0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 15 of 15 matches in All Departments

Battle of Cognition - The Future Information-Rich Warfare and the Mind of the Commander (Hardcover): Alexander Kott Battle of Cognition - The Future Information-Rich Warfare and the Mind of the Commander (Hardcover)
Alexander Kott
R2,118 Discovery Miles 21 180 Ships in 10 - 15 working days

What if the true weak link of the Information Age force is not the hardware of machines, but the software of the human mind? And if so, could it be that the entire conceptual structure of the Information Revolution theorists, at least as it applies to military affairs, is built on sand, on the notorious fickleness of human cognition? These are the questions this book strives to examine. Looking at the command and control of information-rich warfare, the contributors explore its potential new processes, techniques, and organizational structures. As they do so, they find reasons for both optimism and concerns about the limitations of human cognition and supporting technologies in commanding battles in the Information Age. Since the beginning of the Information Revolution, the military in the United States and elsewhere has been analyzing and implementing the changes driven by the rapidly advancing information technologies. Among military theorists and practitioners, many focus on the Information Revolution's impact on matters of military equipment. Far fewer, however, seem to worry about the gray matter—the mind of the commander, the place where all the information power of the new age is supposed to converge and to yield its mighty dividends. Consider that it is the human mind, particularly the minds of military commanders and their staffs that remain the pinnacle and the ultimate consumer of the rapidly growing information flows. What if the true weak link of the Information Age force is not the hardware of machines, but the software of the human mind? And if so, could it be that the entire conceptual structure of the Information Revolution theorists, at least as it applies to military affairs, is built on sand, on the notorious fickleness of human cognition? These are the questions this book strives to examine. Looking at the command and control of information-rich warfare, the authors explore its potential new processes, techniques, and organizational structures. As they do so, they find reasons for both optimism and concerns about the limitations of human cognition and supporting technologies in commanding Information Age battles.

Cyber Resilience of Systems and Networks (Hardcover, 1st ed. 2019): Alexander Kott, Igor Linkov Cyber Resilience of Systems and Networks (Hardcover, 1st ed. 2019)
Alexander Kott, Igor Linkov
R5,206 Discovery Miles 52 060 Ships in 12 - 17 working days

This book introduces fundamental concepts of cyber resilience, drawing expertise from academia, industry, and government. Resilience is defined as the ability to recover from or easily adjust to shocks and stresses. Unlike the concept of security - which is often and incorrectly conflated with resilience -- resilience refers to the system's ability to recover or regenerate its performance after an unexpected impact produces a degradation in its performance. A clear understanding of distinction between security, risk and resilience is important for developing appropriate management of cyber threats. The book presents insightful discussion of the most current technical issues in cyber resilience, along with relevant methods and procedures. Practical aspects of current cyber resilience practices and techniques are described as they are now, and as they are likely to remain in the near term. The bulk of the material is presented in the book in a way that is easily accessible to non-specialists. Logical, consistent, and continuous discourse covering all key topics relevant to the field will be of use as teaching material as well as source of emerging scholarship in the field. A typical chapter provides introductory, tutorial-like material, detailed examples, in-depth elaboration of a selected technical approach, and a concise summary of key ideas.

Cybersecurity Systems for Human Cognition Augmentation (Hardcover, 2014 ed.): Robinson E. Pino, Alexander Kott, Michael... Cybersecurity Systems for Human Cognition Augmentation (Hardcover, 2014 ed.)
Robinson E. Pino, Alexander Kott, Michael Shevenell
R4,042 R3,371 Discovery Miles 33 710 Save R671 (17%) Ships in 12 - 17 working days

This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new technologies that will automate security procedures and perform autonomous functions with decision making capabilities. To maximize reader insight into the range of professions dealing with increased cybersecurity issues, this book presents work performed by government, industry, and academic research institutions working at the frontier of cybersecurity and network sciences. Cybersecurity Systems for Human Cognition Augmentation is designed as a reference for practitioners or government employees working in cybersecurity. Advanced-level students or researchers focused on computer engineering or neuroscience will also find this book a useful resource.

Cyber-security of SCADA and Other Industrial Control Systems (Hardcover, 1st ed. 2016): Edward J M Colbert, Alexander Kott Cyber-security of SCADA and Other Industrial Control Systems (Hardcover, 1st ed. 2016)
Edward J M Colbert, Alexander Kott
R3,730 R2,755 Discovery Miles 27 550 Save R975 (26%) Ships in 12 - 17 working days

This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.

