0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (1)
  • R500+ (309)
  • -
Status
Format
Author / Contributor
Publisher

Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems

The Great Power Competition Volume 1 - Regional Perspectives on Peace and Security (Hardcover, 1st ed. 2021): Adib Farhadi,... The Great Power Competition Volume 1 - Regional Perspectives on Peace and Security (Hardcover, 1st ed. 2021)
Adib Farhadi, Anthony J. Masys
R3,688 Discovery Miles 36 880 Ships in 10 - 15 working days

Over the past decade, the international political system has come to be characterized as a Great Power Competition in which multiple would-be hegemons compete for power and influence. Instead of a global climate of unchallenged United States dominance, revisionist powers, notably China and Russia alongside other regional powers, are vying for dominance through political, military, and economic means. A critical battleground in the Great Power Competition is the Middle East, the Horn of Africa, and the Central Asia South Asia (CASA), also known as the Central Region. With the planned withdrawal of U.S. military forces from Afghanistan, the U.S. has stated its intention of shifting attention away from the CASA Region in favor of a more isolationist foreign policy approach. This book provides an in-depth understanding of the implications for this shift related to regional diplomacy & politics, economic opportunities & rivalries, security considerations & interests, and the information environment. Amplifying the vital importance of success in the Central Region to U.S. prosperity and security, this volume advances dialogue in identifying key issues for stakeholders within and beyond the Central Region to gain a holistic perspective that better informs decision-making at various levels. This collection of work comes from scholars, strategic thinkers, and subject matter experts who participated in the Great Power Competition Conference hosted by the University of South Florida, in partnership with the National Defense University Near East South Asia Center for Strategic Strategies in January 2020.

Biometric Identification Technologies Based on Modern Data Mining Methods (Hardcover, 1st ed. 2021): Stepan Bilan, Mohamed... Biometric Identification Technologies Based on Modern Data Mining Methods (Hardcover, 1st ed. 2021)
Stepan Bilan, Mohamed Elhoseny, D. Jude Hemanth
R3,112 Discovery Miles 31 120 Ships in 18 - 22 working days

This book emphasizes recent advances in the creation of biometric identification systems for various applications in the field of human activity. The book displays the problems that arise in modern systems of biometric identification, as well as the level of development and prospects for the introduction of biometric technologies. The authors classify biometric technologies into two groups, distinguished according to the type of biometric characteristics used. The first group uses static biometric parameters: fingerprints, hand geometry, retina pattern, vein pattern on the finger, etc. The second group uses dynamic parameters for identification: the dynamics of the reproduction of a signature or a handwritten keyword, voice, gait, dynamics of work on the keyboard, etc. The directions of building information systems that use automatic personality identification based on the analysis of unique biometric characteristics of a person are discussed. The book is intended for professionals working and conducting research in the field of intelligent information processing, information security, and robotics and in the field of real-time identification systems. The book contains examples and problems/solutions throughout.

The 2011 Fukushima Daiichi Nuclear Power Plant Accident - An Analysis from the Metre to the Nanometre Scale (Hardcover, 1st ed.... The 2011 Fukushima Daiichi Nuclear Power Plant Accident - An Analysis from the Metre to the Nanometre Scale (Hardcover, 1st ed. 2019)
Peter George Martin
R4,282 Discovery Miles 42 820 Ships in 18 - 22 working days

This PhD sought to determine the mechanisms for the reactor explosions by mapping, collecting and analysing samples from across the area of Japan that received radioactive fallout from the explosions. In doing this, the author conducted significant fieldwork in the restricted-access fallout zone using ground and novel UAV-based mapping of radiation to identify hot-spot areas for sample collecting but also using these tools to verify the efficacy of the clean-up operations ongoing in the prefecture. Such fieldwork was both technically pioneering for its use of UAVs (drones) but also selfless in terms of bravely entering a nuclear danger area to collect samples for the greater benefit of the scientific community.

