VV&A. Unconventional conflict is a complex, messy thing. It normally involves multiple actors, with their own conflicting agendas and differing concepts of legitimate actions. This book will present a useful introduction for researchers and professionals within the field.
This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as cancellable biometrics and soft biometrics. The book also focuses on several emerging topics such as big data issues, internet of things, medical biometrics, healthcare, and robot-human interactions. The authors show how these new applications have triggered a number of new biometric approaches. They show, as an example, how fuzzy extractor has become a useful tool for key generation in biometric banking, and vein/heart rates from medical records can also be used to identify patients. The contributors cover the topics, their methods, and their applications in depth.
This book details some of the major developments in the implementation of compressive sensing in radio applications for electronic defense and warfare communication use. It provides a comprehensive background to the subject and at the same time describes some novel algorithms. It also investigates application value and performance-related parameters of compressive sensing in scenarios such as direction finding, spectrum monitoring, detection, and classification.
This book is the first one addressing quantum information from the viewpoint of group symmetry. Quantum systems have a group symmetrical structure. This structure enables to handle systematically quantum information processing. However, there is no other textbook focusing on group symmetry for quantum information although there exist many textbooks for group representation. After the mathematical preparation of quantum information, this book discusses quantum entanglement and its quantification by using group symmetry. Group symmetry drastically simplifies the calculation of several entanglement measures although their calculations are usually very difficult to handle. This book treats optimal information processes including quantum state estimation, quantum state cloning, estimation of group action and quantum channel etc. Usually it is very difficult to derive the optimal quantum information processes without asymptotic setting of these topics. However, group symmetry allows to derive these optimal solutions without assuming the asymptotic setting. Next, this book addresses the quantum error correcting code with the symmetric structure of Weyl-Heisenberg groups. This structure leads to understand the quantum error correcting code systematically. Finally, this book focuses on the quantum universal information protocols by using the group SU(d). This topic can be regarded as a quantum version of the Csiszar-Korner's universal coding theory with the type method. The required mathematical knowledge about group representation is summarized in the companion book, Group Representation for Quantum Theory.
This book provides readers a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for electronic warfare and defensive countermeasures in military contexts. It explains in detail the theoretical and technical background, and addresses all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne / spaceborne electronic warfare, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, to date only limited information has been available on its use in electronic warfare systems, especially in developing nations. Addressing that need, this book offers essential engineering guidelines that especially focus on the speed and reliability of current-generation SiGe circuits and highlight emerging innovations that help to ensure the sustainable long-term integration of SiGe into electronic warfare systems.
The emergence of intelligent technologies, sophisticated natural language processing methodologies and huge textual repositories, invites a new approach for the challenge of automatically identifying personality dimensions through the analysis of textual data. This short book aims to (1) introduce the challenge of computational personality analysis, (2) present a unique approach to personality analysis and (3) illustrate this approach through case studies and worked-out examples. This book is of special relevance to psychologists, especially those interested in the new insights offered by new computational and data-intensive tools, and to computational social scientists interested in human personality and language processing.
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.
This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court.
This volume addresses the challenges associated with methodology and application of risk and resilience science and practice to address emerging threats in environmental, cyber, infrastructure and other domains. The book utilizes the collective expertise of scholars and experts in industry, government and academia in the new and emerging field of resilience in order to provide a more comprehensive and universal understanding of how resilience methodology can be applied in various disciplines and applications. This book advocates for a systems-driven view of resilience in applications ranging from cyber security to ecology to social action, and addresses resilience-based management in infrastructure, cyber, social domains and methodology and tools. Risk and Resilience has been written to open up a transparent dialog on resilience management for scientists and practitioners in all relevant academic disciplines and can be used as supplement in teaching risk assessment and management courses.
