0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (2)
  • R500+ (313)
  • -
Status
Format
Author / Contributor
Publisher

Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems

Palmprint Authentication (Hardcover, 2004 ed.): 8#, Xingyi Road,Chang Ning District 16/F, Maxdo Center Palmprint Authentication (Hardcover, 2004 ed.)
8#, Xingyi Road,Chang Ning District 16/F, Maxdo Center
R2,895 Discovery Miles 28 950 Ships in 10 - 15 working days

Palmprint Authentication is the first book to provide a comprehensive introduction to palmprint technologies. It reveals automatic biometric techniques for personal identification using palmprint, from the approach based on offline palmprint images, to the current state-of-the-art algorithm using online palmprint images.

Palmprint Authentication provides the reader with a basic concept of Palmprint Authentication. It also includes an in-depth discussion of Palmprint Authentication technologies, a detailed description of Palmprint Authentication systems, and an up-to-date coverage of how these issues are developed. This book is suitable for different levels of readers: those who want to learn more about palmprint technology, and those who wish to understand, participate, and/or develop a palmprint authentication system.

Palmprint Authentication is effectively a handbook for biometric research and development. Graduate students and researchers in computer science, electrical engineering, systems science, and information technology will all find it uniquely useful, not only as a reference book, but also as a text book. Researchers and practitioners in industry, and R&D laboratories working in the fields of security system design, biometrics, immigration, law enforcement, control, and pattern recognition will also benefit from this volume.

Digital Forensic Investigation of Internet of Things (IoT) Devices (Hardcover, 1st ed. 2021): Reza Montasari, Hamid Jahankhani,... Digital Forensic Investigation of Internet of Things (IoT) Devices (Hardcover, 1st ed. 2021)
Reza Montasari, Hamid Jahankhani, Richard Hill, Simon Parkinson
R4,245 Discovery Miles 42 450 Ships in 12 - 19 working days

This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text for PhD and Master degree programmes in Digital Forensics and Cyber Security. Each chapter of this book is written by an internationally-renowned expert who has extensive experience in law enforcement, industry and academia. The increasing popularity in the use of IoT devices for criminal activities means that there is a maturing discipline and industry around IoT forensics. As technology becomes cheaper and easier to deploy in an increased number of discrete, everyday objects, scope for the automated creation of personalised digital footprints becomes greater. Devices which are presently included within the Internet of Things (IoT) umbrella have a massive potential to enable and shape the way that humans interact and achieve objectives. These also forge a trail of data that can be used to triangulate and identify individuals and their actions. As such, interest and developments in autonomous vehicles, unmanned drones and 'smart' home appliances are creating unprecedented opportunities for the research communities to investigate the production and evaluation of evidence through the discipline of digital forensics.

Multisensor Surveillance Systems - The Fusion Perspective (Hardcover, 2003 ed.): Gian Luca Foresti, Carlo S. Regazzoni, Pramod... Multisensor Surveillance Systems - The Fusion Perspective (Hardcover, 2003 ed.)
Gian Luca Foresti, Carlo S. Regazzoni, Pramod K. Varshney
R4,387 Discovery Miles 43 870 Ships in 10 - 15 working days

Monitoring of public and private sites is increasingly becoming a very important and critical issue, especially after the recent flurry of terrorist attacks including the one on the Word Trade Center in September 2001. It is, therefore, imperative that effective multisensor surveillance systems be developed to protect the society from similar attacks in the future. The new generation of surveillance systems to be developed have a specific requirement: they must be able to automatically identify criminal and terrorist activity without sacrificing individual privacy to the extent possible. Privacy laws concerning monitoring and surveillance systems vary from country to country but, in general, they try to protect the privacy of their citizens. Monitoring and visual surveillance has numerous other applications. It can be employed to help invalids or handicapped and to monitor the activities of elderly people. It can be used to monitor large events such as sporting events, as well. Nowadays, monitoring is employ d in several different contexts including transport applications, such as monitoring of railway stations and airports, dangerous environments like nuclear facilities or traffic flows on roads and bridges. The latest generation of surveillance systems mainly rely on hybrid analog-digital, or completely digital video communications and processing methods and take advantage of the greater of flexibility offered by video processing algorithms that are capable focusing a human operator's attention on a set of interesting situations.