Intelligent Distributed Video Surveillance Systems (Hardcover, New): Sergio A. Velastin, Paolo Remagnino Intelligent Distributed Video Surveillance Systems (Hardcover, New)
Sergio A. Velastin, Paolo Remagnino
R2,621 Discovery Miles 26 210 Ships in 10 - 15 working days

There is a growing interest in the development and deployment of surveillance systems in public and private locations. Conventional approaches rely on the installation of wide area CCTV (Closed Circuit Television), but the explosion in the numbers of cameras that have to be monitored, the increasing costs of providing monitoring personnel and the limitations that humans have to maintain sustained levels of concentration severely limit the effectiveness of these systems. Advances in information and communication technologies, such as computer vision for face recognition and human behaviour analysis, digital annotation and storage of video, transmission of video/audio streams over wired and wireless networks, can potentially provide significant improvements in this field. The book consists of a coherent selection of extended versions of presentations made in two successful IEE symposia on Intelligent Distributed Surveillance Systems (IDSS). It surveys recent development in distributed intelligent surveillance systems and brings together the work of researchers and engineers, system integrators and managers of public and private organisations likely to use such systems.

Applied Biosecurity: Global Health, Biodefense, and Developing Technologies (Hardcover, 1st ed. 2021): Ryan N. Burnette Applied Biosecurity: Global Health, Biodefense, and Developing Technologies (Hardcover, 1st ed. 2021)
Ryan N. Burnette
R1,210 Discovery Miles 12 100 Ships in 10 - 15 working days

This book describes an adaptable biothreat assessment process to complement overall biorisk management programs, incorporating threat management and the unique natures of biological assets. Further, this book examines the nexus between public health, international security, and developing technologies, building a case for augmenting biosecurity to levels beyond the laboratory constraints. With the face of biological and biomedical sciences changing, this book describes how with proper biosecurity development, these can become assets, rather than liabilities, to secure our world from natural and man-made biological disasters. The world is changing rapidly with respect to developing threats, such as terrorism, and dual-use technologies, such as synthetic biology, that are challenging how we think about biosafety and biosecurity. Further, the fields of public health and international security are colliding, as both of these share the common enemy: intentional or natural biological incidents. To date, biosecurity has been limited to laboratory-level application, and complicating efforts, and lacks credentialed biosecurity professionals skilled in both the biological sciences and threat management techniques. The result is a fragmented field of practice, with tremendous need, from the lab to the outbreak. Underpinning these principles is the SARS-CoV-2 coronavirus pandemic, providing a historic milestone to examine biosecurity through a global lens. This book describes biosecurity as a set of practices and principles to be augmented out of the constrained laboratory environment, and applied to larger efforts, such as international threat reduction and biological incident management.

Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems - The Fifth International Symposium on... Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems - The Fifth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (ISNPP) (Hardcover, 1st ed. 2021)
Yang Xu, Yongbin Sun, Yanyang Liu, Feng Gao, Pengfei Gu, …
R4,170 Discovery Miles 41 700 Ships in 18 - 22 working days

This book is a compilation of selected papers from the fifth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in November 2020 in Beijing, China. The purpose of this symposium is to discuss Inspection, test, certification and research for the software and hardware of Instrument and Control (I&C) systems in nuclear power plants (NPP), such as sensors, actuators and control system. It aims to provide a platform of technical exchange and experience sharing for those broad masses of experts and scholars and nuclear power practitioners, and for the combination of production, teaching and research in universities and enterprises to promote the safe development of nuclear power plant. Readers will find a wealth of valuable insights into achieving safer and more efficient instrumentation and control systems.

The Great Power Competition Volume 4 - Lessons Learned in Afghanistan: America's Longest War (Hardcover, 1st ed. 2023):... The Great Power Competition Volume 4 - Lessons Learned in Afghanistan: America's Longest War (Hardcover, 1st ed. 2023)
Adib Farhadi, Anthony Masys
R3,683 Discovery Miles 36 830 Ships in 10 - 15 working days