This book offers comprehensive coverage on the most important aspects of audio watermarking, from classic techniques to the latest advances, from commonly investigated topics to emerging research subdomains, and from the research and development achievements to date, to current limitations, challenges, and future directions. It also addresses key topics such as reversible audio watermarking, audio watermarking with encryption, and imperceptibility control methods. The book sets itself apart from the existing literature in three main ways. Firstly, it not only reviews classical categories of audio watermarking techniques, but also provides detailed descriptions, analysis and experimental results of the latest work in each category. Secondly, it highlights the emerging research topic of reversible audio watermarking, including recent research trends, unique features, and the potentials of this subdomain. Lastly, the joint consideration of audio watermarking and encryption is also reviewed. With the help of this concept, more secure audio watermarking systems can be developed, which meet the requirements for security and privacy in cloud-based networks and systems. Accordingly, the book serves as a tutorial suitable for readers with a general knowledge of audio signal processing as well as experts in related areas, helping these readers understand the basic principles and the latest advances, concepts and applications of audio watermarking.
The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through its own imperfections and vulnerabilities. Moreover, quantum computers are further pushing the boundaries of what is possible, by making machine learning cyber agents faster and smarter. With the abundance of often-confusing information and lack of trust in the diverse applications of AI-based technologies, it is essential to have a book that can explain, from a cyber security standpoint, why and at what stage the emerging, powerful technology of machine learning can and should be mistrusted, and how to benefit from it while avoiding potentially disastrous consequences. In addition, this book sheds light on another highly sensitive area - the application of machine learning for offensive purposes, an aspect that is widely misunderstood, under-represented in the academic literature and requires immediate expert attention.
This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods. Special attention is given to those approaches and technologies that unleash the power of collaboration among stakeholders, in a field based often developed in isolation and segregation of information. Given the pervasively growing dependency of society on IT technology, and the corresponding proliferation of cyber-threats, there is both an imperative need and opportunity to develop a coherent set of techniques to cope with the changing nature of the upcoming cyber-security challenges. These include evolving threats and new technological means to exploit vulnerabilities of cyber-physical systems that have direct socio-technical, societal and economic consequences for Europe and the world. We witness cyber-attacks on large scale infrastructures for energy, transport, healthcare systems and smart systems. The interplay between security and safety issues is now paramount and will be even more relevant in the future. The book collects contributions from a number of scientists in Europe and presents the results of several European Projects, as NeCS, SPARTA, E-CORRIDOR and C3ISP. It will be of value to industrial researchers, practitioners and engineers developing cyber-physical solutions, as well as academics and students in cyber-security, ICT, and smart technologies in general.
An emerging technology, Speaker Recognition is becoming well-known for providing voice authentication over the telephone for helpdesks, call centres and other enterprise businesses for business process automation. "Fundamentals of Speaker Recognition" introduces Speaker Identification, Speaker Verification, Speaker (Audio Event) Classification, Speaker Detection, Speaker Tracking and more. The technical problems are rigorously defined, and a complete picture is made of the relevance of the discussed algorithms and their usage in building a comprehensive Speaker Recognition System. Designed as a textbook with examples and exercises at the end of each chapter, "Fundamentals of Speaker Recognition" is suitable for advanced-level students in computer science and engineering, concentrating on biometrics, speech recognition, pattern recognition, signal processing and, specifically, speaker recognition. It is also a valuable reference for developers of commercial technology and for speech scientists. Please click on the link under "Additional Information" to view supplemental information including the Table of Contents and Index. |
You may like...
Reforming Civil-Military Relations in…
Aurel Croissant, David Kuehn
Hardcover
R4,627
Discovery Miles 46 270
Safety and Security Engineering VIII
M Guarascio, G. Passerini, …
Hardcover
R2,117
Discovery Miles 21 170
Air Insulation Prediction Theory and…
Zhibin Qiu, Jiangjun Ruan, …
Hardcover
R2,660
Discovery Miles 26 600
Physical Security 150 Things You Should…
Lawrence Fennelly, Louis Tyska
Paperback
R1,357
Discovery Miles 13 570
Advances in Cyber Security Analytics and…
Shishir K. Shandilya, Neal Wagner, …
Hardcover
R4,011
Discovery Miles 40 110
Mobile and Wireless Technology 2015
Kuinam J. Kim, Naruemon Wattanapongsakorn
Hardcover
Trusted Computing Platforms - TPM2.0 in…
Graeme Proudler, Liqun Chen, …
Hardcover
R4,853
Discovery Miles 48 530
|