Biometric-Based Physical and Cybersecurity Systems (Hardcover, 1st ed. 2019): Mohammad S. Obaidat, Issa Traore, Isaac Woungang Biometric-Based Physical and Cybersecurity Systems (Hardcover, 1st ed. 2019)
Mohammad S. Obaidat, Issa Traore, Isaac Woungang
R4,469 Discovery Miles 44 690 Ships in 10 - 15 working days

This book presents the latest developments in biometrics technologies and reports on new approaches, methods, findings, and technologies developed or being developed by the research community and the industry. The book focuses on introducing fundamental principles and concepts of key enabling technologies for biometric systems applied for both physical and cyber security. The authors disseminate recent research and developing efforts in this area, investigate related trends and challenges, and present case studies and examples such as fingerprint, face, iris, retina, keystroke dynamics, and voice applications . The authors also investigate the advances and future outcomes in research and development in biometric security systems. The book is applicable to students, instructors, researchers, industry practitioners, and related government agencies staff. Each chapter is accompanied by a set of PowerPoint slides for use by instructors.

Quantum Technologies and Military Strategy (Hardcover, 1st ed. 2021): Ajey Lele Quantum Technologies and Military Strategy (Hardcover, 1st ed. 2021)
Ajey Lele
R3,120 Discovery Miles 31 200 Ships in 10 - 15 working days

This book is about the strategic relevance of quantum technologies. It debates the military-specific aspects of this technology. Various chapters of this book cohere around two specific themes. The first theme discusses the global pattern of ongoing civilian and military research on quantum computers, quantum cryptography, quantum communications and quantum internet. The second theme explicitly identifies the relevance of these technologies in the military domain and the possible nature of quantum technology-based weapons. This thread further debates on quantum (arms) race at a global level in general, and in the context of the USA and China, in particular. The book argues that the defence utility of these technologies is increasingly becoming obvious and is likely to change the nature of warfare in the future.

Mobile Phone Security and Forensics - A Practical Approach (Hardcover, 2nd ed. 2016): Iosif I. Androulidakis Mobile Phone Security and Forensics - A Practical Approach (Hardcover, 2nd ed. 2016)
Iosif I. Androulidakis
R3,746 R2,563 Discovery Miles 25 630 Save R1,183 (32%) Ships in 12 - 19 working days

This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used "against" users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. The information on denial of service attacks has been thoroughly updated for the new edition. Also, a major addition to this edition is a section discussing software defined radio and open source tools for mobile phones.

Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014): Graeme Proudler, Liqun Chen, Chris Dalton Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014)
Graeme Proudler, Liqun Chen, Chris Dalton
R5,157 Discovery Miles 51 570 Ships in 12 - 19 working days

In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

Cross-Cultural Dialogue as a Conflict Management Strategy (Hardcover, 1st ed. 2018): J. Martin Ramirez, Gracia Abad-Quintanal Cross-Cultural Dialogue as a Conflict Management Strategy (Hardcover, 1st ed. 2018)
J. Martin Ramirez, Gracia Abad-Quintanal
R3,341 Discovery Miles 33 410 Ships in 10 - 15 working days

This book contributes to the current knowledge and research on conflict and cross-cultural dialogue, emphasizing how respect, tolerance and dialogue may be quite effective tools for bridging the diverse cultures and, consequently, for solving many of the conflicts of today's world, characterized by a dynamic interchange of populations with very diverse cultural and ethnic backgrounds. For this purpose, we rely on reputed scholars from ten different countries, and from different cultures and fields of expertise, which allows for diverse contributions from a valuable interdisciplinary perspective. The first section of the book deals with the correlation between cultural differences and conflict, while also showing how such conflicts can be prevented and, should they arise, managed and solved. The second section addresses a different, more specific issue: how cultural expression means and tools for cultural communication may lead to conflict whereas they may help to avoid it as well. Finally, the third section analyzes how legal and justice systems deal with cross-cultural conflicts as well as with situations which may lead to cross-cultural conflicts, thus assessing to which extent such systems contribute to avoid and/or solve such kind of conflicts.