Lessons Learned from Afghanistan: America's Longest War examines the lessons of how America's "longest war" came to an ignominious end with staggering consequences for the United States and the Afghan nation. Afghanistan today faces an unprecedented humanitarian crisis, looming threat of a civil war and a resurgence of violent extremism organizations similar to pre-9/11. As the U.S. enters a new era in the strategic geopolitical Great Power Competition, an analysis of the original mission intent, shifting policy and strategic objectives, and ineffective implementation of security, political and economic programs reveal critical lessons and questions such as: What led to the "strategic failure" of the U.S. in Afghanistan? What decisions resulted in the present-day humanitarian, civil, and political crises in Afghanistan? Were these consequences in fact avoidable? Was there an alternative approach that could have maintained the hard-fought gains of the last two decades, and better demonstrated America's standing as a defender of global human rights? Lessons Learned from Afghanistan: America's Longest War further explores lessons of the past negotiations between the United States, Taliban, and former U.S. backed Afghan government to suggest alternative pathways that honor the original intent of the mission and meet present-day obligations to an Afghan nation in crisis.

Radiological and Nuclear Terrorism - Their Science, Effects, Prevention, and Recovery (Hardcover, 1st ed. 2021): P. Andrew Karam Radiological and Nuclear Terrorism - Their Science, Effects, Prevention, and Recovery (Hardcover, 1st ed. 2021)
P. Andrew Karam
R3,675 Discovery Miles 36 750 Ships in 10 - 15 working days

This book discusses multiple aspects of radiological and nuclear terrorism. Do you know what to do if there is a radiological or nuclear emergency in your city? These accidents are not common, but they have happened - and even though we have not seen an attack using these weapons, governments around the world are making plans for how to prevent them - and for how to respond if necessary. Whether you are an emergency responder, a medical caregiver, a public health official - even a member of the public wanting to know how to keep yourself and your loved ones safe - there is a need to understand how these weapons work, how radiation affects our health, how to stop an attack from taking place, how to respond appropriately in the event of an emergency, and much more. Unfortunately, the knowledge that is needed to accomplish all of this is lacking at all levels of society and government. In this book, Dr. Andrew Karam, an internationally respected expert in radiation safety and multiple aspects of radiological and nuclear emergencies, discusses how these weapons work and what they can do, how they can affect our health, how to keep yourself safe, and how to react appropriately whether you are a police officer investigating a suspect radiological weapon, a firefighter responding to a radiological or nuclear attack, a nurse or physician caring for potentially contaminated patients, or a governmental official trying to keep the public safe. To do this, he draws upon his extensive experience in the military, the several years he worked directly with emergency responders, his service on a number of advisory committees, and multiple trips overseas in the aftermath of the Fukushima accident and on behalf of the International Atomic Energy Agency, Interpol, and the Health Physics Society.

Modeling and Simulation of Lithium-ion Power Battery Thermal Management (Hardcover, 1st ed. 2022): Junqiu Li Modeling and Simulation of Lithium-ion Power Battery Thermal Management (Hardcover, 1st ed. 2022)
Junqiu Li
R4,323 Discovery Miles 43 230 Ships in 10 - 15 working days

This book focuses on the thermal management technology of lithium-ion batteries for vehicles. It introduces the charging and discharging temperature characteristics of lithium-ion batteries for vehicles, the method for modeling heat generation of lithium-ion batteries, experimental research and simulation on air-cooled and liquid-cooled heat dissipation of lithium-ion batteries, lithium-ion battery heating method based on PTC and wide-line metal film, self-heating using sinusoidal alternating current. This book is mainly for practitioners in the new energy vehicle industry, and it is suitable for reading and reference by researchers and engineering technicians in related fields such as new energy vehicles, thermal management and batteries. It can also be used as a reference book for undergraduates and graduate students in energy and power, electric vehicles, batteries and other related majors.

Emerging Energetic Materials: Synthesis, Physicochemical, and Detonation Properties (Hardcover, 1st ed. 2018): Dabir S.... Emerging Energetic Materials: Synthesis, Physicochemical, and Detonation Properties (Hardcover, 1st ed. 2018)
Dabir S. Viswanath, Tushar K. Ghosh, Veera M. Boddu
R5,263 Discovery Miles 52 630 Ships in 18 - 22 working days

This book summarizes science and technology of a new generation of high-energy andinsensitive explosives. The objective is to provide professionals with comprehensiveinformation on the synthesis and the physicochemical and detonation properties ofthe explosives. Potential technologies applicable for treatment of contaminated wastestreams from manufacturing facilities and environmental matrices are also be included.This book provides the reader an insight into the depth and breadth of theoreticaland empirical models and experimental techniques currently being developed in thefield of energetic materials. It presents the latest research by DoD engineers andscientists, and some of DoD's academic and industrial researcher partners. The topicsexplored and the simulations developed or modified for the purposes of energetics mayfind application in other closely related fields, such as the pharmaceutical industry.One of the key features of the book is the treatment of wastewaters generated duringmanufacturing of these energetic materials.

