![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems
This book addresses the reader interested in vehicular traffic phenomena, who have not learned about them before. It presents traffic phenomena like traffic breakdown and the emergence of moving traffic jams by showcasing empirical traffic data measured in real-world traffic. The author explains how these empirical traffic studies have led to the three-phase traffic theory and why this new theory is in conflict with standard traffic theories developed before. Moreover, he presents the reason for the failure of applications of standard traffic theories in real-world traffic and discusses why understanding real traffic has caused a paradigm shift in traffic and transportation science. The book examines why understanding real traffic breakdown is the basis for an explanation for the autonomous driving effects on traffic flow. It shows that understanding real traffic is possible from real-world traffic data without the need of mathematical traffic models. This makes the book intuitive for non-specialists, who can qualitatively understand all the basic features of traffic dynamics. In turn, experienced traffic researchers can grasp concepts and ideas made here easily accessible by the author, one of the leading pioneers in the field of vehicular traffic.
This book presents the state-of-the-art methodology and detailed analytical models and methods used to assess the reliability of complex systems and related applications in statistical reliability engineering. It is a textbook based mainly on the author's recent research and publications as well as experience of over 30 years in this field. The book covers a wide range of methods and models in reliability, and their applications, including: statistical methods and model selection for machine learning; models for maintenance and software reliability; statistical reliability estimation of complex systems; and statistical reliability analysis of k out of n systems, standby systems and repairable systems. Offering numerous examples and solved problems within each chapter, this comprehensive text provides an introduction to reliability engineering graduate students, a reference for data scientists and reliability engineers, and a thorough guide for researchers and instructors in the field.
This comprehensive text/reference presents an in-depth review of the state of the art of automotive connectivity and cybersecurity with regard to trends, technologies, innovations, and applications. The text describes the challenges of the global automotive market, clearly showing where the multitude of innovative activities fit within the overall effort of cutting-edge automotive innovations, and provides an ideal framework for understanding the complexity of automotive connectivity and cybersecurity. Topics and features: discusses the automotive market, automotive research and development, and automotive electrical/electronic and software technology; examines connected cars and autonomous vehicles, and methodological approaches to cybersecurity to avoid cyber-attacks against vehicles; provides an overview on the automotive industry that introduces the trends driving the automotive industry towards smart mobility and autonomous driving; reviews automotive research and development, offering background on the complexity involved in developing new vehicle models; describes the technologies essential for the evolution of connected cars, such as cyber-physical systems and the Internet of Things; presents case studies on Car2Go and car sharing, car hailing and ridesharing, connected parking, and advanced driver assistance systems; includes review questions and exercises at the end of each chapter. The insights offered by this practical guide will be of great value to graduate students, academic researchers and professionals in industry seeking to learn about the advanced methodologies in automotive connectivity and cybersecurity.
The book presents high-quality research papers presented at the 2nd American University in the Emirates International research conference, AUEIRC'18, organized by the American University in the Emirates, Dubai, held on November 13th-15th, 2018. The book is broadly divided into four sections: Sustainability and Smart Technology, Sustainability and Social Responsibility, Sustainability, Human Security and Legislation, Sustainability and Education. The topics covered under these sections are sustainable smart technology such as developing green curriculum for information technology, use ultrasonic velocity to predict quality of wheat, improve security features for visa system, factors affecting the cost of production of electricity and desalination plants, impact of smart traffic sensing in smart cities, smart healthcare system, simulation of Grey wolf optimization algorithm in painting digital forensics. The topics covered for sustainability and creative industries such as sustainable concrete production, multimedia applications in digital transformation art, integrating biomimicry principles in sustainable architecture. Sustainability, human security and legislation covered topics of urban performance and sustainable environment, Eco-certification as response on climate change, the criminal offence of tax evasion in law: case study, skills engineering in sustainable counter defense against Cyber extremism, the international law and challenges of trans-boundary water resources governance, the legal status of nuclear energy: case study, sustainable energy development and nuclear energy legislation in UAE, corruption specific safety challenge, environmental management and sustainability, sustainable farming models for desert agro-ecosystems, future directions of climate change, earth and built environment towards new concept of sustainability, institution building from emotional intelligence perspective, virtue ethics, technology and sustainability, the role of humor in a sustainable education, HEIs practices and strategic decisions toward planning for sustainable education programs, TQM in higher education for sustainable future. The papers in this book present high-quality original research work, findings and practical development experiences.
