0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (1)
  • R500+ (309)
  • -
Status
Format
Author / Contributor
Publisher

Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems

Fire Behavior and Fire Protection in Timber Buildings (Paperback, Softcover reprint of the original 1st ed. 2014): Roza Aseeva,... Fire Behavior and Fire Protection in Timber Buildings (Paperback, Softcover reprint of the original 1st ed. 2014)
Roza Aseeva, Boris Serkov, Andrey Sivenkov
R4,757 Discovery Miles 47 570 Ships in 18 - 22 working days

This volume describes fire behavior and fire protection of timbers in outdoors and indoors application mainly in construction industry. The Authors' novel approach considers the relationship between various species and age of timbers and its fire behavior at different thermal and fire loads. Quantitative data of ignition speed and flame propagation as well as generation of heat, smoke and toxic products are discussed. Analysis of fire resistance of various types of building materials based on timber of different species as well as the novel data on the effect of natural and accelerated aging of timbers on its fire behavior are discussed. The main practical methods of fire protection of new and ancient timber buildings and structures to increase its fire resistance are considered. The book should be useful for a wide range of readers: chemists, physicists, material scientists, architects, engineers, constructors and restorers.

Physically Unclonable Functions - Constructions, Properties and Applications (Paperback, Softcover reprint of the original 1st... Physically Unclonable Functions - Constructions, Properties and Applications (Paperback, Softcover reprint of the original 1st ed. 2013)
Roel Maes
R1,920 Discovery Miles 19 200 Ships in 18 - 22 working days

Physically unclonable functions (PUFs) are innovative physical security primitives that produce unclonable and inherent instance-specific measurements of physical objects; in many ways they are the inanimate equivalent of biometrics for human beings. Since they are able to securely generate and store secrets, they allow us to bootstrap the physical implementation of an information security system. In this book the author discusses PUFs in all their facets: the multitude of their physical constructions, the algorithmic and physical properties which describe them, and the techniques required to deploy them in security applications. The author first presents an extensive overview and classification of PUF constructions, with a focus on so-called intrinsic PUFs. He identifies subclasses, implementation properties, and design techniques used to amplify submicroscopic physical distinctions into observable digital response vectors. He lists the useful qualities attributed to PUFs and captures them in descriptive definitions, identifying the truly PUF-defining properties in the process, and he also presents the details of a formal framework for deploying PUFs and similar physical primitives in cryptographic reductions. The author then describes a silicon test platform carrying different intrinsic PUF structures which was used to objectively compare their reliability, uniqueness, and unpredictability based on experimental data. In the final chapters, the author explains techniques for PUF-based entity identification, entity authentication, and secure key generation. He proposes practical schemes that implement these techniques, and derives and calculates measures for assessing different PUF constructions in these applications based on the quality of their response statistics. Finally, he presents a fully functional prototype implementation of a PUF-based cryptographic key generator, demonstrating the full benefit of using PUFs and the efficiency of the processing techniques described. This is a suitable introduction and reference for security researchers and engineers, and graduate students in information security and cryptography.

Fundamentals of Speaker Recognition (Paperback, Softcover reprint of the original 1st ed. 2011): Homayoon Beigi Fundamentals of Speaker Recognition (Paperback, Softcover reprint of the original 1st ed. 2011)
Homayoon Beigi
R2,844 Discovery Miles 28 440 Ships in 18 - 22 working days

An emerging technology, Speaker Recognition is becoming well-known for providing voice authentication over the telephone for helpdesks, call centres and other enterprise businesses for business process automation. "Fundamentals of Speaker Recognition" introduces Speaker Identification, Speaker Verification, Speaker (Audio Event) Classification, Speaker Detection, Speaker Tracking and more. The technical problems are rigorously defined, and a complete picture is made of the relevance of the discussed algorithms and their usage in building a comprehensive Speaker Recognition System. Designed as a textbook with examples and exercises at the end of each chapter, "Fundamentals of Speaker Recognition" is suitable for advanced-level students in computer science and engineering, concentrating on biometrics, speech recognition, pattern recognition, signal processing and, specifically, speaker recognition. It is also a valuable reference for developers of commercial technology and for speech scientists. Please click on the link under "Additional Information" to view supplemental information including the Table of Contents and Index.