Surveillance in Action - Technologies for Civilian, Military and Cyber Surveillance (Hardcover, 1st ed. 2018): Panagiotis... Surveillance in Action - Technologies for Civilian, Military and Cyber Surveillance (Hardcover, 1st ed. 2018)
Panagiotis Karampelas, Thirimachos Bourlai
R5,476 Discovery Miles 54 760 Ships in 12 - 19 working days

This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including gait recognition, face-based physiology-assisted recognition, face recognition in the visible and infrared bands, and cross-spectral iris recognition. The second part of the book, Surveillance for Security and Defense, discusses the ethical issues raised by the use of surveillance systems in the name of combatting terrorism and ensuring security. It presents different generations of satellite surveillance systems and discusses the requirements for real-time satellite surveillance in military contexts. In addition, it explores the new standards of surveillance using unmanned air vehicles and drones, proposes surveillance techniques for detecting stealth aircrafts and drones, and highlights key techniques for maritime border surveillance, bio-warfare and bio-terrorism detection. The last part of the book, Cyber Surveillance, provides a review of data hiding techniques that are used to hinder electronic surveillance. It subsequently presents methods for collecting and analyzing information from social media sites and discusses techniques for detecting internal and external threats posed by various individuals (such as spammers, cyber-criminals, suspicious users or extremists in general). The book concludes by examining how high-performance computing environments can be exploited by malicious users, and what surveillance methods need to be put in place to protect these valuable infrastructures. The book is primarily intended for military and law enforcement personnel who use surveillance-related technologies, as well as researchers, Master's and Ph.D. students who are interested in learning about the latest advances in military, civilian and cyber surveillance.

Advanced Video-Based Surveillance Systems (Hardcover, 1999 ed.): Carlo S. Regazzoni, Gianni Fabri, Gianni Vernazza Advanced Video-Based Surveillance Systems (Hardcover, 1999 ed.)
Carlo S. Regazzoni, Gianni Fabri, Gianni Vernazza
R3,014 Discovery Miles 30 140 Ships in 10 - 15 working days

Advanced Video-Based Surveillance Systems presents second generation surveillance systems that automatically process large sets of signals for performance monitoring tasks. Included is coverage of different architecture designs, customization of surveillance architecture for end-users, advances in the processing of imaging sequences, security systems, sensors, and remote monitoring projects. Examples are provided of surveillance applications in highway traffic control, subway stations, wireless communications, and other areas. This work will be of interest to researchers in image processing, computer vision, digital signal processing, and telecommunications.

Safety of Sodium-Cooled Fast Reactors - Particle-Bed-Related Phenomena in Severe Accidents (Hardcover, 1st ed. 2021): Songbai... Safety of Sodium-Cooled Fast Reactors - Particle-Bed-Related Phenomena in Severe Accidents (Hardcover, 1st ed. 2021)
Songbai Cheng, Ruicong Xu
R4,385 Discovery Miles 43 850 Ships in 10 - 15 working days

This book highlights the advances and trends in the safety analysis of sodium-cooled fast reactors, especially from the perspective of particle bed-related phenomena during core disruptive accidents. A sodium-cooled fast reactor (SFR) is an optimized candidate of the next-generation nuclear reactor systems. Its safety is a critical issue during its R&D process. The book elaborates on research progresses in particle bed-related phenomena in terms of the molten-pool mobility, the molten-pool sloshing motion, the debris bed formation behavior, and the debris bed self-leveling behavior. The book serves as a good reference for researchers, professionals, and postgraduate students interested in sodium-cooled fast reactors. Knowledge provided is also useful for those who are engaging in severe accident analysis for lead-cooled fast reactors and light water reactors.

Applied Video Processing in Surveillance and Monitoring Systems (Hardcover): Nilanjan Dey, Amira Ashour, Suvojit Acharjee Applied Video Processing in Surveillance and Monitoring Systems (Hardcover)
Nilanjan Dey, Amira Ashour, Suvojit Acharjee
R5,877 Discovery Miles 58 770 Ships in 10 - 15 working days

Video monitoring has become a vital aspect within the global society as it helps prevent crime, promote safety, and track daily activities such as traffic. As technology in the area continues to improve, it is necessary to evaluate how video is being processed to improve the quality of images. Applied Video Processing in Surveillance and Monitoring Systems investigates emergent techniques in video and image processing by evaluating such topics as segmentation, noise elimination, encryption, and classification. Featuring real-time applications, empirical research, and vital frameworks within the field, this publication is a critical reference source for researchers, professionals, engineers, academicians, advanced-level students, and technology developers.