Cyber Defense and Situational Awareness (Hardcover, 2014 ed.): Alexander Kott, Cliff Wang, Robert F. Erbacher Cyber Defense and Situational Awareness (Hardcover, 2014 ed.)
Alexander Kott, Cliff Wang, Robert F. Erbacher
R3,872 R3,506 Discovery Miles 35 060 Save R366 (9%) Ships in 12 - 17 working days

This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for this book. Situational awareness is exceptionally prominent in the field of cyber defense. It involves science, technology and practice of perception, comprehension and projection of events and entities in cyber space. Chapters discuss the difficulties of achieving cyber situational awareness - along with approaches to overcoming the difficulties - in the relatively young field of cyber defense where key phenomena are so unlike the more conventional physical world. Cyber Defense and Situational Awareness is designed as a reference for practitioners of cyber security and developers of technology solutions for cyber defenders. Advanced-level students and researchers focused on security of computer networks will also find this book a valuable resource.

Adversarial Reasoning - Computational Approaches to Reading the Opponent's Mind (Hardcover): Alexander Kott, William M... Adversarial Reasoning - Computational Approaches to Reading the Opponent's Mind (Hardcover)
Alexander Kott, William M McEneaney
R3,848 Discovery Miles 38 480 Ships in 12 - 17 working days

The rising tide of threats, from financial cybercrime to asymmetric military conflicts, demands greater sophistication in tools and techniques of law enforcement, commercial and domestic security professionals, and terrorism prevention. Concentrating on computational solutions to determine or anticipate an adversary's intent, Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind discusses the technologies for opponent strategy prediction, plan recognition, deception discovery and planning, and strategy formulation that not only applies to security issues but also to game industry and business transactions. Addressing a broad range of practical problems, including military planning and command, military and foreign intelligence, antiterrorism, network security, as well as simulation and training systems, this reference presents an overview of each problem and then explores various approaches and applications to understand the minds and negate the actions of your opponents. The techniques discussed originate from a variety of disciplines such as stochastic processes, artificial intelligence planning, cognitive modeling, robotics and agent theory, robust control, game theory, and machine learning, among others. The beginning chapters outline the key concepts related to discovering the opponent's intent and plans while the later chapters journey into mathematical methods for counterdeception. The final chapters employ a range of techniques, including reinforcement learning within a stochastic dynamic games context to devise strategies that combat opponents. By answering specific questions on how to create practical applications that require elements of adversarialreasoning while also exploring theoretical developments, Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind is beneficial for practitioners as well as researchers.

Estimating Impact - A Handbook of Computational Methods and Models for Anticipating Economic, Social, Political and Security... Estimating Impact - A Handbook of Computational Methods and Models for Anticipating Economic, Social, Political and Security Effects in International Interventions (Hardcover, Edition.)
Alexander Kott, Gary Citrenbaum
R4,447 Discovery Miles 44 470 Ships in 10 - 15 working days

Sociological theories of crime include: theories of strain blame crime on personal stressors; theories of social learning blame crime on its social rewards, and see crime more as an institution in conflict with other institutions rather than as in- vidual deviance; and theories of control look at crime as natural and rewarding, and explore the formation of institutions that control crime. Theorists of corruption generally agree that corruption is an expression of the Patron-Client relationship in which a person with access to resources trades resources with kin and members of the community in exchange for loyalty. Some approaches to modeling crime and corruption do not involve an explicit simulation: rule based systems; Bayesian networks; game theoretic approaches, often based on rational choice theory; and Neoclassical Econometrics, a rational choice-based approach. Simulation-based approaches take into account greater complexities of interacting parts of social phenomena. These include fuzzy cognitive maps and fuzzy rule sets that may incorporate feedback; and agent-based simulation, which can go a step farther by computing new social structures not previously identified in theory. The latter include cognitive agent models, in which agents learn how to perceive their en- ronment and act upon the perceptions of their individual experiences; and reactive agent simulation, which, while less capable than cognitive-agent simulation, is adequate for testing a policy's effects with existing societal structures. For example, NNL is a cognitive agent model based on the REPAST Simphony toolkit.

Cyber-security of SCADA and Other Industrial Control Systems (Paperback, Softcover reprint of the original 1st ed. 2016):... Cyber-security of SCADA and Other Industrial Control Systems (Paperback, Softcover reprint of the original 1st ed. 2016)
Edward J M Colbert, Alexander Kott
R5,451 Discovery Miles 54 510 Ships in 10 - 15 working days

This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.

