![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems
Multimedia surveillance systems is an emerging field that includes signal and image processing, communications, and computer vision. Multimedia Video-Based Surveillance Systems: Requirements, Issues and Solutions, combines the most recent research results from these areas for use by engineers and end-users involved in the design of surveillance systems in the fields of transportation and services. The book covers emerging surveillance requirements, including new digital sensors for real-time acquisition of surveillance data, low-level image processing algorithms, and event detection methods. It also discusses problems related to knowledge representation in surveillance systems, wireless and wired multimedia networks, and a new generation of surveillance communication tools. Timely information is presented on digital watermarking, broadband multimedia transmission, legal use of surveillance systems, performance evaluation criteria, and other new and emerging topics, along with applications for transports and pedestrian monitoring. The information contained in Multimedia Video-Based Surveillance Systems: Requirements, Issues and Solutions, bridges the distance between present practice and research findings, and the book is an indispensable reference tool for professional engineers.
This book attempts to look into the genesis of security culture as a concept which emerged with the recognition of the role of the human factor in the context of security. It traces the rapid evolution of security culture into a multi-functional discipline reinforced by supplementary tools such as assessment and enhancement methodologies, reviews practical steps to harmonize nuclear safety and security culture as well as recommends its practical application to address insider threats and their consequences. In addition, it demonstrates how to tailor the generic model of nuclear security culture to meet specific needs of diverse facilities and activities in different countries. Finally, the book discusses several challenges which need to be addressed to make security culture a user-friendly, universal, and sustainable instrument to turn the perception of the human factor as a liability into an asset of nuclear security.
This book presents Proceedings of the International Conference on Intelligent Systems and Networks (ICISN 2022), held at Hanoi in Vietnam. It includes peer reviewed high quality articles on Intelligent System and Networks. It brings together professionals and researchers in the area and presents a platform for exchange of ideas and to foster future collaboration. The topics covered in this book include- Foundations of Computer Science; Computational Intelligence Language and speech processing; Software Engineering Software development methods; Wireless Communications Signal Processing for Communications; Electronics track IoT and Sensor Systems Embedded Systems; etc.
This book tackles the problem of complexity within IT environments, i.e., "Cybercomplexity," which is generally recognized as a principal source of cybersecurity risk. The book first defines complexity and simplifies its analysis by assuming a probabilistic approach to security risk management. It then proposes a simple model of cybercomplexity that is based on Shannon entropy, a basic concept in information theory. The key drivers of cybercomplexity emerge from this model, where these drivers reveal the scale-dependence of cybersecurity risk and explain why macroscopic security controls are required to address cybersecurity risk on an enterprise scale. The significant operational implications of cybercomplexity are also discussed, thereby providing both a theoretical framework and a practical guide to addressing this longstanding problem in cybersecurity risk management.
For millennia, humans waged war on land and sea. The 20th century opened the skies and the stars, introducing air and space as warfare domains. Now, the 21st century has revealed perhaps the most insidious domain of all: cyberspace, the fifth domain. A realm free of physical boundaries, cyberspace lies at the intersection of technology and psychology, where one cannot see one's enemy, and the most potent weapon is information. The third book in the Great Power Competition series, Cyberspace: The Fifth Domain, explores the emergence of cyberspace as a vector for espionage, sabotage, crime, and war. It examines how cyberspace rapidly evolved from a novelty to a weapon capable of influencing global economics and overthrowing regimes, wielded by nation-states and religious ideologies to stunning effect. Cyberspace: The Fifth Domain offers a candid look at the United States' role in cyberspace, offering realistic prescriptions for responding to international cyber threats on the tactical, strategic, and doctrinal levels, answering the questions of how can we respond to these threats versus how should we respond? What are the obstacles to and consequences of strategic and tactical response options? What technological solutions are on the horizon? Should the U.S. adopt a more multi-domain offensive posture that eschews the dominant "cyber vs. cyber" paradigm? To answer these questions, experts examine the technological threats to critical infrastructure; cyber operations strategy, tactics, and doctrine; information influence operations; the weaponization of social media; and much more.