Electrician's Guide to Fire Detection and Fire Alarm Systems (Spiral bound, 3rd edition): The Institution of Engineering... Electrician's Guide to Fire Detection and Fire Alarm Systems (Spiral bound, 3rd edition)
The Institution of Engineering and Technology
R1,054 Discovery Miles 10 540 Ships in 9 - 17 working days

The Electrician's Guide to Fire Detection and Fire Alarm Systems, 3rd Edition is ideal for individuals involved in the design and installation of fire detection systems as part of electrical installations. It offers information, advice, and guidance on managing BS 7671 and BS 5839 requirements. This Guide is an essential publication for all fire alarm designers, installers, specifiers, electricians, electrical contractors, installation designers and students in further education and/or professional training. Key Features include: Ideal for individuals involved in the design and installation of fire detection systems as part of electrical installations Includes essential advice on special fire risk, systems design and integration, and installation competency Provides information, advice and guidance on managing BS 7671:2018 and BS 5839 requirements Updated to accommodate the changes, revisions and new information made to IET's 18th Edition, BS 7671:2018 regulations Updated to include changes, revision and new information added to the BS 5839-1 and BS 5839-6 requirements An essential publication for all fire alarm designers, installers, specifiers, electricians, electrical contractors, installation designers and students in further education and/or professional training

Unconventional Conflict - A Modeling Perspective (Hardcover, 1st ed. 2017): Dean S. Hartley III Unconventional Conflict - A Modeling Perspective (Hardcover, 1st ed. 2017)
Dean S. Hartley III
R3,883 Discovery Miles 38 830 Ships in 12 - 19 working days

This book describes issues in modeling unconventional conflict and suggests a new way to do the modeling. It presents an ontology that describes the unconventional conflict domain, which allows for greater ease in modeling unconventional conflict. Supporting holistic modeling, which means that we can see the entire picture of what needs to be modeled, the ontology allows us to make informed decisions about what to model and what to omit. The unconventional conflict ontology also separates the things we understand best from the things we understand least. This separation means that we can perform verification, validation and accreditation (VV&A) more efficiently and can describe the competence of the model more accurately. However, before this message can be presented in its entirety the supporting body of knowledge has to be explored. For this reason, the book offers chapters that focus on the description of unconventional conflict and the analyses that have been performed, modeling, with a concentration on past efforts at modeling unconventional conflict, the precursors to the ontology, and VV&A. Unconventional conflict is a complex, messy thing. It normally involves multiple actors, with their own conflicting agendas and differing concepts of legitimate actions. This book will present a useful introduction for researchers and professionals within the field.

Information Security of Intelligent Vehicles Communication - Overview, Perspectives, Challenges,  and Possible Solutions... Information Security of Intelligent Vehicles Communication - Overview, Perspectives, Challenges, and Possible Solutions (Hardcover, 1st ed. 2021)
Madhusudan Singh
R3,634 Discovery Miles 36 340 Ships in 10 - 15 working days

This book highlights cyber-security overview, perspectives, and challenges that affect advanced Vehicular technology. It considers vehicular security issues and possible solutions, with the aim of providing secure vehicle-to-vehicle, vehicle-to-infrastructure and inside-of-vehicle communication. This book introduces vehicle cryptography mechanism including encryption and decryption approaches and cryptography algorithms such as symmetric and asymmetric cryptography, Hash functions and Digital Signature certificates for modern vehicles. It discusses cybersecurity structure and provides specific security challenges and possible solutions in Vehicular Communication such as vehicle to vehicle communication, vehicle to Infrastructure and in-vehicle communciation. It also presents key insights from security with regards to vehicles collaborative information technology. The more our vehicles become intelligent, the more we need to work on safety and security for vehicle technology. This book is of interest to automotive engineers and technical managers who want to learn about security technologies, and for those with a security background who want to learn about basic security issues in modern automotive applications.

Redesigning Wiretapping - The Digitization of Communications Interception (Hardcover, 1st ed. 2020): Joseph Fitsanakis Redesigning Wiretapping - The Digitization of Communications Interception (Hardcover, 1st ed. 2020)
Joseph Fitsanakis
R4,235 Discovery Miles 42 350 Ships in 12 - 19 working days