Women in Security - Changing the Face of Technology and Innovation (Hardcover, 1st ed. 2018): Debra A. Christofferson Women in Security - Changing the Face of Technology and Innovation (Hardcover, 1st ed. 2018)
Debra A. Christofferson
R3,569 Discovery Miles 35 690 Ships in 10 - 15 working days

This volume examines core areas of development in security, emphasizing the pivotal contributions of women to the field's evolution. The author first covers a broad spectrum of key topics, including how security is created, where innovation occurs, what the underpinnings are, and who supports it and how. After an overview of the field, female security professionals share their own stories of technology and innovation in security today; the foundation, where research is headed, and the emerging trends. Women currently make up a very small pocket of cyber security staffing - this book aims to increase the visibility of women in the field and their contributions and encourage other females to join the field. The contributors hold various roles from executive leadership, to engineers, analysts, and researchers.

Nuclear Safeguards, Security, and Nonproliferation - Achieving Security with Technology and Policy (Paperback, 2nd edition):... Nuclear Safeguards, Security, and Nonproliferation - Achieving Security with Technology and Policy (Paperback, 2nd edition)
James Doyle
R2,091 Discovery Miles 20 910 Ships in 10 - 15 working days

Nuclear Safeguards, Security and Nonproliferation: Achieving Security with Technology and Policy, Second Edition is a comprehensive reference covering the cutting-edge technologies used to trace, track and safeguard nuclear material. Sections cover security, the illicit trafficking of nuclear materials, improvised nuclear devices, and how to prevent nuclear terrorism. International case studies of security at nuclear facilities and illegal nuclear trade activities provide specific examples of the complex issues surrounding the technology and policy for nuclear material protection, control and accountability. New case studies include analyses of nuclear programs of important countries, such as North Korea, Iran, and Kazakhstan, among others. This is a thoroughly updated, must-have volume for private and public organizations involved in driving national security, domestic and international policy issues relating to nuclear material security, non-proliferation, and nuclear transparency.

The Art of War for Computer Security (Hardcover, 1st ed. 2019): Tom Madsen The Art of War for Computer Security (Hardcover, 1st ed. 2019)
Tom Madsen
R3,332 Discovery Miles 33 320 Ships in 18 - 22 working days

In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks. The author first briefly introduces Sun Tzu. Then each chapter in the book takes its inspiration from an original title in The Art of War, where the author offers a general introduction to the content and then describes its application in a cybersecurity setting. These chapters cover estimates; waging war; offensive strategy; how you prepare for an attack; energy; weaknesses and strengths; the variables that need consideration before embarking on a war; how infrastructure is related to the concept of ground; attack by fire or how skilled attackers hide behind noise; and employing secret agents. The book will be interesting for computer security researchers and professionals who would like some grounding in a security mindset.

Safety and Security Science and Technology - Perspectives from Practice (Hardcover, 1st ed. 2023): Anthony J. Masys Safety and Security Science and Technology - Perspectives from Practice (Hardcover, 1st ed. 2023)
Anthony J. Masys
R3,332 Discovery Miles 33 320 Ships in 18 - 22 working days

Global security threats have created a complex risk landscape that is challenging and transforming society. These global security issues intersect and influence the political, economic, social, technological, ecological and legal dimensions of the complex risk landscape and are now transborder thereby becoming national security issues. Accessing the innovation space to support safety, security and defence capabilities is critical in order to mitigate new and evolving threats. Through real-world examples of innovation, this book provides a detailed examination of the innovation space as it pertains to the application of S&T to safety and security threats and challenges. This book is of most interest to public and private sector innovators as well as academician and graduate students working in the safety and security domain.