This book outlines the development of safety and cybersecurity, threats and activities in automotive vehicles. This book discusses the automotive vehicle applications and technological aspects considering its cybersecurity issues. Each chapter offers a suitable context for understanding the complexities of the connectivity and cybersecurity of intelligent and autonomous vehicles. A top-down strategy was adopted to introduce the vehicles' intelligent features and functionality. The area of vehicle-to-everything (V2X) communications aims to exploit the power of ubiquitous connectivity for the traffic safety and transport efficiency. The chapters discuss in detail about the different levels of autonomous vehicles, different types of cybersecurity issues, future trends and challenges in autonomous vehicles. Security must be thought as an important aspect during designing and implementation of the autonomous vehicles to prevent from numerous security threats and attacks. The book thus provides important information on the cybersecurity challenges faced by the autonomous vehicles and it seeks to address the mobility requirements of users, comfort, safety and security. This book aims to provide an outline of most aspects of cybersecurity in intelligent and autonomous vehicles. It is very helpful for automotive engineers, graduate students and technological administrators who want to know more about security technology as well as to readers with a security background and experience who want to know more about cybersecurity concerns in modern and future automotive applications and cybersecurity. In particular, this book helps people who need to make better decisions about automotive security and safety approaches. Moreover, it is beneficial to people who are involved in research and development in this exciting area. As seen from the table of contents, automotive security covers a wide variety of topics. In addition to being distributed through various technological fields, automotive cybersecurity is a recent and rapidly moving field, such that the selection of topics in this book is regarded as tentative solutions rather than a final word on what exactly constitutes automotive security. All of the authors have worked for many years in the area of embedded security and for a few years in the field of different aspects of automotive safety and security, both from a research and industry point of view.
This volume presents selected contributions from the "Advanced Research Workshop on Explosives Detection" hosted by the Department of Information Engineering of the University of Florence, Italy in 2018. The main goal of the workshop was to find out how Science for Peace and Security projects in the field of Explosives Detection contribute to the development and/or refinement of scientific and technical knowledge and competencies. The findings of the workshop, presented in the last section of the book, determine future actions and direction of the SPS Programme in the field of explosives detection and management.The NATO Science for Peace and Security (SPS) Programme, promotes dialogue and practical cooperation between NATO member states and partner nations based on scientific research, technological innovation and knowledge exchange. Several initiatives were launched in the field of explosive detection and clearance, as part of NATO's enhanced role in the international fight against terrorism. Experts and scientists from NATO members and partner countries have been brought together in multi-year projects, within the framework of the SPS Programme, to cooperate in the scientific research in explosive detection field, developing new technologies and methods to be implemented in order to detect explosive substances in different contexts.
This book provides the conceptual foundation of security risk assessment and thereby enables reasoning about risk from first principles. It presents the underlying theory that is the basis of a rigorous and universally applicable security risk assessment methodology. Furthermore, the book identifies and explores concepts with profound operational implications that have traditionally been sources of ambiguity if not confusion in security risk management. Notably, the text provides a simple quantitative model for complexity, a significant driver of risk that is typically not addressed in security-related contexts. Risk and The Theory of Security Risk Assessment is a primer of security risk assessment pedagogy, but it also provides methods and metrics to actually estimate the magnitude of security risk. Concepts are explained using numerous examples, which are at times both enlightening and entertaining. As a result, the book bridges a longstanding gap between theory and practice, and therefore will be a useful reference to students, academics and security practitioners.
In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks. The author first briefly introduces Sun Tzu. Then each chapter in the book takes its inspiration from an original title in The Art of War, where the author offers a general introduction to the content and then describes its application in a cybersecurity setting. These chapters cover estimates; waging war; offensive strategy; how you prepare for an attack; energy; weaknesses and strengths; the variables that need consideration before embarking on a war; how infrastructure is related to the concept of ground; attack by fire or how skilled attackers hide behind noise; and employing secret agents. The book will be interesting for computer security researchers and professionals who would like some grounding in a security mindset.