Introduction to Public Key Infrastructures (Paperback, Softcover reprint of the original 1st ed. 2013): Johannes A. Buchmann,... Introduction to Public Key Infrastructures (Paperback, Softcover reprint of the original 1st ed. 2013)
Johannes A. Buchmann, Evangelos Karatsiolis, Alexander Wiesmaier
R2,260 Discovery Miles 22 600 Ships in 18 - 22 working days

The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC. In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI. This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.

Cryptography Made Simple (Paperback, Softcover reprint of the original 1st ed. 2016): Nigel Smart Cryptography Made Simple (Paperback, Softcover reprint of the original 1st ed. 2016)
Nigel Smart
R3,109 Discovery Miles 31 090 Ships in 18 - 22 working days

In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions are central to the discussion throughout. The author balances a largely non-rigorous style - many proofs are sketched only - with appropriate formality and depth. For example, he uses the terminology of groups and finite fields so that the reader can understand both the latest academic research and "real-world" documents such as application programming interface descriptions and cryptographic standards. The text employs colour to distinguish between public and private information, and all chapters include summaries and suggestions for further reading. This is a suitable textbook for advanced undergraduate and graduate students in computer science, mathematics and engineering, and for self-study by professionals in information security. While the appendix summarizes most of the basic algebra and notation required, it is assumed that the reader has a basic knowledge of discrete mathematics, probability, and elementary calculus.

THz and Security Applications - Detectors, Sources and Associated Electronics for THz Applications (Paperback, 2014): Carlo... THz and Security Applications - Detectors, Sources and Associated Electronics for THz Applications (Paperback, 2014)
Carlo Corsi, Fedir Sizov
R4,939 Discovery Miles 49 390 Ships in 18 - 22 working days

These proceedings comprise invited papers from highly experienced researchers in THz technology and security applications. THz detection of explosives represents one of the most appealing technologies to have recently emerged in dealing with terrorist attacks encountered by civil security and military forces throughout the world. Discussed are the most advanced technologies and developments, the various points of operational strength and weaknesses as well as are suggestions and predictions the best technological solutions to overcome current operational limits.The current status of various levels of cooling in THz detectors, sources and associated electronics are also addressed. The goal was to provide a clear view on the current technologies available and the required advances needed in order to achieve more efficient systems. This goal was outlined in part by establishing the baseline of current uncertainty estimations in physics-based modelling and the identification of key areas which require additional research and development.

"

Digital Quantum Information Processing with Continuous-Variable Systems (Hardcover, 1st ed. 2023): Takaya Matsuura Digital Quantum Information Processing with Continuous-Variable Systems (Hardcover, 1st ed. 2023)
Takaya Matsuura
R4,305 R3,781 Discovery Miles 37 810 Save R524 (12%) Ships in 10 - 15 working days

The book provides theoretical methods of connecting discrete-variable quantum information processing to continuous-variable one. It covers the two major fields of quantum information processing, quantum communication and quantum computation, leading to achievement of a long-sought full security of continuous-variable quantum key distribution (QKD) and proposal of a resource-efficient method for optical quantum computing. Firstly, the book provides a security of continuous-variable QKD against arbitrary attacks under a realistic condition such as finite communication rounds and the use of digitized information processing.  The book also provides the unified view for conventionally used approximate Gottesman-Kitaev-Preskill (GKP) codes, which encodes qudits on a continuous-variable system, enabling direct comparison between researches based on different approximations.  The book finally proposes a resource-efficient method to realize the universal optical quantum computation using the GKP code via the direct preparation of the GKP magic state instead of GKP Pauli states. Feasibility of the proposed protocol is discussed based on the existing experimental proposals for the GKP state preparation.

