![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems
This innovative volume gathers some of the world's best scholars to analyse the world's collective international efforts to address globalised threats through global security governance. Addressing global and planetary forms of insecurity that include nuclear weapons, conventional arms, gender violence, climate change, disease, bio weapons, cyber-conflict, children in conflict, crimes against humanity, and refugees, this timely book critiques how they are addressed by global institutions and regimes, and advocates important conceptual, institutional, and policy reforms. This is an invaluable resource for students, scholars and policymakers in international health, security and development.
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.
This volume addresses the challenges associated with methodology and application of risk and resilience science and practice to address emerging threats in environmental, cyber, infrastructure and other domains. The book utilizes the collective expertise of scholars and experts in industry, government and academia in the new and emerging field of resilience in order to provide a more comprehensive and universal understanding of how resilience methodology can be applied in various disciplines and applications. This book advocates for a systems-driven view of resilience in applications ranging from cyber security to ecology to social action, and addresses resilience-based management in infrastructure, cyber, social domains and methodology and tools. Risk and Resilience has been written to open up a transparent dialog on resilience management for scientists and practitioners in all relevant academic disciplines and can be used as supplement in teaching risk assessment and management courses.
This book offers comprehensive coverage on the most important aspects of audio watermarking, from classic techniques to the latest advances, from commonly investigated topics to emerging research subdomains, and from the research and development achievements to date, to current limitations, challenges, and future directions. It also addresses key topics such as reversible audio watermarking, audio watermarking with encryption, and imperceptibility control methods. The book sets itself apart from the existing literature in three main ways. Firstly, it not only reviews classical categories of audio watermarking techniques, but also provides detailed descriptions, analysis and experimental results of the latest work in each category. Secondly, it highlights the emerging research topic of reversible audio watermarking, including recent research trends, unique features, and the potentials of this subdomain. Lastly, the joint consideration of audio watermarking and encryption is also reviewed. With the help of this concept, more secure audio watermarking systems can be developed, which meet the requirements for security and privacy in cloud-based networks and systems. Accordingly, the book serves as a tutorial suitable for readers with a general knowledge of audio signal processing as well as experts in related areas, helping these readers understand the basic principles and the latest advances, concepts and applications of audio watermarking.
The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through its own imperfections and vulnerabilities. Moreover, quantum computers are further pushing the boundaries of what is possible, by making machine learning cyber agents faster and smarter. With the abundance of often-confusing information and lack of trust in the diverse applications of AI-based technologies, it is essential to have a book that can explain, from a cyber security standpoint, why and at what stage the emerging, powerful technology of machine learning can and should be mistrusted, and how to benefit from it while avoiding potentially disastrous consequences. In addition, this book sheds light on another highly sensitive area - the application of machine learning for offensive purposes, an aspect that is widely misunderstood, under-represented in the academic literature and requires immediate expert attention.
This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods. Special attention is given to those approaches and technologies that unleash the power of collaboration among stakeholders, in a field based often developed in isolation and segregation of information. Given the pervasively growing dependency of society on IT technology, and the corresponding proliferation of cyber-threats, there is both an imperative need and opportunity to develop a coherent set of techniques to cope with the changing nature of the upcoming cyber-security challenges. These include evolving threats and new technological means to exploit vulnerabilities of cyber-physical systems that have direct socio-technical, societal and economic consequences for Europe and the world. We witness cyber-attacks on large scale infrastructures for energy, transport, healthcare systems and smart systems. The interplay between security and safety issues is now paramount and will be even more relevant in the future. The book collects contributions from a number of scientists in Europe and presents the results of several European Projects, as NeCS, SPARTA, E-CORRIDOR and C3ISP. It will be of value to industrial researchers, practitioners and engineers developing cyber-physical solutions, as well as academics and students in cyber-security, ICT, and smart technologies in general.
This volume describes fire behavior and fire protection of timbers in outdoors and indoors application mainly in construction industry. The Authors' novel approach considers the relationship between various species and age of timbers and its fire behavior at different thermal and fire loads. Quantitative data of ignition speed and flame propagation as well as generation of heat, smoke and toxic products are discussed. Analysis of fire resistance of various types of building materials based on timber of different species as well as the novel data on the effect of natural and accelerated aging of timbers on its fire behavior are discussed. The main practical methods of fire protection of new and ancient timber buildings and structures to increase its fire resistance are considered. The book should be useful for a wide range of readers: chemists, physicists, material scientists, architects, engineers, constructors and restorers.
