Udvidet returret til d. 31. januar 2025

Bøger i Advanced Sciences and Technologies for Security Applications serien

Filter
Filter
Sorter efterSorter Serie rækkefølge
  • af Hamid Jahankhani, Shaun Lawson & Arshad Jamal
    587,95 kr.

  • af Anthony J. Masys
    1.679,95 kr.

  • af Carmen Maftei & Ashok Vaseashta
    1.718,95 kr.

  • af Margaret E. Kosal
    1.584,95 kr.

  • af Babak Akhgar, Hamid Jahankhani & Stefan Kendzierskyj
    1.212,95 kr.

  • af Cindy Vestergaard
    1.375,95 kr.

  • af Hamid Jahankhani & Reza Montasari
    1.970,95 kr.

  • af Hamid Jahankhani, Reza Montasari & Haider Al-Khateeb
    1.778,95 kr.

  • af Anna Visvizi & Marek Bodziany
    1.771,95 kr.

  •  
    1.381,95 kr.

    Chapter "Predictive Policing in 2025: A Scenario" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

  •  
    1.687,95 kr.

    This is a critical analytical and leadership requirement in this age of volatility, uncertainty, complexity and ambiguity that characterizes the security landscape.This book is useful for academics, graduate students in global security, and government and security planning practitioners.

  • af Yair Sharan, Ted J. Gordon & Elizabeth Florescu
    1.384,95 - 1.393,95 kr.

  • af Stanislav Abaimov
    1.395,95 kr.

    The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through its own imperfections and vulnerabilities. Moreover, quantum computers are further pushing the boundaries of what is possible, by making machine learning cyber agents faster and smarter.With the abundance of often-confusing information and lack of trust in the diverse applications of AI-based technologies, it is essential to have a book that can explain, from a cyber security standpoint, why and at what stage the emerging, powerful technology of machine learning can and should be mistrusted, and how to benefit from it while avoiding potentially disastrous consequences. In addition, this book sheds light on another highly sensitive area ΓÇô the application of machine learning for offensive purposes, an aspect that is widely misunderstood, under-represented in the academic literature and requires immediate expert attention.

  • af Malcolm R. Dando
    1.963,95 - 1.972,95 kr.

  • - Lost in Transition and Transformation
    af Lindy Heinecken
    1.099,95 - 1.102,95 kr.

  •  
    1.403,95 kr.

    With our highly connected and interdependent world, the growing threat of infectious diseases and public health crisis has shed light on the requirement for global efforts to manage and combat highly pathogenic infectious diseases and other public health crisis on an unprecedented level.

  • af Stefan Rass, Quanyan Zhu, Sandra Koenig & mfl.
    1.650,95 - 1.970,95 kr.

  • af Ritu Gill
    903,95 - 1.201,95 kr.

    The COVID-19 pandemic is not only a threat to our health and economy, but also has strong implications for defence and security. Indeed, defence leaders have highlighted a second fight surrounding the spread of COVID-19, namely disinformation and preparing to face adversaries willing to exploit the public health crisis for nefarious purposes. The current pandemic is a breeding ground for the propagation of disinformation, as it represents the first major global health event in which large social media platforms have become the main distributor of information. This multi-national edited volume consists of contributions from Defence Science, academia and industry, including NATO Headquarters, United States, Netherlands, Singapore, United Kingdom and Norway. The content is aimed at a diverse audience, including NATO members, researchers from defence and security organizations, academics, and militaries including analysts and practitioners, as well as policy makers. This volume focuses on various aspects of COVID-19 disinformation, including identifying global dominant disinformation narratives and the methods used to spread disinformation, examining COVID-19 disinformation within the broader context of the cognitive domain, examining the psychological effects of COVID-19 disinformation and COVID-19 disinformation on instant messaging platforms, along with examining various countermeasures to disinformation.

  • af Hamid Jahankhani
    1.681,95 - 1.691,95 kr.

    This book aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst performing business activities.  Furthermore, this book looks to investigate the interactions from both the organization strategy including the cross-functional actors/stakeholders whom are operating within the organization and the various characteristics of operating in a cyber secure ecosystem.The book provides a valuable reference for IT directors, strategic leaders, cybersecurity experts, network security professionals. It is also aimed at researchers seeking to obtain a more profound knowledge of machine learning and deep learning in the context of cybersecurity. Furthermore, the book is an exceptional advanced text for Ph.D. and master's degree programs in cybersecurity, network security and computer science. Each chapter is written by an internationally renowned expert who has extensive experience in law enforcement, industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.

  • af Richard Jiang
    1.097,95 - 1.107,95 kr.

    This book highlights recent advances in smart cities technologies, with a focus on new technologies such as biometrics, blockchains, data encryption, data mining, machine learning, deep learning, cloud security, and mobile security.  During the past five years, digital cities have been emerging as a technology reality that will come to dominate the usual life of people, in either developed or developing countries. Particularly, with big data issues from smart cities, privacy and security have been a widely concerned matter due to its relevance and sensitivity extensively present in cybersecurity, healthcare, medical service, e-commercial, e-governance, mobile banking, e-finance, digital twins, and so on. These new topics rises up with the era of smart cities and mostly associate with public sectors, which are vital to the modern life of people. This volume summarizes the recent advances in addressing the challenges on big data privacy and security in smart cities and points out the future research direction around this new challenging topic.