Ring Resonator Systems to Perform Optical Communication Enhancement Using Soliton (Paperback, 2015 ed.): Iraj Sadegh Amiri,... Ring Resonator Systems to Perform Optical Communication Enhancement Using Soliton (Paperback, 2015 ed.)
Iraj Sadegh Amiri, Abdolkarim Afroozeh
R1,571 Discovery Miles 15 710 Ships in 18 - 22 working days

The title explain new technique of secured and high capacity optical communication signals generation by using the micro and nano ring resonators. The pulses are known as soliton pulses which are more secured due to having the properties of chaotic and dark soliton signals with ultra short bandwidth. They have high capacity due to the fact that ring resonators are able to generate pulses in the form of solitons in multiples and train form. These pulses generated by ring resonators are suitable in optical communication due to use the compact and integrated rings system, easy to control, flexibility, less loss, application in long distance communication and many other advantages. Using these pulses overcome the problems such as losses during the propagation, long distances, error detection, using many repeaters or amplifiers, undetectable received signals, pulse broadening, overlapping and so on. This book show how to generate soliton pulses using ring resonators in the micro and nano range which can be used in optical communication to improve the transmission technique and quality of received signals in networks such as WiFi and wireless communication.

Iris Image Recognition - Wavelet Filter-banks Based Iris Feature Extraction Schemes (Paperback, 2014): Amol D. Rahulkar,... Iris Image Recognition - Wavelet Filter-banks Based Iris Feature Extraction Schemes (Paperback, 2014)
Amol D. Rahulkar, Raghunath S. Holambe
R1,356 Discovery Miles 13 560 Ships in 18 - 22 working days

This book provides the new results in wavelet filter banks based feature extraction, and the classifier in the field of iris image recognition. It provides the broad treatment on the design of separable, non-separable wavelets filter banks, and the classifier. The design techniques presented in the book are applied on iris image analysis for person authentication. This book also brings together the three strands of research (wavelets, iris image analysis and classifier). It compares the performance of the presented techniques with state-of-the-art available schemes. This book contains the compilation of basic material on the design of wavelets that avoids reading many different books. Therefore, it provides an easier path for the new-comers, researchers to master the contents. In addition, the designed filter banks and classifier can also be effectively used than existing filter-banks in many signal processing applications like pattern classification, data-compression, watermarking, denoising etc. that will give the new directions of the research in the relevant field for the readers.

Terahertz and Mid Infrared Radiation: Detection of Explosives and CBRN (Using Terahertz) (Paperback, 2014): Mauro F. Pereira,... Terahertz and Mid Infrared Radiation: Detection of Explosives and CBRN (Using Terahertz) (Paperback, 2014)
Mauro F. Pereira, Oleksiy Shulika
R4,000 Discovery Miles 40 000 Ships in 18 - 22 working days

The reader will find here a timely update on new THz sources and detection schemes as well as concrete applications to the detection of Explosives and CBRN. Included is a method to identify hidden RDX-based explosives (pure and plastic ones) in the frequency domain study by Fourier Transformation, which has been complemented by the demonstration of improvement of the quality of the images captured commercially available THz passive cameras. The presented examples show large potential for the detection of small hidden objects at long distances (6-10 m). Complementing the results in the short-wavelength range, laser spectroscopy with a mid-infrared, room temperature, continuous wave, DFB laser diode and high performance DFB QCL have been demonstrated to offer excellent enabling sensor technologies for environmental monitoring, medical diagnostics, industrial and security applications. From the new source point of view a number of systems have been presented - From superconductors to semiconductors, e.g. Detection of Terahertz Waves from Superconducting Bi2Sr2CaCu2O8+ Intrinsic Josephson Junctions.The quest for a compact room temperature THz source and the recent advances in high power mid-IR QCLs lead to the development of a semiconductor THz source based on intracavity difference frequency generation. Furthermore, alternative electrically pumped THz sources based on the high emission efficiency predicted for polaritonic states in the ultra-strong coupling regime led to the demonstration of electroluminescent devices. Finally, antipolaritons in dispersive media were discussed and different aspects of the interaction of THz radiation with biomatter were presented."