Physically unclonable functions (PUFs) are innovative physical security primitives that produce unclonable and inherent instance-specific measurements of physical objects; in many ways they are the inanimate equivalent of biometrics for human beings. Since they are able to securely generate and store secrets, they allow us to bootstrap the physical implementation of an information security system. In this book the author discusses PUFs in all their facets: the multitude of their physical constructions, the algorithmic and physical properties which describe them, and the techniques required to deploy them in security applications. The author first presents an extensive overview and classification of PUF constructions, with a focus on so-called intrinsic PUFs. He identifies subclasses, implementation properties, and design techniques used to amplify submicroscopic physical distinctions into observable digital response vectors. He lists the useful qualities attributed to PUFs and captures them in descriptive definitions, identifying the truly PUF-defining properties in the process, and he also presents the details of a formal framework for deploying PUFs and similar physical primitives in cryptographic reductions. The author then describes a silicon test platform carrying different intrinsic PUF structures which was used to objectively compare their reliability, uniqueness, and unpredictability based on experimental data. In the final chapters, the author explains techniques for PUF-based entity identification, entity authentication, and secure key generation. He proposes practical schemes that implement these techniques, and derives and calculates measures for assessing different PUF constructions in these applications based on the quality of their response statistics. Finally, he presents a fully functional prototype implementation of a PUF-based cryptographic key generator, demonstrating the full benefit of using PUFs and the efficiency of the processing techniques described. This is a suitable introduction and reference for security researchers and engineers, and graduate students in information security and cryptography.
An emerging technology, Speaker Recognition is becoming well-known for providing voice authentication over the telephone for helpdesks, call centres and other enterprise businesses for business process automation. "Fundamentals of Speaker Recognition" introduces Speaker Identification, Speaker Verification, Speaker (Audio Event) Classification, Speaker Detection, Speaker Tracking and more. The technical problems are rigorously defined, and a complete picture is made of the relevance of the discussed algorithms and their usage in building a comprehensive Speaker Recognition System. Designed as a textbook with examples and exercises at the end of each chapter, "Fundamentals of Speaker Recognition" is suitable for advanced-level students in computer science and engineering, concentrating on biometrics, speech recognition, pattern recognition, signal processing and, specifically, speaker recognition. It is also a valuable reference for developers of commercial technology and for speech scientists. Please click on the link under "Additional Information" to view supplemental information including the Table of Contents and Index.
In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions are central to the discussion throughout. The author balances a largely non-rigorous style - many proofs are sketched only - with appropriate formality and depth. For example, he uses the terminology of groups and finite fields so that the reader can understand both the latest academic research and "real-world" documents such as application programming interface descriptions and cryptographic standards. The text employs colour to distinguish between public and private information, and all chapters include summaries and suggestions for further reading. This is a suitable textbook for advanced undergraduate and graduate students in computer science, mathematics and engineering, and for self-study by professionals in information security. While the appendix summarizes most of the basic algebra and notation required, it is assumed that the reader has a basic knowledge of discrete mathematics, probability, and elementary calculus.
This book, comprising contributions presented at the XIX Edoardo Amaldi Conference, examines important aspects of international cooperation aimed at enhancing nuclear safety, security, safeguards (the "3S"), and non-proliferation, thereby assisting in the development and maintenance of the verification regime and progress toward a nuclear weapon-free world. The Conference served as a forum where eminent scientists, diplomats, and policymakers could compare national perspectives and update international collaborations. The book opens by addressing the political, institutional, and legal dimensions of the 3S and non-proliferation; current challenges are discussed and attempts made to identify possible solutions and future improvements. Subsequent sections consider scientific developments that can contribute to increased effectiveness in the implementation of international regimes, particularly in critical areas, technology foresight, and the ongoing evaluation of current capabilities. The closing sections discuss scientific and technical challenges to the effective implementation of the 3S approach and the role of international cooperation and scientific community actions in leading the world toward peace and security.
The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC. In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI. This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.