Cyber Defense and Situational Awareness (Paperback, Softcover reprint of the original 1st ed. 2014): Alexander Kott, Cliff... Cyber Defense and Situational Awareness (Paperback, Softcover reprint of the original 1st ed. 2014)
Alexander Kott, Cliff Wang, Robert F. Erbacher
R2,564 Discovery Miles 25 640 Ships in 10 - 15 working days

This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for this book. Situational awareness is exceptionally prominent in the field of cyber defense. It involves science, technology and practice of perception, comprehension and projection of events and entities in cyber space. Chapters discuss the difficulties of achieving cyber situational awareness – along with approaches to overcoming the difficulties - in the relatively young field of cyber defense where key phenomena are so unlike the more conventional physical world. Cyber Defense and Situational Awareness is designed as a reference for practitioners of cyber security and developers of technology solutions for cyber defenders. Advanced-level students and researchers focused on security of computer networks will also find this book a valuable resource.

Cybersecurity Systems for Human Cognition Augmentation (Paperback, Softcover reprint of the original 1st ed. 2014): Robinson E.... Cybersecurity Systems for Human Cognition Augmentation (Paperback, Softcover reprint of the original 1st ed. 2014)
Robinson E. Pino, Alexander Kott, Michael Shevenell
R3,391 Discovery Miles 33 910 Ships in 10 - 15 working days

This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new technologies that will automate security procedures and perform autonomous functions with decision making capabilities. To maximize reader insight into the range of professions dealing with increased cybersecurity issues, this book presents work performed by government, industry, and academic research institutions working at the frontier of cybersecurity and network sciences. Cybersecurity Systems for Human Cognition Augmentation is designed as a reference for practitioners or government employees working in cybersecurity. Advanced-level students or researchers focused on computer engineering or neuroscience will also find this book a useful resource.

Estimating Impact - A Handbook of Computational Methods and Models for Anticipating Economic, Social, Political and Security... Estimating Impact - A Handbook of Computational Methods and Models for Anticipating Economic, Social, Political and Security Effects in International Interventions (Paperback, 2010 ed.)
Alexander Kott, Gary Citrenbaum
R4,253 Discovery Miles 42 530 Ships in 10 - 15 working days

Sociological theories of crime include: theories of strain blame crime on personal stressors; theories of social learning blame crime on its social rewards, and see crime more as an institution in conflict with other institutions rather than as in- vidual deviance; and theories of control look at crime as natural and rewarding, and explore the formation of institutions that control crime. Theorists of corruption generally agree that corruption is an expression of the Patron-Client relationship in which a person with access to resources trades resources with kin and members of the community in exchange for loyalty. Some approaches to modeling crime and corruption do not involve an explicit simulation: rule based systems; Bayesian networks; game theoretic approaches, often based on rational choice theory; and Neoclassical Econometrics, a rational choice-based approach. Simulation-based approaches take into account greater complexities of interacting parts of social phenomena. These include fuzzy cognitive maps and fuzzy rule sets that may incorporate feedback; and agent-based simulation, which can go a step farther by computing new social structures not previously identified in theory. The latter include cognitive agent models, in which agents learn how to perceive their en- ronment and act upon the perceptions of their individual experiences; and reactive agent simulation, which, while less capable than cognitive-agent simulation, is adequate for testing a policy's effects with existing societal structures. For example, NNL is a cognitive agent model based on the REPAST Simphony toolkit.

Autonomous Intelligent Cyber Defense Agent (AICA) - A Comprehensive Guide (1st ed. 2023): Alexander Kott Autonomous Intelligent Cyber Defense Agent (AICA) - A Comprehensive Guide (1st ed. 2023)
Alexander Kott
R3,862 Discovery Miles 38 620 Ships in 12 - 17 working days

This book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book discusses the current technical issues in autonomous cyber defense and offers information on practical design approaches. The material is presented in a way that is accessible to non-specialists, with tutorial information provided in the initial chapters and as needed throughout the book. The reader is provided with clear and comprehensive background and reference material for each aspect of AICA. Today’s cyber defense tools are mostly watchers. They are not active doers. They do little to plan and execute responses to attacks, and they don’t plan and execute recovery activities. Response and recovery – core elements of cyber resilience – are left to human cyber analysts, incident responders and system administrators. This is about to change. The authors advocate this vision, provide detailed guide to how such a vision can be realized in practice, and its current state of the art. This book also covers key topics relevant to the field, including functional requirements and alternative architectures of AICA, how it perceives and understands threats and the overall situation, how it plans and executes response and recovery, how it survives threats, and how human operators deploy and control AICA. Additionally, this book covers issues of testing, risk, and policy pertinent to AICA, and provides a roadmap towards future R&D in this field. This book targets researchers and advanced students in the field of cyber defense and resilience. Professionals working in this field as well as developers of practical products for cyber autonomy will also want to purchase this book.