Bluetooth Security Attacks - Comparative Analysis, Attacks, and Countermeasures (Paperback, 2013 ed.): Keijo Haataja,... Bluetooth Security Attacks - Comparative Analysis, Attacks, and Countermeasures (Paperback, 2013 ed.)
Keijo Haataja, Konstantin Hyppoenen, Sanna Pasanen, Pekka Toivanen
R1,861 Discovery Miles 18 610 Ships in 18 - 22 working days

Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions. The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices.

Security and Resilience in Cyber-Physical Systems - Detection, Estimation and Control (Hardcover, 1st ed. 2022): Masoud... Security and Resilience in Cyber-Physical Systems - Detection, Estimation and Control (Hardcover, 1st ed. 2022)
Masoud Abbaszadeh, Ali Zemouche
R4,651 R4,328 Discovery Miles 43 280 Save R323 (7%) Ships in 10 - 15 working days

This book discusses the latest advances in cyber-physical security and resilience of cyber-physical systems, including cyber-attack detection, isolation, situation awareness, resilient estimation and resilient control under attack. It presents both theoretical results and important applications of the methods. Security and Resilience in Cyber-Physical Systems begins by introducing the topic of cyber-physical security, covering state-of-the-art trends in both theory and applications, as well as some of the emerging methodologies and future directions for research. It then moves on to detail theoretical methods of attack detection, resilient estimation and control within cyber-physical systems, before discussing their various applications, such as power generation and distribution, autonomous systems, wireless communication networks and chemical plants. Focusing on the detection of and accommodation to cyber-attacks on cyber-physical systems, and including both estimation and artificial-intelligence-based methods, this book will be of interest to researchers, engineers and graduate students within the fields of cyber-physical security and resilient control.

The NICE Cyber Security Framework - Cyber Security Management (Paperback, 1st ed. 2020): Izzat Alsmadi, Chuck Easttom,... The NICE Cyber Security Framework - Cyber Security Management (Paperback, 1st ed. 2020)
Izzat Alsmadi, Chuck Easttom, Lo'ai Tawalbeh
R1,555 Discovery Miles 15 550 Ships in 10 - 15 working days

This textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and sbilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management.

Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity - Proceedings of the AHFE 2021 Virtual Conferences on... Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity - Proceedings of the AHFE 2021 Virtual Conferences on Human Factors in Robots, Drones and Unmanned Systems, and Human Factors in Cybersecurity, July 25-29, 2021, USA (Paperback, 1st ed. 2021)
Matteo Zallio, Carlos Raymundo Ibanez, Jesus Hechavarria Hernandez
R4,307 Discovery Miles 43 070 Ships in 10 - 15 working days

This book focuses on the importance of human factors in the development of safe and reliable robotic and unmanned systems. It discusses solutions for improving the perceptual and cognitive abilities of robots, developing suitable synthetic vision systems, coping with degraded reliability in unmanned systems, and predicting robotic behavior in relation to human activities. It covers the design of improved, easy to use, human-system interfaces, together with strategies for increasing human-system performance, and reducing cognitive workload at the user interface. It also discusses real-world applications and case studies of human-robot and human-agent collaboration in different business and educational endeavors. The second part of the book reports on research and developments in the field of human factors in cybersecurity.Contributions cover the technological, social, economic and behavioral aspects of the cyberspace, providing a comprehensive perspective to manage cybersecurity risks. Based on the two AHFE 2021 Conferences such as the AHFE 2021 Conference on Human Factors in Robots, Drones and Unmanned Systems, and the AHFE 2021 Conference on Human Factors in Cybersecurity, held virtually on 25-29 July, 2021, from USA, this book offers extensive information and highlights the importance of multidisciplinary approaches merging engineering, computer science, business and psychological knowledge. It is expected to foster discussion and collaborations between researchers and practitioners with different background, thus stimulating new solutions for the development of reliable and safe, human-centered, highly functional devices to perform automated and concurrent tasks, and to achieve an inclusive, holistic approach for enhancing cybersecurity.