This book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future. The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies - weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that promise an increase in safety and security when it comes to the dangers posed by these terrorists. This part also includes a critical discussion of advantages and disadvantages of such technologies that are, quite often, sold as a 'silver bullet' approach in the fight against terrorism. Controversies such as those triggered by the abuse of millimeter wave scanners deployed at several Western European airports will demonstrate that there are costs involved with regard to human rights. The third, analytical part takes the critical discussion further by arguing that the uncritical fielding of new surveillance and control technologies in parallel with the on-going outsourcing and privatization of key services of the state could well lead to dystopias as envisaged in a rather prescient way by the so-called cyperpunk novels of the 1980s. The book concludes with the question that any liberal democracy should ask itself: how far can we go with regard to hardening our societies against terrorist threats?
This open access book explores the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. It defines the concepts of safety and security, and discusses the methodological, organizational and institutional implications that accompany approaching them as separate entities and combining them, respectively. The book explores the coupling of safety and security from different perspectives, especially: the concepts and methods of risk, safety and security; the managerial aspects; user experiences in connection with safety and security. Given its scope, the book will be of interest to researchers and practitioners in the fields of safety and security, and to anyone working at a business or in an industry concerned with how safety and security should be managed.
This engaging and accessible book explains the scientific principles behind guns, both ancient and modern. It connects their evolution to advances in science, as well as tracing the developments of projectiles and propellants. It is not limited to small arms but also looks at the science of enormous guns such the Paris Gun, for example, and reviews the efforts to build a gun to launch projectiles into space. Extremely fast guns are also covered, such as two-stage guns and rail guns. Further, the book provides insight into the science of terminal ballistics and wound ballistics as well as the challenging subject of gun control. It is full of interesting facts for all who are curious about the science and history of guns, as well as those for whom the gun is an accessory of their profession.
This book introduces the core concepts of bloodstain pattern analysis that help to understand and make independent contributions to crime scenes accurately. It presents a bridge between new research results and the practical work field of crime scene investigation in bloodstain pattern analysis, by showing and detailing reports of two different scenarios. The scenarios presented have an extensive description of gathered evidence and are diversified with real crime scene photography and sketches. This kind of case report is rare in scientific books, but the author, as a researcher, has permission from the authorities to present the cases. The book finally concludes with the main problems of modern bloodstain pattern analysis and discusses the way forward.
This text provides training on the fundamental tools and methodologies used in active forensic laboratories for the complicated analysis of fire debris and explosives evidence. It is intended to serve as a gateway for students and transitioning forensic science or chemistry professionals. The book is divided between the two disciplines of fire debris and explosives, with a final pair of chapters devoted to the interplay between the two disciplines and with other disciplines, such as DNA and fingerprint analysis. It brings together a multi-national group of technical experts, ranging from academic researchers to active practitioners, including members of some of the premier forensic agencies of the world. Readers will gain knowledge of practical methods of analysis and will develop a strong foundation for laboratory work in forensic chemistry. End-of-chapter questions based on relevant topics and real-world data provide a realistic arena for learners to test newly-acquired techniques.
This book presents the results of an experiment assessing the impact of spruce wood joints on the creation and development of fire when these joints are applied within a facade. The book includes an extensive analysis of wooden cladding, which is a flammable material in which the elements are connected lengthwise using various types of joint. The parameters of the experiment, as well as the setting, material criteria and evaluation criteria are described in detail. The results confirm that the joint type used has an impact on the selected evaluation criteria and thus also on the potential spread of fire.
This book investigates the susceptibility of intrinsic physically unclonable function (PUF) implementations on reconfigurable hardware to optical semi-invasive attacks from the chip backside. It explores different classes of optical attacks, particularly photonic emission analysis, laser fault injection, and optical contactless probing. By applying these techniques, the book demonstrates that the secrets generated by a PUF can be predicted, manipulated or directly probed without affecting the behavior of the PUF. It subsequently discusses the cost and feasibility of launching such attacks against the very latest hardware technologies in a real scenario. The author discusses why PUFs are not tamper-evident in their current configuration, and therefore, PUFs alone cannot raise the security level of key storage. The author then reviews the potential and already implemented countermeasures, which can remedy PUFs' security-related shortcomings and make them resistant to optical side-channel and optical fault attacks. Lastly, by making selected modifications to the functionality of an existing PUF architecture, the book presents a prototype tamper-evident sensor for detecting optical contactless probing attempts.