Artificial Invention - Synthesis of Innovative Thermal Networks, Power Cycles, Process Flowsheets and Other Systems... Artificial Invention - Synthesis of Innovative Thermal Networks, Power Cycles, Process Flowsheets and Other Systems (Paperback)
Alexander Kott
R821 Discovery Miles 8 210 Ships in 10 - 15 working days

This dissertation proposes a computational technique for automated "invention" of conceptual schemes of thermal systems. The input provided to the automated problem solver is a description of the streams entering and leaving the system. The output is a network of elementary processes: compression, expansion, heating, cooling, and chemical processes. The problem solver seeks a network that is feasible, and offers an optimal (or at least favorable) combination of energy and capital costs. The synthesis process is modeled as a heuristic search conducted in a state-space of all possible design versions. The main ideas of the dissertation have been implemented in a computer program called TED, which invented a number of nontrivial schemes. TED starts with an initial state (or states), which may be either proposed by the user or generated automatically. TED evaluates each state using a special technique of exergy analysis applied to an infinitesimal temperature interval. This allows us to describe the thermal system by several integral characteristics which are functions of temperature. One particularly important integral characteristic - a measure of system's Second Law infeasibility - is introduced in this work; it allows a uniform treatment of both feasible and infeasible design states. TED then selects the most promising of the available designs. This selection is guided by a specialized search algorithm BP* which is shown to be probabilistically admissible. The results of the exergy analysis are used to perform a look-ahead evaluation of the design states. BP* also uses backpropagation of the state evaluation function to reduce the amount of backtracking. TED then improves the selecteddesign by applying one of the transforming operators and thereby generating a new design. Each transformation involves addition of an incremental network of thermal processes to the original state and reduces either irreversibility (exergy loss) or infeasibility of the thermal system. The application of the transformations is controlled by a heuristic move generation function that selects the most promising transformations. The new design is added to the database of the available design states. The search continues with these evaluate-select-transform iterations until an (approximately) optimal design is found.

Advanced Technology Concepts for Command and Control (Paperback): Alexander Kott Advanced Technology Concepts for Command and Control (Paperback)
Alexander Kott
R669 R604 Discovery Miles 6 040 Save R65 (10%) Ships in 10 - 15 working days
A Wedding in Darkness - One life in the twilight of Russian Jewish history (Paperback): Alexander Kott A Wedding in Darkness - One life in the twilight of Russian Jewish history (Paperback)
Alexander Kott; As told to Elisheva Kott
R405 R343 Discovery Miles 3 430 Save R62 (15%) Ships in 10 - 15 working days

Within merely a few decades after the Russian Revolution, the mighty Russian Jewish community, world-largest and millennium-old, turned into a faint shadow of itself. Never before had world Jewry experienced such a rapid, catastrophic collapse of such an immense and long-established community. Never before had so many young Jews rushed so eagerly after false prophets-in this case Communist ideologues

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bosch GBM 320 Professional Drill…
R779 R728 Discovery Miles 7 280
Mountain Backgammon - The Classic Game…
Lily Dyu R575 R460 Discovery Miles 4 600
Merry Christmas
Mariah Carey CD R118 R108 Discovery Miles 1 080
Generic Pantum PC210 Compatible Toner…
R610 R200 Discovery Miles 2 000
Too Much And Never Enough - How My…
Mary L. Trump Hardcover R891 Discovery Miles 8 910
Gloria
Sam Smith CD R187 R177 Discovery Miles 1 770
Konix Naruto Gamepad for Nintendo Switch…
R699 R599 Discovery Miles 5 990
Herontdek Jou Selfvertroue - Sewe Stappe…
Rolene Strauss Paperback  (1)
R330 R284 Discovery Miles 2 840
Butterfly A4 80gsm Paper Pad - Black (50…
R51 Discovery Miles 510
Mellerware Swiss - Plastic Floor Fan…
R371 Discovery Miles 3 710

 

Partners