This book tells the story of government-sponsored wiretapping in Britain and the United States from the rise of telephony in the 1870s until the terrorist attacks of 9/11. It pays particular attention to the 1990s, which marked one of the most dramatic turns in the history of telecommunications interception. During that time, fiber optic and satellite networks rapidly replaced the copper-based analogue telephone system that had remained virtually unchanged since the 1870s. That remarkable technological advance facilitated the rise of the networked home computer, cellular telephony, and the Internet, and users hailed the dawn of the digital information age. However, security agencies such as the FBI and MI5 were concerned. Since the emergence of telegraphy in the 1830s, security services could intercept private messages using wiretaps, and this was facilitated by some of the world's largest telecommunications monopolies such as AT&T in the US and British Telecom in the UK. The new, digital networks were incompatible with traditional wiretap technology. To make things more complicated for the security services, these monopolies had been privatized and broken up into smaller companies during the 1980s, and in the new deregulated landscape the agencies had to seek assistance from thousands of startup companies that were often unwilling to help. So for the first time in history, technological and institutional changes posed a threat to the security services' wiretapping activities, and government officials in Washington and London acted quickly to protect their ability to spy, they sought to force the industry to change the very architecture of the digital telecommunications network. This book describes in detail the tense negotiations between governments, the telecommunications industry, and civil liberties groups during an unprecedented moment in history when the above security agencies were unable to wiretap. It reveals for the first time the thoughts of some of the protagonists in these crucial negotiations, and explains why their outcome may have forever altered the trajectory of our information society.

Risk Management Methods in the Aviation Enterprise (Hardcover, 1st ed. 2021): Valery Dmitryevich Sharov, Vadim Vadimovich... Risk Management Methods in the Aviation Enterprise (Hardcover, 1st ed. 2021)
Valery Dmitryevich Sharov, Vadim Vadimovich Vorobyov, Dmitry Alexandrovich Zatuchny
R4,237 Discovery Miles 42 370 Ships in 12 - 19 working days

This book provides a comprehensive content for professionals engaged in the development of flight safety regulatory framework, as well as in the design and operation of ground-based or on-board flight support radio electronic systems. It presents mathematical tools and methods of probabilistic theory, mathematical statistics and graph theory, along with some provisions of decision-making theory and multi-criteria analysis. This book helps as a good guide for those involved in aviation risk assessment and air traffic management.

Battlefield Acoustics (Hardcover, 2015 ed.): Thyagaraju Damarla Battlefield Acoustics (Hardcover, 2015 ed.)
Thyagaraju Damarla
R4,277 Discovery Miles 42 770 Ships in 12 - 19 working days

This book presents all aspects of situational awareness using acoustic signals. It starts by presenting the science behind understanding and interpretation of sound signals. The book then goes on to provide various signal processing techniques used in acoustics to find the direction of sound source, localize gunfire, track vehicles and detect people. The necessary mathematical background and various classification and fusion techniques are presented. The book contains majority of the things one would need to process acoustic signals for all aspects of situational awareness in one location. The book also presents array theory, which is pivotal in finding the direction of arrival of acoustic signals. In addition, the book presents techniques to fuse the information from multiple homogeneous/heterogeneous sensors for better detection. MATLAB code is provided for majority of the real application, which is a valuable resource in not only understanding the theory but readers can also use the code as a spring-board to develop their own application based software code.

Principles of Integrated Maritime Surveillance Systems (Hardcover, 1998 ed.): A. Nejat Ince, Ercan Topuz, Erdal Panayirci,... Principles of Integrated Maritime Surveillance Systems (Hardcover, 1998 ed.)
A. Nejat Ince, Ercan Topuz, Erdal Panayirci, Cevdet Isik
R8,577 Discovery Miles 85 770 Ships in 10 - 15 working days

Information is always required by organizations of coastal states about the movements, identities and intentions of vessels sailing in the waters of interest to them, which may be coastal waters, straits, inland waterways, rivers, lakes or open seas. This interest may stem from defense requirements or from needs for the protection of off-shore resources, enhanced search and rescue services, deterrence of smuggling, drug trafficking and other illegal activities and/or for providing vessel traffic services for safe and efficient navigation and protection of the environment. To meet these needs it is necessary to have a well designed maritime surveillance and control system capable of tracking ships and providing other types of information required by a variety of user groups ranging from port authorities, shipping companies, marine exchanges to governments and the military. Principles of Integrated Maritime Surveillance Systems will be of vital interest to anyone responsible for the design, implementation or provision of a well designed maritime surveillance and control system capable of tracking ships and providing navigational and other types of information required for safe navigation and efficient commercial operation. Principles of Integrated Maritime Surveillance Systems is therefore essential to a variety of user groups ranging from port authorities to shipping companies and marine exchanges as well as civil governments and the military.