The book provides theoretical methods of connecting discrete-variable quantum information processing to continuous-variable one. It covers the two major fields of quantum information processing, quantum communication and quantum computation, leading to achievement of a long-sought full security of continuous-variable quantum key distribution (QKD) and proposal of a resource-efficient method for optical quantum computing. Firstly, the book provides a security of continuous-variable QKD against arbitrary attacks under a realistic condition such as finite communication rounds and the use of digitized information processing. The book also provides the unified view for conventionally used approximate Gottesman-Kitaev-Preskill (GKP) codes, which encodes qudits on a continuous-variable system, enabling direct comparison between researches based on different approximations.  The book finally proposes a resource-efficient method to realize the universal optical quantum computation using the GKP code via the direct preparation of the GKP magic state instead of GKP Pauli states. Feasibility of the proposed protocol is discussed based on the existing experimental proposals for the GKP state preparation.
This book presents the latest developments in biometrics technologies and reports on new approaches, methods, findings, and technologies developed or being developed by the research community and the industry. The book focuses on introducing fundamental principles and concepts of key enabling technologies for biometric systems applied for both physical and cyber security. The authors disseminate recent research and developing efforts in this area, investigate related trends and challenges, and present case studies and examples such as fingerprint, face, iris, retina, keystroke dynamics, and voice applications . The authors also investigate the advances and future outcomes in research and development in biometric security systems. The book is applicable to students, instructors, researchers, industry practitioners, and related government agencies staff. Each chapter is accompanied by a set of PowerPoint slides for use by instructors.
This open access book focuses on investigating predicting precursor information and key points of rockburst in mining engineering through laboratory experiment, theoretical analysis, numerical simulation and case studies. Understanding the evolution patterns for the microstructure instability of rock is a prerequisite for rockburst prediction. The book provides a guide for readers seeking to understand the evolution patterns for the microstrucure of rock failure, the predicting key point of rock failure and the rockburst predicting model. It will be an essential reference to understand mechanism of rockburst and sheds new light on dynamic disasters prediction. Chapters are carefully developed to cover (1) The evolution patterns for the microstructure instability of rock; (2) Rockburst hazard monitoring and predicting criterion and predicting models. The book addresses the issue with a holistic and systematic approach that investigates the occurrence mechanism of rockburst based on the evolution patterns for the microstructure of rock failure and establishes the predicting model of rockburst. This book will be of interest to researchers of mining engineering, rock mechanics engineering and safety engineering.
This book offers comprehensive coverage on the most important aspects of audio watermarking, from classic techniques to the latest advances, from commonly investigated topics to emerging research subdomains, and from the research and development achievements to date, to current limitations, challenges, and future directions. It also addresses key topics such as reversible audio watermarking, audio watermarking with encryption, and imperceptibility control methods. The book sets itself apart from the existing literature in three main ways. Firstly, it not only reviews classical categories of audio watermarking techniques, but also provides detailed descriptions, analysis and experimental results of the latest work in each category. Secondly, it highlights the emerging research topic of reversible audio watermarking, including recent research trends, unique features, and the potentials of this subdomain. Lastly, the joint consideration of audio watermarking and encryption is also reviewed. With the help of this concept, more secure audio watermarking systems can be developed, which meet the requirements for security and privacy in cloud-based networks and systems. Accordingly, the book serves as a tutorial suitable for readers with a general knowledge of audio signal processing as well as experts in related areas, helping these readers understand the basic principles and the latest advances, concepts and applications of audio watermarking.
This volume addresses the challenges associated with methodology and application of risk and resilience science and practice to address emerging threats in environmental, cyber, infrastructure and other domains. The book utilizes the collective expertise of scholars and experts in industry, government and academia in the new and emerging field of resilience in order to provide a more comprehensive and universal understanding of how resilience methodology can be applied in various disciplines and applications. This book advocates for a systems-driven view of resilience in applications ranging from cyber security to ecology to social action, and addresses resilience-based management in infrastructure, cyber, social domains and methodology and tools. Risk and Resilience has been written to open up a transparent dialog on resilience management for scientists and practitioners in all relevant academic disciplines and can be used as supplement in teaching risk assessment and management courses.