Electrician's Guide to Fire Detection and Fire Alarm Systems (Spiral bound, 3rd edition): The Institution of Engineering... Electrician's Guide to Fire Detection and Fire Alarm Systems (Spiral bound, 3rd edition)
The Institution of Engineering and Technology
R996 Discovery Miles 9 960 Ships in 9 - 17 working days

The Electrician's Guide to Fire Detection and Fire Alarm Systems, 3rd Edition is ideal for individuals involved in the design and installation of fire detection systems as part of electrical installations. It offers information, advice, and guidance on managing BS 7671 and BS 5839 requirements. This Guide is an essential publication for all fire alarm designers, installers, specifiers, electricians, electrical contractors, installation designers and students in further education and/or professional training. Key Features include: Ideal for individuals involved in the design and installation of fire detection systems as part of electrical installations Includes essential advice on special fire risk, systems design and integration, and installation competency Provides information, advice and guidance on managing BS 7671:2018 and BS 5839 requirements Updated to accommodate the changes, revisions and new information made to IET's 18th Edition, BS 7671:2018 regulations Updated to include changes, revision and new information added to the BS 5839-1 and BS 5839-6 requirements An essential publication for all fire alarm designers, installers, specifiers, electricians, electrical contractors, installation designers and students in further education and/or professional training

Introduction to Security (Paperback, 10th edition): Robert Fischer, Edward Halibozek, David Walters Introduction to Security (Paperback, 10th edition)
Robert Fischer, Edward Halibozek, David Walters
R2,426 R1,795 Discovery Miles 17 950 Save R631 (26%) Ships in 10 - 15 working days

Introduction to Security, Tenth Edition, provides an overview of the security industry with an emphasis on the theories of security and loss prevention that have shaped the profession. Security is covered in totality, providing readers with a glimpse of the various and diverse components that make up the security function. This updated book is the latest edition in what has historically been the go-to textbook on the subject for more than 30 years. While this fully updated edition continues to utilize the basic concepts that have made this text the premier primer in the security field, it also focuses heavily on current and future security issues.

Safety, Security and Privacy for Cyber-Physical Systems (Hardcover, 1st ed. 2021): Riccardo M.G. Ferrari, Andre M. H. Teixeira Safety, Security and Privacy for Cyber-Physical Systems (Hardcover, 1st ed. 2021)
Riccardo M.G. Ferrari, Andre M. H. Teixeira
R4,294 Discovery Miles 42 940 Ships in 18 - 22 working days

This book presents an in-depth overview of recent work related to the safety, security, and privacy of cyber-physical systems (CPSs). It brings together contributions from leading researchers in networked control systems and closely related fields to discuss overarching aspects of safety, security, and privacy; characterization of attacks; and solutions to detecting and mitigating such attacks. The book begins by providing an insightful taxonomy of problems, challenges and techniques related to safety, security, and privacy for CPSs. It then moves through a thorough discussion of various control-based solutions to these challenges, including cooperative fault-tolerant and resilient control and estimation, detection of attacks and security metrics, watermarking and encrypted control, privacy and a novel defense approach based on deception. The book concludes by discussing risk management and cyber-insurance challenges in CPSs, and by presenting the future outlook for this area of research as a whole. Its wide-ranging collection of varied works in the emerging fields of security and privacy in networked control systems makes this book a benefit to both academic researchers and advanced practitioners interested in implementing diverse applications in the fields of IoT, cooperative autonomous vehicles and the smart cities of the future.

Automotive Cyber Security - Introduction, Challenges, and Standardization (Hardcover, 1st ed. 2020): Shiho Kim, Rakesh Shrestha Automotive Cyber Security - Introduction, Challenges, and Standardization (Hardcover, 1st ed. 2020)
Shiho Kim, Rakesh Shrestha
R3,989 Discovery Miles 39 890 Ships in 10 - 15 working days