Advances in Global Leadership (Hardcover, New): William Mobley, Ellie Weldon Advances in Global Leadership (Hardcover, New)
William Mobley, Ellie Weldon
R3,566 Discovery Miles 35 660 Ships in 12 - 19 working days

The seven chapters in Part 1, of this volume, focus on the foundations of global leadership. Together, these chapters explore a broad selection of the social and psychological processes underlying effective global leadership. These authors expand ideas currently in use, and they introduce new ideas for our consideration. The seven papers in Part 2 focus on the practice of global leadership. Compared to those in Part 1, these chapters focus more on practical solutions to the problems that leaders face than the analysis of fundamental processes, although this distinction is one of degree. All the authors in Part 1 explore the practical implications of their ideas, and those in Part 2 contribute to the development of fundamental concepts. It provides analysis on the foundation of global leadership principles. It discusses practical solutions to the problems faced by today's global leaders. It offers an international representation.

Theoretical Foundations of Radar Location and Radio Navigation (Hardcover, 1st ed. 2021): Denis Alexandrovich Akmaykin, Eduard... Theoretical Foundations of Radar Location and Radio Navigation (Hardcover, 1st ed. 2021)
Denis Alexandrovich Akmaykin, Eduard Anatolyevich Bolelov, Anatoliy Ivanovich Kozlov, Boris Valentinovich Lezhankin, Alexander Evgenievich Svistunov, …
R3,908 Discovery Miles 39 080 Ships in 12 - 19 working days

The book represents a study guide reciting theoretical basics of radar location and radio navigation systems of air and sea transport. This is the distinctive feature of this study guide. The study guide states the principal physics of radar location and radio navigation, main measuring methods of proper and relative movement parameters of an object, tactical and technical characteristics of radar location and radio navigation systems, including examining issues on radiofrequency signals detection and its parameters estimation against background and interference of different type, filtering, combined detection and rating of signals, signals resolution and classification. The structural and functioning principles of the current and advanced radar location and radio navigation systems of air and sea transport are represented in the study guide with an adequate completeness. The study guide features the result of years long lecturing on radar location and radio navigation theoretical courses at the Moscow State Technical University of Civil Aviation and G.I.Nevelskiy Maritime State Technical Academy. The study guide is designated for students of radio-engineering specialties in area of air and sea transport. The study guide can be useful for radio engineers working in the field of air and maritime transport, and for graduate students and academic researchers as well.

Surveillance and Reconnaissance Systems - Modeling and Performance Prediction (Hardcover): Jon C. Leachtenauer, Ronald G.... Surveillance and Reconnaissance Systems - Modeling and Performance Prediction (Hardcover)
Jon C. Leachtenauer, Ronald G. Driggers
R4,852 Discovery Miles 48 520 Ships in 10 - 15 working days

An up-to-date, comprehensive review of surveillance and reconnaissance (S&R) imaging system modelling and performance prediction. This resource helps the reader predict the information potential of new surveillance system designs, compare and select from alternative measures of information extraction, relate the performance of tactical acquisition sensors and surveillance sensors, and understand the relative importance of each element of the image chain on S&R system performance. It provides system descriptions and characteristics, S&R modelling history, and performance modelling details. With an emphasis on validated prediction of human observer performance, this book addresses the specific design and analysis techniques used with today's S&R imaging systems. It offers in-depth discussions on everything from the conceptual performance prediction model, linear shift invariant systems, and measurement variables used for S&R information extraction to predictor variables, target and environmental considerations, CRT and flat panel display selection, and models for image processing. Conversion methods between alternative modelling approaches are examined to help the reader perform system comparisons.

Security by Design - Innovative Perspectives on Complex Problems (Hardcover, 1st ed. 2018): Anthony J. Masys Security by Design - Innovative Perspectives on Complex Problems (Hardcover, 1st ed. 2018)
Anthony J. Masys
R3,428 Discovery Miles 34 280 Ships in 10 - 15 working days

This edited book captures salient global security challenges and presents 'design' solutions in dealing with wicked problems. Through case studies and applied research this book reveals the many perspectives, tools and approaches to support security design. Security design thereby can support risk and threat analysis, risk communication, problem framing and development of interventions strategies. From the refugee crisis to economic slowdowns in emerging markets, from ever-rising numbers of terrorist and cyberattacks to global water shortages, to the proliferation of the Internet of Things and its impact on the security of our homes, cities and critical infrastructure, the current security landscape is diverse and complex. These global risks have been in the headlines in the last year (Global Risks Report) and pose significant security challenges both nationally and globally. In fact, national security is no longer just national. Non-state actors, cyber NGO, rising powers, and hybrid wars and crimes in strategic areas pose complex challenges to global security. In the words of Horst Rittel (1968):"Design is an activity, which aims at the production of a plan, which plan -if implemented- is intended to bring about a situation with specific desired characteristics without creating unforeseen and undesired side and after effects."