This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods. Special attention is given to those approaches and technologies that unleash the power of collaboration among stakeholders, in a field based often developed in isolation and segregation of information. Given the pervasively growing dependency of society on IT technology, and the corresponding proliferation of cyber-threats, there is both an imperative need and opportunity to develop a coherent set of techniques to cope with the changing nature of the upcoming cyber-security challenges. These include evolving threats and new technological means to exploit vulnerabilities of cyber-physical systems that have direct socio-technical, societal and economic consequences for Europe and the world. We witness cyber-attacks on large scale infrastructures for energy, transport, healthcare systems and smart systems. The interplay between security and safety issues is now paramount and will be even more relevant in the future. The book collects contributions from a number of scientists in Europe and presents the results of several European Projects, as NeCS, SPARTA, E-CORRIDOR and C3ISP. It will be of value to industrial researchers, practitioners and engineers developing cyber-physical solutions, as well as academics and students in cyber-security, ICT, and smart technologies in general.
The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through its own imperfections and vulnerabilities. Moreover, quantum computers are further pushing the boundaries of what is possible, by making machine learning cyber agents faster and smarter. With the abundance of often-confusing information and lack of trust in the diverse applications of AI-based technologies, it is essential to have a book that can explain, from a cyber security standpoint, why and at what stage the emerging, powerful technology of machine learning can and should be mistrusted, and how to benefit from it while avoiding potentially disastrous consequences. In addition, this book sheds light on another highly sensitive area - the application of machine learning for offensive purposes, an aspect that is widely misunderstood, under-represented in the academic literature and requires immediate expert attention.
These proceedings comprise invited papers from highly experienced researchers in THz technology and security applications. THz detection of explosives represents one of the most appealing technologies to have recently emerged in dealing with terrorist attacks encountered by civil security and military forces throughout the world. Discussed are the most advanced technologies and developments, the various points of operational strength and weaknesses as well as are suggestions and predictions the best technological solutions to overcome current operational limits.The current status of various levels of cooling in THz detectors, sources and associated electronics are also addressed. The goal was to provide a clear view on the current technologies available and the required advances needed in order to achieve more efficient systems. This goal was outlined in part by establishing the baseline of current uncertainty estimations in physics-based modelling and the identification of key areas which require additional research and development. "
When the SCION project started in 2009, the goal was to create an architecture offering high availability and security for basic point-to-point communication. In the five years since the publication of SCION: A Secure Internet Architecture, this next-generation Internet architecture has evolved in terms of both design and deployment. On the one hand, there has been development of exciting new concepts and systems, including a new global time-synchronization system, an inter-domain approach for bandwidth reservations called COLIBRI, and Green Networking, which allows combating global climate change on three fronts. On the other hand, SCION is now also in production use by the Swiss financial ecosystem, and enables participants such as the Swiss National Bank, the Swiss provider of clearing services (SIX), and all Swiss financial institutes to communicate securely and reliably with each other via the Secure Swiss Finance Network. This unique guidebook provides an updated description of SCION's main components, covering new research topics and the most recent deployments. In particular, it presents in-depth discussion of formal verification efforts. Importantly, it offers a comprehensive, thorough description of the current SCION system: Describes the principles that guided SCION's design as a secure and robust Internet architecture Provides a comprehensive description of the next evolution in the way data finds its way through the Internet Explains how SCION can contribute to reducing carbon emissions, by introducing SCION Green Networking Demonstrates how SCION not only functions in academic settings but also works in production deployments Discusses additional use cases for driving SCION's adoption Presents the approaches for formal verification of protocols and code Illustrated with many colorful figures, pictures, and diagrams, allowing easy access to the concepts and use cases Assembled by a team with extensive experience in the fields of computer networks and security, this text/reference is suitable for researchers, practitioners, and graduate students interested in network security. Also, readers with limited background in computer networking but with a desire to know more about SCION will benefit from an overview of relevant chapters in the beginning of the book.
This textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and sbilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management. |
![]() ![]() You may like...
Political Decision-Making and Security…
Luisa Dall'acqua, Irene M. Gironacci
Hardcover
R5,732
Discovery Miles 57 320
Mathematical Concepts and Applications…
Mangey Ram, J. Paulo Davim
Hardcover
R5,951
Discovery Miles 59 510
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, …
Hardcover
R7,930
Discovery Miles 79 300
Advances in Complex Analysis and…
Francisco Bulnes, Olga Hachay
Hardcover
R3,331
Discovery Miles 33 310
The Complete Works of Gabrio Piola…
Francesco Dell'Isola, Giulio Maier, …
Hardcover
R5,762
Discovery Miles 57 620
The Unresolved National Question - Left…
Edward Webster, Karin Pampallis
Paperback
![]()
|