Automotive Cyber Security - Introduction, Challenges, and Standardization (Paperback, 1st ed. 2020): Shiho Kim, Rakesh Shrestha Automotive Cyber Security - Introduction, Challenges, and Standardization (Paperback, 1st ed. 2020)
Shiho Kim, Rakesh Shrestha
R2,990 Discovery Miles 29 900 Ships in 10 - 15 working days

This book outlines the development of safety and cybersecurity, threats and activities in automotive vehicles. This book discusses the automotive vehicle applications and technological aspects considering its cybersecurity issues. Each chapter offers a suitable context for understanding the complexities of the connectivity and cybersecurity of intelligent and autonomous vehicles. A top-down strategy was adopted to introduce the vehicles' intelligent features and functionality. The area of vehicle-to-everything (V2X) communications aims to exploit the power of ubiquitous connectivity for the traffic safety and transport efficiency. The chapters discuss in detail about the different levels of autonomous vehicles, different types of cybersecurity issues, future trends and challenges in autonomous vehicles. Security must be thought as an important aspect during designing and implementation of the autonomous vehicles to prevent from numerous security threats and attacks. The book thus provides important information on the cybersecurity challenges faced by the autonomous vehicles and it seeks to address the mobility requirements of users, comfort, safety and security. This book aims to provide an outline of most aspects of cybersecurity in intelligent and autonomous vehicles. It is very helpful for automotive engineers, graduate students and technological administrators who want to know more about security technology as well as to readers with a security background and experience who want to know more about cybersecurity concerns in modern and future automotive applications and cybersecurity. In particular, this book helps people who need to make better decisions about automotive security and safety approaches. Moreover, it is beneficial to people who are involved in research and development in this exciting area. As seen from the table of contents, automotive security covers a wide variety of topics. In addition to being distributed through various technological fields, automotive cybersecurity is a recent and rapidly moving field, such that the selection of topics in this book is regarded as tentative solutions rather than a final word on what exactly constitutes automotive security. All of the authors have worked for many years in the area of embedded security and for a few years in the field of different aspects of automotive safety and security, both from a research and industry point of view.

Fighting Fire (Paperback): Benjamin Walker, Shan Raffel Fighting Fire (Paperback)
Benjamin Walker, Shan Raffel
R821 Discovery Miles 8 210 Ships in 9 - 17 working days

Reading Fire examines the selection of appropriate tactics for the stages of fire development and burning profiles and includes a detailed comparison of techniques, including Tactical Ventilation, Transitional Attack, Water Application and Nozzle Techniques. It also concludes with consideration of the STAR Model of Decision Making and an evaluation of Basic Incident Command Principles. It is simple and easy-to-use, making it an ideal companion for all frontline practitioners, to both improve firefighter safety and to support professional development.

Reading Fire - A Complete Scene Assessment Guide for Practitioners at All Levels (Paperback): Benjamin Walker, Shan Raffel Reading Fire - A Complete Scene Assessment Guide for Practitioners at All Levels (Paperback)
Benjamin Walker, Shan Raffel
R822 Discovery Miles 8 220 Ships in 9 - 17 working days

Completing a full scene assessment upon arrival at an incident can significantly lower the overall risks, as well allow for a more effective response. Reading Fire supports frontline practitioners in gathering information upon arrival at an incident, using the 'BE-SAHF' model of assessment. Using a step-by-step approach, it considers each critical area of the model, from building, construction and environmental factors, to understanding and reading smoke, airflow, heat and flames. It explores each of these areas in depth and considers the evidence that needs to be analysed in order to formulate an effective tactical plan.

Doing Security - Critical Reflections and an Agenda for Change (Paperback, 1st ed. 2008): M Button Doing Security - Critical Reflections and an Agenda for Change (Paperback, 1st ed. 2008)
M Button
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Despite the growing interest in security amongst governments, organizations and the general public, the provision of much security is substandard. This book explores the problems facing security, and sets out innovative proposals to enhance the effectiveness of security in society, at national and organizational levels.