These proceedings comprise invited papers from highly experienced researchers in THz technology and security applications. THz detection of explosives represents one of the most appealing technologies to have recently emerged in dealing with terrorist attacks encountered by civil security and military forces throughout the world. Discussed are the most advanced technologies and developments, the various points of operational strength and weaknesses as well as are suggestions and predictions the best technological solutions to overcome current operational limits.The current status of various levels of cooling in THz detectors, sources and associated electronics are also addressed. The goal was to provide a clear view on the current technologies available and the required advances needed in order to achieve more efficient systems. This goal was outlined in part by establishing the baseline of current uncertainty estimations in physics-based modelling and the identification of key areas which require additional research and development. "
The title explain new technique of secured and high capacity optical communication signals generation by using the micro and nano ring resonators. The pulses are known as soliton pulses which are more secured due to having the properties of chaotic and dark soliton signals with ultra short bandwidth. They have high capacity due to the fact that ring resonators are able to generate pulses in the form of solitons in multiples and train form. These pulses generated by ring resonators are suitable in optical communication due to use the compact and integrated rings system, easy to control, flexibility, less loss, application in long distance communication and many other advantages. Using these pulses overcome the problems such as losses during the propagation, long distances, error detection, using many repeaters or amplifiers, undetectable received signals, pulse broadening, overlapping and so on. This book show how to generate soliton pulses using ring resonators in the micro and nano range which can be used in optical communication to improve the transmission technique and quality of received signals in networks such as WiFi and wireless communication.
This book provides the new results in wavelet filter banks based feature extraction, and the classifier in the field of iris image recognition. It provides the broad treatment on the design of separable, non-separable wavelets filter banks, and the classifier. The design techniques presented in the book are applied on iris image analysis for person authentication. This book also brings together the three strands of research (wavelets, iris image analysis and classifier). It compares the performance of the presented techniques with state-of-the-art available schemes. This book contains the compilation of basic material on the design of wavelets that avoids reading many different books. Therefore, it provides an easier path for the new-comers, researchers to master the contents. In addition, the designed filter banks and classifier can also be effectively used than existing filter-banks in many signal processing applications like pattern classification, data-compression, watermarking, denoising etc. that will give the new directions of the research in the relevant field for the readers.
The reader will find here a timely update on new THz sources and detection schemes as well as concrete applications to the detection of Explosives and CBRN. Included is a method to identify hidden RDX-based explosives (pure and plastic ones) in the frequency domain study by Fourier Transformation, which has been complemented by the demonstration of improvement of the quality of the images captured commercially available THz passive cameras. The presented examples show large potential for the detection of small hidden objects at long distances (6-10 m). Complementing the results in the short-wavelength range, laser spectroscopy with a mid-infrared, room temperature, continuous wave, DFB laser diode and high performance DFB QCL have been demonstrated to offer excellent enabling sensor technologies for environmental monitoring, medical diagnostics, industrial and security applications. From the new source point of view a number of systems have been presented - From superconductors to semiconductors, e.g. Detection of Terahertz Waves from Superconducting Bi2Sr2CaCu2O8+ Intrinsic Josephson Junctions.The quest for a compact room temperature THz source and the recent advances in high power mid-IR QCLs lead to the development of a semiconductor THz source based on intracavity difference frequency generation. Furthermore, alternative electrically pumped THz sources based on the high emission efficiency predicted for polaritonic states in the ultra-strong coupling regime led to the demonstration of electroluminescent devices. Finally, antipolaritons in dispersive media were discussed and different aspects of the interaction of THz radiation with biomatter were presented."
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions. The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices.
This textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and sbilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management.
Reading Fire examines the selection of appropriate tactics for the stages of fire development and burning profiles and includes a detailed comparison of techniques, including Tactical Ventilation, Transitional Attack, Water Application and Nozzle Techniques. It also concludes with consideration of the STAR Model of Decision Making and an evaluation of Basic Incident Command Principles. It is simple and easy-to-use, making it an ideal companion for all frontline practitioners, to both improve firefighter safety and to support professional development.
This book focuses on the importance of human factors in the development of safe and reliable robotic and unmanned systems. It discusses solutions for improving the perceptual and cognitive abilities of robots, developing suitable synthetic vision systems, coping with degraded reliability in unmanned systems, and predicting robotic behavior in relation to human activities. It covers the design of improved, easy to use, human-system interfaces, together with strategies for increasing human-system performance, and reducing cognitive workload at the user interface. It also discusses real-world applications and case studies of human-robot and human-agent collaboration in different business and educational endeavors. The second part of the book reports on research and developments in the field of human factors in cybersecurity.Contributions cover the technological, social, economic and behavioral aspects of the cyberspace, providing a comprehensive perspective to manage cybersecurity risks. Based on the two AHFE 2021 Conferences such as the AHFE 2021 Conference on Human Factors in Robots, Drones and Unmanned Systems, and the AHFE 2021 Conference on Human Factors in Cybersecurity, held virtually on 25-29 July, 2021, from USA, this book offers extensive information and highlights the importance of multidisciplinary approaches merging engineering, computer science, business and psychological knowledge. It is expected to foster discussion and collaborations between researchers and practitioners with different background, thus stimulating new solutions for the development of reliable and safe, human-centered, highly functional devices to perform automated and concurrent tasks, and to achieve an inclusive, holistic approach for enhancing cybersecurity.