When the SCION project started in 2009, the goal was to create an architecture offering high availability and security for basic point-to-point communication. In the five years since the publication of SCION: A Secure Internet Architecture, this next-generation Internet architecture has evolved in terms of both design and deployment. On the one hand, there has been development of exciting new concepts and systems, including a new global time-synchronization system, an inter-domain approach for bandwidth reservations called COLIBRI, and Green Networking, which allows combating global climate change on three fronts. On the other hand, SCION is now also in production use by the Swiss financial ecosystem, and enables participants such as the Swiss National Bank, the Swiss provider of clearing services (SIX), and all Swiss financial institutes to communicate securely and reliably with each other via the Secure Swiss Finance Network. This unique guidebook provides an updated description of SCION's main components, covering new research topics and the most recent deployments. In particular, it presents in-depth discussion of formal verification efforts. Importantly, it offers a comprehensive, thorough description of the current SCION system: Describes the principles that guided SCION's design as a secure and robust Internet architecture Provides a comprehensive description of the next evolution in the way data finds its way through the Internet Explains how SCION can contribute to reducing carbon emissions, by introducing SCION Green Networking Demonstrates how SCION not only functions in academic settings but also works in production deployments Discusses additional use cases for driving SCION's adoption Presents the approaches for formal verification of protocols and code Illustrated with many colorful figures, pictures, and diagrams, allowing easy access to the concepts and use cases Assembled by a team with extensive experience in the fields of computer networks and security, this text/reference is suitable for researchers, practitioners, and graduate students interested in network security. Also, readers with limited background in computer networking but with a desire to know more about SCION will benefit from an overview of relevant chapters in the beginning of the book.
This book examines the issues of ensuring anti-terrorist security of an aviation enterprise, provides a history of terrorism in the aviation sector, and analyzes the legal regulations. This book provides mathematical and mathematical-psychological models for reducing the risk of terrorist threats, which makes it possible to objectively increase the safety of air transport facilities, reduce the likelihood of terrorist attacks, save human lives and prevent significant material losses. The solutions of general humanistic problems proposed in the book-preventing accidents and preserving the world-are an original feature of the book, which allows one to treat it with the necessary attention and interest for the reader. The concept of anti-terrorist security of an aviation enterprise presented in this book has been widely tested and introduced into the activities of leading aviation enterprises, including the Interstate Aviation Committee (IAC), and has been used in the investigation of aviation accidents. This book is written for a wide range of audience associated with ensuring aviation transport security and for the end users of airlines-passengers, in order to expand their knowledge about the reliability of using air transport.
This hands-on textbook introduces physics and nuclear engineering students to the experimental and theoretical aspects of fission physics for research and applications through worked examples and problem sets. The study of nuclear fission is currently undergoing a renaissance. Recent advances in the field create the opportunity to develop more reliable models of fission predictability and to supply measurements and data to critical applications including nuclear energy, national security and counter-proliferation, and medical isotope production. An Introduction to Nuclear Fission provides foundational knowledge for the next generation of researchers to contribute to nuclear fission physics.
This book is a compilation of selected papers from the Sixth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in October 2021 in Zhuji, Zhejiang, China. The purpose of this symposium is to discuss Inspection, test, certification and research for the software and hardware of Instrument and Control (I&C) systems in nuclear power plants (NPP), such as sensors, actuators and control system. It aims to provide a platform of technical exchange and experience sharing for those broad masses of experts and scholars and nuclear power practitioners, and for the combination of production, teaching and research in universities and enterprises to promote the safe development of nuclear power plant. Readers will find a wealth of valuable insights into achieving safer and more efficient instrumentation and control systems.
The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through its own imperfections and vulnerabilities. Moreover, quantum computers are further pushing the boundaries of what is possible, by making machine learning cyber agents faster and smarter. With the abundance of often-confusing information and lack of trust in the diverse applications of AI-based technologies, it is essential to have a book that can explain, from a cyber security standpoint, why and at what stage the emerging, powerful technology of machine learning can and should be mistrusted, and how to benefit from it while avoiding potentially disastrous consequences. In addition, this book sheds light on another highly sensitive area - the application of machine learning for offensive purposes, an aspect that is widely misunderstood, under-represented in the academic literature and requires immediate expert attention.
This book discusses the principles, approaches, concepts and development programs for integrated aircraft avionics. The functional tasks of integrated on-board radio electronic equipment (avionics) of navigation, landing, data exchange and air traffic control are formulated that meet the modern requirements of civil and military aviation, and the principles of avionics integration are proposed. The modern approaches to the joint processing of information in navigation and landing complexes are analyzed. Algorithms of multichannel information processing in integrated avionics are considered, and examples of its implementation are presented. This book is intended for scientists and professionals in the field of aviation equipment, students and graduate students of relevant specialties.