Crime Prevention, Security and Community Safety Using the 5Is Framework (Paperback, 1st ed. 2011): P. Ekblom Crime Prevention, Security and Community Safety Using the 5Is Framework (Paperback, 1st ed. 2011)
P. Ekblom
R2,667 Discovery Miles 26 670 Ships in 18 - 22 working days

The potential of crime prevention, security and community safety is constrained by implementation failure. This book presents a carefully-designed system of good practice, the 5Is, which handles the complexities of real world prevention, this aims to improve the performance of prevention, and advance process evaluation.

Nuclear Security - The Nexus Among Science, Technology and Policy (Hardcover, 1st ed. 2021): Michael Nacht, Michael Frank,... Nuclear Security - The Nexus Among Science, Technology and Policy (Hardcover, 1st ed. 2021)
Michael Nacht, Michael Frank, Stanley Prussin
R2,233 Discovery Miles 22 330 Ships in 10 - 15 working days

This textbook is the first comprehensive and systematic account of the science, technology and policy issues associated with nuclear energy and nuclear weapons. Throughout their account of the evolution of nuclear policy, from its origin to the early Trump presidency, the authors interweave clear technical expositions of the science and technology that underpin and constrain it. The book begins by tracing the early work in atomic physics, the discovery of fission, and the developments that led to the Manhattan Project and the delivery of atomic bombs against Japan that ended World War II. It follows the initial failed attempts at nuclear disarmament, the onset of the Cold War nuclear arms competition, and the development of light water reactors to harness nuclear energy for electric power generation. The authors thoroughly unpack the problem of nuclear proliferation, examining the strategy and incentives for states that have and have not pursued nuclear weapons, and providing an overview of the nuclear arsenals of the current nuclear weapon states. They trace the technical, political and strategic evolution of deterrence, arms control and disarmament policies from the first attempts for an Outer Space Treaty in 1957 through the new START treaty of 2009. At critical junctures in the narrative, the authors explain the relevant nuclear science and technology including nuclear fission and criticality; nuclear materials and enrichment; nuclear detonation and nuclear weapons effects; nuclear weapons stockpile constraints, stewardship and surveillance; nuclear fusion and thermonuclear weapons; technologies for monitoring, verification and proliferation; and nuclear forensics. They conclude with an assessment of contemporary issues ranging from the Joint Comprehensive Plan of Action reached to halt Iran's nuclear weapons development program, to the threat of nuclear terrorism, the perceived nuclear weapons policies of Russia and China, and the US efforts to provide disincentives for its allies to acquire their own nuclear weapons by maintaining credible security guarantees.

Rockets and Ray Guns: The Sci-Fi Science of the Cold War (Paperback, 1st ed. 2018): Andrew May Rockets and Ray Guns: The Sci-Fi Science of the Cold War (Paperback, 1st ed. 2018)
Andrew May
R1,180 R1,119 Discovery Miles 11 190 Save R61 (5%) Ships in 18 - 22 working days

The Cold War saw scientists in East and West racing to create amazing new technologies, the like of which the world had never seen. Yet not everyone was taken by surprise. From super-powerful atomic weapons to rockets and space travel, readers of science fiction (SF) had seen it all before. Sometimes reality lived up to the SF vision, at other times it didn't. The hydrogen bomb was as terrifyingly destructive as anything in fiction, while real-world lasers didn't come close to the promise of the classic SF ray gun. Nevertheless, when the scientific Cold War culminated in the Strategic Defence Initiative of the 1980s, it was so science-fictional in its aspirations that the media dubbed it "Star Wars". This entertaining account, offering a plethora of little known facts and insights from previously classified military projects, shows how the real-world science of the Cold War followed in the footsteps of SF - and how the two together changed our perception of both science and scientists, and paved the way to the world we live in today.

