Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems
|
Buy Now
Surveillance in Action - Technologies for Civilian, Military and Cyber Surveillance (Hardcover, 1st ed. 2018)
Loot Price: R5,123
Discovery Miles 51 230
|
|
Surveillance in Action - Technologies for Civilian, Military and Cyber Surveillance (Hardcover, 1st ed. 2018)
Series: Advanced Sciences and Technologies for Security Applications
Expected to ship within 12 - 17 working days
|
This book addresses surveillance in action-related applications,
and presents novel research on military, civil and cyber
surveillance from an international team of experts. The first part
of the book, Surveillance of Human Features, reviews surveillance
systems that use biometric technologies. It discusses various novel
approaches to areas including gait recognition, face-based
physiology-assisted recognition, face recognition in the visible
and infrared bands, and cross-spectral iris recognition. The second
part of the book, Surveillance for Security and Defense, discusses
the ethical issues raised by the use of surveillance systems in the
name of combatting terrorism and ensuring security. It presents
different generations of satellite surveillance systems and
discusses the requirements for real-time satellite surveillance in
military contexts. In addition, it explores the new standards of
surveillance using unmanned air vehicles and drones, proposes
surveillance techniques for detecting stealth aircrafts and drones,
and highlights key techniques for maritime border surveillance,
bio-warfare and bio-terrorism detection. The last part of the book,
Cyber Surveillance, provides a review of data hiding techniques
that are used to hinder electronic surveillance. It subsequently
presents methods for collecting and analyzing information from
social media sites and discusses techniques for detecting internal
and external threats posed by various individuals (such as
spammers, cyber-criminals, suspicious users or extremists in
general). The book concludes by examining how high-performance
computing environments can be exploited by malicious users, and
what surveillance methods need to be put in place to protect these
valuable infrastructures. The book is primarily intended for
military and law enforcement personnel who use surveillance-related
technologies, as well as researchers, Master's and Ph.D. students
who are interested in learning about the latest advances in
military, civilian and cyber surveillance.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.