Completing a full scene assessment upon arrival at an incident can significantly lower the overall risks, as well allow for a more effective response. Reading Fire supports frontline practitioners in gathering information upon arrival at an incident, using the 'BE-SAHF' model of assessment. Using a step-by-step approach, it considers each critical area of the model, from building, construction and environmental factors, to understanding and reading smoke, airflow, heat and flames. It explores each of these areas in depth and considers the evidence that needs to be analysed in order to formulate an effective tactical plan.
Despite the growing interest in security amongst governments, organizations and the general public, the provision of much security is substandard. This book explores the problems facing security, and sets out innovative proposals to enhance the effectiveness of security in society, at national and organizational levels.
The potential of crime prevention, security and community safety is constrained by implementation failure. This book presents a carefully-designed system of good practice, the 5Is, which handles the complexities of real world prevention, this aims to improve the performance of prevention, and advance process evaluation.
This textbook is the first comprehensive and systematic account of the science, technology and policy issues associated with nuclear energy and nuclear weapons. Throughout their account of the evolution of nuclear policy, from its origin to the early Trump presidency, the authors interweave clear technical expositions of the science and technology that underpin and constrain it. The book begins by tracing the early work in atomic physics, the discovery of fission, and the developments that led to the Manhattan Project and the delivery of atomic bombs against Japan that ended World War II. It follows the initial failed attempts at nuclear disarmament, the onset of the Cold War nuclear arms competition, and the development of light water reactors to harness nuclear energy for electric power generation. The authors thoroughly unpack the problem of nuclear proliferation, examining the strategy and incentives for states that have and have not pursued nuclear weapons, and providing an overview of the nuclear arsenals of the current nuclear weapon states. They trace the technical, political and strategic evolution of deterrence, arms control and disarmament policies from the first attempts for an Outer Space Treaty in 1957 through the new START treaty of 2009. At critical junctures in the narrative, the authors explain the relevant nuclear science and technology including nuclear fission and criticality; nuclear materials and enrichment; nuclear detonation and nuclear weapons effects; nuclear weapons stockpile constraints, stewardship and surveillance; nuclear fusion and thermonuclear weapons; technologies for monitoring, verification and proliferation; and nuclear forensics. They conclude with an assessment of contemporary issues ranging from the Joint Comprehensive Plan of Action reached to halt Iran's nuclear weapons development program, to the threat of nuclear terrorism, the perceived nuclear weapons policies of Russia and China, and the US efforts to provide disincentives for its allies to acquire their own nuclear weapons by maintaining credible security guarantees.
The Cold War saw scientists in East and West racing to create amazing new technologies, the like of which the world had never seen. Yet not everyone was taken by surprise. From super-powerful atomic weapons to rockets and space travel, readers of science fiction (SF) had seen it all before. Sometimes reality lived up to the SF vision, at other times it didn't. The hydrogen bomb was as terrifyingly destructive as anything in fiction, while real-world lasers didn't come close to the promise of the classic SF ray gun. Nevertheless, when the scientific Cold War culminated in the Strategic Defence Initiative of the 1980s, it was so science-fictional in its aspirations that the media dubbed it "Star Wars". This entertaining account, offering a plethora of little known facts and insights from previously classified military projects, shows how the real-world science of the Cold War followed in the footsteps of SF - and how the two together changed our perception of both science and scientists, and paved the way to the world we live in today. |
You may like...
Fieldbus Systems and Their Applications…
D Dietrich, P. Neumann, …
Paperback
R2,203
Discovery Miles 22 030
Fundamentals of Switching Theory and…
Jaakko Astola, Radomir S Stankovic
Hardcover
R1,597
Discovery Miles 15 970
Java How to Program, Late Objects…
Paul Deitel, Harvey Deitel
Paperback
|