Resilience and Risk - Methods and Application in Environment, Cyber and Social Domains (Hardcover, 1st ed. 2017): Igor Linkov,... Resilience and Risk - Methods and Application in Environment, Cyber and Social Domains (Hardcover, 1st ed. 2017)
Igor Linkov, Jose Manuel Palma-Oliveira
R6,432 Discovery Miles 64 320 Ships in 10 - 15 working days

This volume addresses the challenges associated with methodology and application of risk and resilience science and practice to address emerging threats in environmental, cyber, infrastructure and other domains. The book utilizes the collective expertise of scholars and experts in industry, government and academia in the new and emerging field of resilience in order to provide a more comprehensive and universal understanding of how resilience methodology can be applied in various disciplines and applications. This book advocates for a systems-driven view of resilience in applications ranging from cyber security to ecology to social action, and addresses resilience-based management in infrastructure, cyber, social domains and methodology and tools. Risk and Resilience has been written to open up a transparent dialog on resilience management for scientists and practitioners in all relevant academic disciplines and can be used as supplement in teaching risk assessment and management courses.

On the Physical Security of Physically Unclonable Functions (Hardcover, 1st ed. 2019): Shahin Tajik On the Physical Security of Physically Unclonable Functions (Hardcover, 1st ed. 2019)
Shahin Tajik
R2,848 Discovery Miles 28 480 Ships in 10 - 15 working days

This book investigates the susceptibility of intrinsic physically unclonable function (PUF) implementations on reconfigurable hardware to optical semi-invasive attacks from the chip backside. It explores different classes of optical attacks, particularly photonic emission analysis, laser fault injection, and optical contactless probing. By applying these techniques, the book demonstrates that the secrets generated by a PUF can be predicted, manipulated or directly probed without affecting the behavior of the PUF. It subsequently discusses the cost and feasibility of launching such attacks against the very latest hardware technologies in a real scenario. The author discusses why PUFs are not tamper-evident in their current configuration, and therefore, PUFs alone cannot raise the security level of key storage. The author then reviews the potential and already implemented countermeasures, which can remedy PUFs' security-related shortcomings and make them resistant to optical side-channel and optical fault attacks. Lastly, by making selected modifications to the functionality of an existing PUF architecture, the book presents a prototype tamper-evident sensor for detecting optical contactless probing attempts.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Neuroscience and the Problem of Dual Use…
Malcolm R. Dando Hardcover R5,100 Discovery Miles 51 000
Applied Biosecurity: Global Health…
Ryan N. Burnette Hardcover R1,718 R1,282 Discovery Miles 12 820
The Great Power Competition Volume 1…
Adib Farhadi, Anthony J. Masys Hardcover R3,919 Discovery Miles 39 190
An Introduction to Nuclear Fission
Walid Younes, Walter D. Loveland Hardcover R2,519 Discovery Miles 25 190
Automotive Cyber Security…
Shiho Kim, Rakesh Shrestha Hardcover R4,238 Discovery Miles 42 380
Process Operational Safety and…
Zhe Wu, Panagiotis D. Christofides Hardcover R2,907 Discovery Miles 29 070
Information Support and Aircraft Flight…
Oleg Ivanovich Zavalishin, Anatoly Nikolaevich Korotonoshko, … Hardcover R4,233 Discovery Miles 42 330
Emerging Energetic Materials: Synthesis…
Dabir S. Viswanath, Tushar K. Ghosh, … Hardcover R5,657 Discovery Miles 56 570
Quantum Random Number Generation…
Christian Kollmitzer, Stefan Schauer, … Hardcover R3,890 Discovery Miles 38 900
Nuclear Power Plants: Innovative…
Yang Xu, Yongbin Sun, … Hardcover R4,520 Discovery Miles 45 200

 

Partners