This book presents sensemaking strategies to support security planning and design. Threats to security are becoming complex and multifaceted and increasingly challenging traditional notions of security. The security landscape is characterized as 'messes' and 'wicked problems' that proliferate in this age of complexity. Designing security solutions in the face of interconnectedness, volatility and uncertainty, we run the risk of providing the right answer to the wrong problem thereby resulting in unintended consequences. Sensemaking is the activity that enables us to turn the ongoing complexity of the world into a "situation that is comprehended explicitly in words and that serves as a springboard into action" (Weick, Sutcliffe, Obstfeld, 2005). It is about creating an emerging picture of our world through data collection, analysis, action, and reflection. The importance of sensemaking to security is that it enables us to plan, design and act when the world as we knew it seems to have shifted. Leveraging the relevant theoretical grounding and thought leadership in sensemaking, key examples are provided, thereby illustrating how sensemaking strategies can support security planning and design. This is a critical analytical and leadership requirement in this age of volatility, uncertainty, complexity and ambiguity that characterizes the security landscape. This book is useful for academics, graduate students in global security, and government and security planning practitioners.
Resilience Engineering (RE) studies have successfully identified and described many instances of resilient performance in high hazard sectors as well as in the far more frequent cases where people and organisations cope with the uncertainties of daily operations. Since RE was first described in 2006, a steady accumulation of insights and efforts have provided the basis for practical tools and methods. This development has been documented by a series of texts in the Resilience Engineering Perspectives series as well as by a growing number of papers and reports. This book encapsulates the essential practical lessons learned from the use of Resilience Engineering (RE) for over ten years. The main contents are a series of chapters written by those who have been instrumental in these applications. To increase the value for the reader, each chapter will include: rationale for the overall approach; data sought and reason(s) for choosing; data sources used, data analyses performed, and how recommendations were made and turned into practice. Serving as a reference for practitioners who want to analyse, support, and manage resilient performance, this book also advances research into RE by inquiring why work goes well in unpredictable environments, to improve work performance, or compensate for deficiencies.
This book discusses the latest advances in cyber-physical security and resilience of cyber-physical systems, including cyber-attack detection, isolation, situation awareness, resilient estimation and resilient control under attack. It presents both theoretical results and important applications of the methods. Security and Resilience in Cyber-Physical Systems begins by introducing the topic of cyber-physical security, covering state-of-the-art trends in both theory and applications, as well as some of the emerging methodologies and future directions for research. It then moves on to detail theoretical methods of attack detection, resilient estimation and control within cyber-physical systems, before discussing their various applications, such as power generation and distribution, autonomous systems, wireless communication networks and chemical plants. Focusing on the detection of and accommodation to cyber-attacks on cyber-physical systems, and including both estimation and artificial-intelligence-based methods, this book will be of interest to researchers, engineers and graduate students within the fields of cyber-physical security and resilient control.
Despite the growing interest in security amongst governments, organizations and the general public, the provision of much security is substandard. This book explores the problems facing security, and sets out innovative proposals to enhance the effectiveness of security in society, at national and organizational levels.
This book presents materials on the implementation of modern technologies for aircraft information support and ground-based radio equipment for flights in the Russian Federation, especially in the Arctic and far Eastern regions, as well as new methods for monitoring the flight of civil aviation aircraft based on the use of local control and correction stations and optical systems that fully meet the requirements of international and domestic organizations for the reliability and integrity of transmitted information. The book is intended for engineering and technical specialists involved in the development, manufacturing and operation of aircraft avionics and ground-based radio electronic flight support systems, as well as graduate students and senior students of radio engineering specialties. It is useful to researchers and professionals whose activities are related to air traffic control.
This book highlights the design, use and structure of blockchain systems and decentralized ledger technologies (B/DLT) for use in the construction industry. Construction remains a fragmented change-resistant industry with chronic problems of underproductivity and a very low digitization factor compared to other fields. In parallel, the convergence, embedding and coordination of digital technologies in the physical world provides a unique opportunity for the construction industry to leap ahead and adopt fourth industrial revolution technologies. Within this context, B/DLT are an excellent fit for the digitization of the construction industry. B/DLT are effective in this as they organize and align digital and physical supply chains, produce stigmergic coordination out of decentralization, enable the governance of complex projects for multiple stakeholders, while enabling the creation of a new class of business models and legal instruments for construction.
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license.
This book is focused on the development of rigorous, yet practical, methods for the design of advanced process control systems to improve process operational safety and cybersecurity for a wide range of nonlinear process systems. Process Operational Safety and Cybersecurity develops designs for novel model predictive control systems accounting for operational safety considerations, presents theoretical analysis on recursive feasibility and simultaneous closed-loop stability and safety, and discusses practical considerations including data-driven modeling of nonlinear processes, characterization of closed-loop stability regions and computational efficiency. The text then shifts focus to the design of integrated detection and model predictive control systems which improve process cybersecurity by efficiently detecting and mitigating the impact of intelligent cyber-attacks. The book explores several key areas relating to operational safety and cybersecurity including: machine-learning-based modeling of nonlinear dynamical systems for model predictive control; a framework for detection and resilient control of sensor cyber-attacks for nonlinear systems; insight into theoretical and practical issues associated with the design of control systems for process operational safety and cybersecurity; and a number of numerical simulations of chemical process examples and Aspen simulations of large-scale chemical process networks of industrial relevance. A basic knowledge of nonlinear system analysis, Lyapunov stability techniques, dynamic optimization, and machine-learning techniques will help readers to understand the methodologies proposed. The book is a valuable resource for academic researchers and graduate students pursuing research in this area as well as for process control engineers. Advances in Industrial Control reports and encourages the transfer of technology in control engineering. The rapid development of control technology has an impact on all areas of the control discipline. The series offers an opportunity for researchers to present an extended exposition of new work in all aspects of industrial control.