This book outlines the development of safety and cybersecurity, threats and activities in automotive vehicles. This book discusses the automotive vehicle applications and technological aspects considering its cybersecurity issues. Each chapter offers a suitable context for understanding the complexities of the connectivity and cybersecurity of intelligent and autonomous vehicles. A top-down strategy was adopted to introduce the vehicles' intelligent features and functionality. The area of vehicle-to-everything (V2X) communications aims to exploit the power of ubiquitous connectivity for the traffic safety and transport efficiency. The chapters discuss in detail about the different levels of autonomous vehicles, different types of cybersecurity issues, future trends and challenges in autonomous vehicles. Security must be thought as an important aspect during designing and implementation of the autonomous vehicles to prevent from numerous security threats and attacks. The book thus provides important information on the cybersecurity challenges faced by the autonomous vehicles and it seeks to address the mobility requirements of users, comfort, safety and security. This book aims to provide an outline of most aspects of cybersecurity in intelligent and autonomous vehicles. It is very helpful for automotive engineers, graduate students and technological administrators who want to know more about security technology as well as to readers with a security background and experience who want to know more about cybersecurity concerns in modern and future automotive applications and cybersecurity. In particular, this book helps people who need to make better decisions about automotive security and safety approaches. Moreover, it is beneficial to people who are involved in research and development in this exciting area. As seen from the table of contents, automotive security covers a wide variety of topics. In addition to being distributed through various technological fields, automotive cybersecurity is a recent and rapidly moving field, such that the selection of topics in this book is regarded as tentative solutions rather than a final word on what exactly constitutes automotive security. All of the authors have worked for many years in the area of embedded security and for a few years in the field of different aspects of automotive safety and security, both from a research and industry point of view.

Deflagration and Detonation Flame Arresters (Hardcover): S Grossel Deflagration and Detonation Flame Arresters (Hardcover)
S Grossel
R3,664 Discovery Miles 36 640 Ships in 18 - 22 working days

Designed for chemical engineers and other technical personnel involved in the design, operation, and maintenance of facilities and equipment where deflagration and detonation flame arresters (DDFAs) may be required, this book fosters effective application and operation of DDFAs through treatment of their principles of operation, selection, installation, and maintenance methods. This reference covers a broad range of issues concerning DDAs, including: An overview of deflagration and detonation prevention and protection practicesAn overview of combustion and flame propagation and how DDAs halt propagationDeflagration and detonation flame arrester technologyInstallation in process systemsRegulations, codes, and standardsIllustrative examples, calculations, and guidelines for DDA selectionAppendices, including a glossary, a flame arrester specification sheet for vendor quotation, and a listing of flame arrester manufacturers.

Advanced Technologies in Practical Applications for National Security (Hardcover, 1st ed. 2018): Aleksander Nawrat, Damian... Advanced Technologies in Practical Applications for National Security (Hardcover, 1st ed. 2018)
Aleksander Nawrat, Damian Bereska, Karol Jedrasiak
R5,101 Discovery Miles 51 010 Ships in 10 - 15 working days

This book presents advanced technologies used in practice to enable early recognition and tracking of various threats to national security. It discusses practical applications, examples and recent challenges in the application fields using sophisticated sensory devices, embedded designs and airborne and ground unmanned vehicles. Undeniably rapid advances in the development of sophisticated sensory devices, significant increases of computing power available to embedded designs and the development of airborne and ground unmanned vehicles offer almost unlimited possibilities for fighting various types of pathologies affecting our societies. The book provides scientists, researchers, engineers and graduate students involved in computer vision, image processing, data fusion, control algorithms, mechanics, data mining, navigation and integrated circuit (IC) with numerous valuable, useful and practical suggestions and solutions.

Active Interrogation in Nuclear Security - Science, Technology and Systems (Hardcover, 1st ed. 2018): Igor Jovanovic, Anna S.... Active Interrogation in Nuclear Security - Science, Technology and Systems (Hardcover, 1st ed. 2018)
Igor Jovanovic, Anna S. Erickson
R4,287 Discovery Miles 42 870 Ships in 18 - 22 working days