  • af Gitanjali Adlakha-Hutcheon
    1.102,95 - 1.111,95 kr.

    This book explores types of disruptions in defence and security, ways to assess disruptions triggered by technological advancements or the lack of legal frameworks; the consequent delays or disruptions to making decisions, creative idea generation and finally the innovative pathways to counter such disruptions. What do disruption, ideation and innovation have in common? How do disruptions, ideas and innovation coexist within defence and security? They all influence and impact decision-making. Disruptions drive decision-making. Ideation raises solutions to resolve the disruptions and innovation brings ideas into life. While disruptions may be common place in the business world, where disruptive technologies displace pre-existing ones; they are less prevalent in defence, even less so within the realm of security. For the last 10 years, there has been talk of disruptive technologies and even adoption of terms such as emerging and disruptive technologies by the largest military alliance-NATO, yet the means to assess these remain elusive. It offers researchers opportunities to assess different types of disruptions, ideate and innovate on scientific grounds to counter disruptions, thereby bolstering the defence and security community's ability to make decisions better.

  • af Carl S. Young
    1.960,95 - 1.969,95 kr.

    This book tackles the problem of complexity within IT environments, i.e., "e;Cybercomplexity,"e; which is generally recognized as a principal source of cybersecurity risk. The book first defines complexity and simplifies its analysis by assuming a probabilistic approach to security risk management. It then proposes a simple model of cybercomplexity that is based on Shannon entropy, a basic concept in information theory. The key drivers of cybercomplexity emerge from this model, where these drivers reveal the scale-dependence of cybersecurity risk and explain why macroscopic security controls are required to address cybersecurity risk on an enterprise scale. The significant operational implications of cybercomplexity are also discussed, thereby providing both a theoretical framework and a practical guide to addressing this longstanding problem in cybersecurity risk management.        

  • af Sonny S. Patel
    1.093,95 - 1.102,95 kr.

    This book addresses the operationalization of community resilience in the United Kingdom (UK) in connection with severe floods. Written for early academic professionals, students, and community practitioners, it investigates the educational and practical meaning and application of community resilience using a UK-centric local-level case study. Exploring the perceptions of both those who have been affected by a natural hazard and those who have not, the book reveals how trust, community resources, and neighborhood security can offer effective ways of bringing communities together after a natural hazard.The author introduces the topic of community resilience as it applies to disasters in Chapter 1 and its implications for securing and improving the wellbeing of disaster-affected communities in Chapters 2 and 3. In Chapter 4, the lessons learned contributing to the available information and research on community resilience are reviewed. Finally, the author offers recommendations and outlines future directions in coping with the uncertainty and insecurity caused by natural hazards in Chapter 5.

  • af Christopher Nelson
    659,95 - 909,95 kr.

    This book addresses ways that governments, international organizations, and other stakeholders can utilize data to uncover illicit trade in materials and equipment that could be used to support chemical, biological, nuclear, and advanced conventional weapons systems. Key concepts of strategic trade are introduced, including examples of strategic goods and their potential uses in weapons of mass destruction (WMDs) and weapons systems, the interplay between the Harmonized System and strategic trade control regimes, and the data available for analysis in the field. Innovative, yet practical methodologies to analyze strategic trade cover the use of crime scripts, risk assessment indicators, mirror statistics, market share analysis, and transshipment and re-export analysis.There are also chapters on leading-edge techniques involving machine learning and network analysis that have shown promise in other areas of crime and illicit trade investigations. Each chapter provides step-by-step instructions on applying the technique, numerous case studies and examples, and discussions of the strengths and weaknesses of each approach. This volume is designed to provide all types of analysts with practical pathways for understanding, detecting, and disrupting illicit procurement of materials and equipment needed to produce WMDs and advanced weapons.

  • af Maurizio Martellini & Stanislav Abaimov
    1.000,95 kr.

  • af Igor Khripunov
    1.585,95 kr.

    This book attempts to look into the genesis of security culture as a concept which emerged with the recognition of the role of the human factor in the context of security. It traces the rapid evolution of security culture into a multi-functional discipline reinforced by supplementary tools such as assessment and enhancement methodologies, reviews practical steps to harmonize nuclear safety and security culture as well as recommends its practical application to address insider threats and their consequences. In addition, it demonstrates how to tailor the generic model of nuclear security culture to meet specific needs of diverse facilities and activities in different countries. Finally, the book discusses several challenges which need to be addressed to make security culture a user-friendly, universal, and sustainable instrument to turn the perception of the human factor as a liability into an asset of nuclear security.

  • af Anthony J. Masys
    1.301,95 kr.

    Global security threats have created a complex risk landscape that is challenging and transforming society. These global security issues intersect and influence the political, economic, social, technological, ecological and legal dimensions of the complex risk landscape and are now transborder thereby becoming national security issues. Accessing the innovation space to support safety, security and defence capabilities is critical in order to mitigate new and evolving threats.Through real-world examples of innovation, this book provides a detailed examination of the innovation space as it pertains to the application of S&T to safety and security threats and challenges. This book is of most interest to public and private sector innovators as well as academician and graduate students working in the safety and security domain.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.