This book presents a summary of artificial intelligence and machine learning techniques in its first two chapters. The remaining chapters of the book provide everything one must know about the basic artificial intelligence to modern machine intelligence techniques including the hybrid computational intelligence technique, using the concepts of several real-life solved examples, design of projects and research ideas. The solved examples with more than 200 illustrations presented in the book are a great help to instructors, students, non-AI professionals, and researchers. Each example is discussed in detail with encoding, normalization, architecture, detailed design, process flow, and sample input/output. Summary of the fundamental concepts with solved examples is a unique combination and highlight of this book.
Ensuring cybersecurity for smart cities is crucial for a sustainable cyber ecosystem. Given the undeniable complexity of smart cities, fundamental issues such as device configurations and software updates should be addressed when it is most needed to fight cyber-crime and ensure data privacy. This book addresses the cybersecurity challenges associated with smart cities, aiming to provide a bigger picture of the concepts, intelligent techniques, practices and research directions in this area. Furthermore, this book serves as a single source of reference for acquiring knowledge on the technology, processes and people involved in the next-generation of cyber-smart cities.
This book discusses recent brain research and the potentially dangerous dual-use applications of the findings of these research projects. The book is divided into three sections: Part I examines the rise in dual-use concerns within various state's chemical and biological non-proliferation regime's during this century, as well as the rapid technologically driven advances in neuroscience and the associated possible misuse considerations in the same period. Part II reviews the brain research projects in the EU, USA, Japan, China and several other countries with regard to their objectives, achievements and measures to deal with the problem of dual-use. Part III assesses the extent to which the results of this civil neuroscience work, which is intended to be benign, are being, and could be protected against future hostile applications in the development of novel chemical and biological weapons.
This book provides an overview of state-of-the-art implementations of quantum random number generators (QRNGs), and especially examines their relation to classical statistical randomness models and numerical techniques for computing random numbers. The reader - who ideally has a background in classical statistics, computer science, or cryptography - is introduced to the world of quantum bits step by step, and explicit relations between QRNGs and their classical counterparts are identified along the way. Random number generation is a major pillar of cryptography. Capitalizing on the randomness inherent in quantum phenomena is a rapidly evolving branch of quantum cryptography with countless applications for the future. The value of quantum randomness for cryptographic purposes is empirically demonstrated in statistical evaluations of QRNGs' performance compared to classical techniques for true and pseudorandom number generation. The book then provides an overview of technical implementations of QRNGs, before a concluding discussion of major achievements and remaining obstacles in the field rounds out the coverage, while also opening the door for future research directions.
This book includes topics in nanophysics, nanotechnology, nanomaterials, sensors, biosensors, security systems, and CBRN agents detection. There have been many significant advances in the past two years and some entirely new directions of research are just opening up. Recent developments in nanotechnology and measurement techniques now allow experimental investigation of the physical properties of nanostructured materials. The book presents new methods for the detection of chemical, biological, radiological and nuclear (CBRN) agents using chemical and biochemical sensors. Identification, protection and decontamination are the main scientific and technological responses for the modern challenges of CBRN agents. |
You may like...
Reforming Civil-Military Relations in…
Aurel Croissant, David Kuehn
Hardcover
R4,627
Discovery Miles 46 270
Enhancing CBRNE Safety & Security…
Andrea Malizia, Marco D'Arienzo
Hardcover
R2,728
Discovery Miles 27 280
Safety and Security Engineering IX
Giorgio Passerini, Fabio Farzia, …
Hardcover
R4,325
Discovery Miles 43 250
Machine Learning Techniques for Gait…
James Eric Mason, Issa Traore, …
Hardcover
Physical Security 150 Things You Should…
Lawrence Fennelly, Louis Tyska
Paperback
R1,357
Discovery Miles 13 570
Advances in Cyber Security Analytics and…
Shishir K. Shandilya, Neal Wagner, …
Hardcover
R4,011
Discovery Miles 40 110
|