This volume constitutes the state-of-the-art in active interrogation, widely recognized as indispensable methods for addressing current and future nuclear security needs. Written by a leading group of science and technology experts, this comprehensive reference presents technologies and systems in the context of the fundamental physics challenges and practical requirements. It compares the features, limitations, technologies, and impact of passive and active measurement techniques; describes radiation sources for active interrogation including electron and ion accelerators, intense lasers, and radioisotope-based sources; and it describes radiation detectors used for active interrogation. Entire chapters are devoted to data acquisition and processing systems, modeling and simulation, data interpretation and algorithms, and a survey of working active measurement systems. Active Interrogation in Nuclear Security is structured to appeal to a range of audiences, including graduate students, active researchers in the field, and policy analysts. The first book devoted entirely to active interrogation Presents a focused review of the relevant physics Surveys available technology Analyzes scientific and technology trends Provides historical and policy context Igor Jovanovic is a Professor of Nuclear Engineering and Radiological Sciences at the University of Michigan and has previously also taught at Penn State University and Purdue University. He received his Ph.D. from University of California, Berkeley and worked as physicist at Lawrence Livermore National Laboratory. Dr. Jovanovic has made numerous contributions to the science and technology of radiation detection, as well as the radiation sources for use in active interrogation in nuclear security. He has taught numerous undergraduate and graduate courses in areas that include radiation detection, nuclear physics, and nuclear security. At University of Michigan Dr. Jovanovic is the director of Neutron Science Laboratory and is also associated with the Center for Ultrafast Optical Science. Anna Erickson is an Assistant Professor in the Nuclear and Radiological Engineering Program of the G.W. Woodruff School of Mechanical Engineering at Georgia Institute of Technology. Previously, she was a postdoctoral researcher in the Advanced Detectors Group at Lawrence Livermore National Laboratory. Dr. Erickson received her PhD from Massachusetts Institute of Technology with a focus on radiation detection for active interrogation applications. Her research interests focus on nuclear non-proliferation including antineutrino analysis and non-traditional detector design and characterization. She teaches courses in advanced experimental detection for reactor and nuclear nonproliferation applications, radiation dosimetry and fast reactor analysis.

Monte Carlo N-Particle Simulations for Nuclear Detection and Safeguards - An Examples-Based Guide for Students and... Monte Carlo N-Particle Simulations for Nuclear Detection and Safeguards - An Examples-Based Guide for Students and Practitioners (Hardcover, 1st ed. 2022)
John S. Hendricks, Martyn T. Swinhoe, Andrea Favalli
R1,557 Discovery Miles 15 570 Ships in 18 - 22 working days

This open access book is a pedagogical, examples-based guide to using the Monte Carlo N-Particle (MCNP (R)) code for nuclear safeguards and non-proliferation applications. The MCNP code, general-purpose software for particle transport simulations, is widely used in the field of nuclear safeguards and non-proliferation for numerous applications including detector design and calibration, and the study of scenarios such as measurement of fresh and spent fuel. This book fills a gap in the existing MCNP software literature by teaching MCNP software usage through detailed examples that were selected based on both student feedback and the real-world experience of the nuclear safeguards group at Los Alamos National Laboratory. MCNP input and output files are explained, and the technical details used in MCNP input file preparation are linked to the MCNP code manual. Benefiting from the authors' decades of experience in MCNP simulation, this book is essential reading for students, academic researchers, and practitioners whose work in nuclear physics or nuclear engineering is related to non-proliferation or nuclear safeguards. Each chapter comes with downloadable input files for the user to easily reproduce the examples in the text.

Security Issues in Mobile NFC Devices (Hardcover, 2015 ed.): Michael Roland Security Issues in Mobile NFC Devices (Hardcover, 2015 ed.)
Michael Roland
R3,298 Discovery Miles 32 980 Ships in 10 - 15 working days

This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with NFC tags and on card emulation. The current security architectures of NFC-enabled cellular phones are evaluated with regard to the identified security aspects.

Advanced Sensors for Safety and Security (Hardcover, 2013 ed.): Ashok Vaseashta, Surik Khudaverdyan Advanced Sensors for Safety and Security (Hardcover, 2013 ed.)
Ashok Vaseashta, Surik Khudaverdyan
R6,336 Discovery Miles 63 360 Ships in 18 - 22 working days