Cyber Security: Analytics, Technology and Automation (Hardcover, 2015 ed.): Martti Lehto, Pekka Neittaanmaki Cyber Security: Analytics, Technology and Automation (Hardcover, 2015 ed.)
Martti Lehto, Pekka Neittaanmaki
R3,503 Discovery Miles 35 030 Ships in 10 - 15 working days

The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

Key Control Log - Keep Record, For Keys, Office, Business, Work Or Home, Book, Logbook, Journal (Paperback): Amy Newton Key Control Log - Keep Record, For Keys, Office, Business, Work Or Home, Book, Logbook, Journal (Paperback)
Amy Newton
R530 Discovery Miles 5 300 Ships in 18 - 22 working days
Computer Security and the Internet - Tools and Jewels from Malware to Bitcoin (Hardcover, 2nd ed. 2021): Paul C.Van Oorschot Computer Security and the Internet - Tools and Jewels from Malware to Bitcoin (Hardcover, 2nd ed. 2021)
Paul C.Van Oorschot
R1,701 R1,612 Discovery Miles 16 120 Save R89 (5%) Ships in 9 - 17 working days

This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a solid footing in security - including software developers and computing professionals, technical managers and government staff. An overriding focus is on brevity, without sacrificing breadth of core topics or technical detail within them. The aim is to enable a broad understanding in roughly 350 pages. Further prioritization is supported by designating as optional selected content within this. Fundamental academic concepts are reinforced by specifics and examples, and related to applied problems and real-world incidents. The first chapter provides a gentle overview and 20 design principles for security. The ten chapters that follow provide a framework for understanding computer and Internet security. They regularly refer back to the principles, with supporting examples. These principles are the conceptual counterparts of security-related error patterns that have been recurring in software and system designs for over 50 years. The book is "elementary" in that it assumes no background in security, but unlike "soft" high-level texts it does not avoid low-level details, instead it selectively dives into fine points for exemplary topics to concretely illustrate concepts and principles. The book is rigorous in the sense of being technically sound, but avoids both mathematical proofs and lengthy source-code examples that typically make books inaccessible to general audiences. Knowledge of elementary operating system and networking concepts is helpful, but review sections summarize the essential background. For graduate students, inline exercises and supplemental references provided in per-chapter endnotes provide a bridge to further topics and a springboard to the research literature; for those in industry and government, pointers are provided to helpful surveys and relevant standards, e.g., documents from the Internet Engineering Task Force (IETF), and the U.S. National Institute of Standards and Technology.

Blast Mitigation - Experimental and Numerical Studies (Paperback, Softcover reprint of the original 1st ed. 2014): Arun Shukla,... Blast Mitigation - Experimental and Numerical Studies (Paperback, Softcover reprint of the original 1st ed. 2014)
Arun Shukla, Yapa D.S. Rajapakse, Mary Ellen Hynes
R4,947 Discovery Miles 49 470 Ships in 18 - 22 working days

Blast Mitigation: Experimental and Numerical Studies covers both experimental and numerical aspects of material and structural response to dynamic blast loads and its mitigation. The authors present the most up-to-date understanding from laboratory studies and computational analysis for researchers working in the field of blast loadings and their effect on material and structural failure, develop designs for lighter and highly efficient structural members for blast energy absorption, discuss vulnerability of underground structures, present methods for dampening blast overpressures, discuss structural post blast collapse and give attention to underwater explosion and implosion effects on submerged infrastructure and mitigation measures for this environment.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mitchell's Graded Questions on Income…
L. Mitchell Paperback R1,224 R1,126 Discovery Miles 11 260
Introduction To Financial Accounting
Dempsey, A. Paperback  (1)
R1,436 R1,269 Discovery Miles 12 690
Christo Wiese - Risiko en Rykdom
T J Strydom Paperback R350 R312 Discovery Miles 3 120
GAAP: Graded Questions - Questions on…
Dave Kolitz, Cathrynne Service Paperback R1,299 Discovery Miles 12 990
U-Part Autoshop Tie Down Set Cambuckle 2…
R190 Discovery Miles 1 900
Freezing Order - A True Story Of Russian…
Bill Browder Paperback  (4)
R343 Discovery Miles 3 430
Masterplug IP66 Heavy Duty Outdoor…
R222 Discovery Miles 2 220
Graded Questions On Income Tax In South…
Kevin Mitchell, Lindsay Mitchell Paperback R1,121 Discovery Miles 11 210
Masterplug IP66 Single Press Retractive…
R281 Discovery Miles 2 810
U-Part Autoshop Negative Terminal
R41 Discovery Miles 410

 

Partners