This book results from a NATO Advanced Research Workshop titled "Technological Innovations in CBRNE Sensing and Detection for Safety, Security, and Sustainability" held in Yerevan, Armenia in 2012. The objective was to discuss and exchange views as to how fusion of advanced technologies can lead to improved sensors/detectors in support of defense, security, and situational awareness. The chapters range from policy and implementation, advanced sensor platforms using stand-off (THz and optical) and point-contact methods for detection of chemical, nuclear, biological, nuclear and explosive agents and contaminants in water, to synthesis methods for several materials used for sensors. In view of asymmetric, kinetic, and distributed nature of threat vectors, an emphasis is placed to examine new generation of sensors/detectors that utilize an ecosystems of innovation and advanced sciences convergence in support of effective counter-measures against CBRNE threats. The book will be of considerable interest and value to those already pursuing or considering careers in the field of nanostructured materials, and sensing/detection of CBRNE agents and water-borne contaminants. For policy implementation and compliance standpoint, the book serves as a resource of several informative contributions. In general, it serves as a valuable source of information for those interested in how nanomaterials and nanotechnologies are advancing the field of sensing and detection using nexus of advanced technologies for scientists, technologists, policy makers, and soldiers and commanders.

Physically Unclonable Functions - Constructions, Properties and Applications (Hardcover, 2013 ed.): Roel Maes Physically Unclonable Functions - Constructions, Properties and Applications (Hardcover, 2013 ed.)
Roel Maes
R2,892 R1,855 Discovery Miles 18 550 Save R1,037 (36%) Ships in 10 - 15 working days

Physically unclonable functions (PUFs) are innovative physical security primitives that produce unclonable and inherent instance-specific measurements of physical objects; in many ways they are the inanimate equivalent of biometrics for human beings. Since they are able to securely generate and store secrets, they allow us to bootstrap the physical implementation of an information security system. In this book the author discusses PUFs in all their facets: the multitude of their physical constructions, the algorithmic and physical properties which describe them, and the techniques required to deploy them in security applications. The author first presents an extensive overview and classification of PUF constructions, with a focus on so-called intrinsic PUFs. He identifies subclasses, implementation properties, and design techniques used to amplify submicroscopic physical distinctions into observable digital response vectors. He lists the useful qualities attributed to PUFs and captures them in descriptive definitions, identifying the truly PUF-defining properties in the process, and he also presents the details of a formal framework for deploying PUFs and similar physical primitives in cryptographic reductions. The author then describes a silicon test platform carrying different intrinsic PUF structures which was used to objectively compare their reliability, uniqueness, and unpredictability based on experimental data. In the final chapters, the author explains techniques for PUF-based entity identification, entity authentication, and secure key generation. He proposes practical schemes that implement these techniques, and derives and calculates measures for assessing different PUF constructions in these applications based on the quality of their response statistics. Finally, he presents a fully functional prototype implementation of a PUF-based cryptographic key generator, demonstrating the full benefit of using PUFs and the efficiency of the processing techniques described. This is a suitable introduction and reference for security researchers and engineers, and graduate students in information security and cryptography.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Safety and Security Engineering VIII
M Guarascio, G. Passerini, … Hardcover R2,117 Discovery Miles 21 170
Home Security - Alarms, Sensors and…
Vivian Capel Paperback R1,286 Discovery Miles 12 860
Reforming Civil-Military Relations in…
Aurel Croissant, David Kuehn Hardcover R4,627 Discovery Miles 46 270
Enhancing CBRNE Safety & Security…
Andrea Malizia, Marco D'Arienzo Hardcover R2,728 Discovery Miles 27 280
Electronic Security Systems - Reducing…
Philip Walker Hardcover R1,992 Discovery Miles 19 920
Multimedia Forensics and Security…
Aboul Ella Hassanien, Mohamed Mostafa Fouad, … Hardcover R4,070 R3,539 Discovery Miles 35 390
Trusted Computing Platforms - TPM2.0 in…
Graeme Proudler, Liqun Chen, … Hardcover R4,853 Discovery Miles 48 530
Dynamics and Design of Space Nets for…
Leping Yang, Qingbin Zhang, … Hardcover R3,285 Discovery Miles 32 850
High-Security Mechanical Locks - An…
Graham Pulford Hardcover R2,131 Discovery Miles 21 310
Safety and Security Engineering IX
Giorgio Passerini, Fabio Farzia, … Hardcover R4,325 Discovery Miles 43 250

 

Partners