Udvidet returret til d. 31. januar 2025

Tyverialarmer og brandalarmer

Her finder du spændende bøger om Tyverialarmer og brandalarmer. Nedenfor er et flot udvalg af over 106 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Simon Chavez
    207,95 kr.

    In a world where security concerns are becoming increasingly complex, ensuring the safety of your home and family has never been more crucial. "Home and Family Defense" is a comprehensive guide that empowers you with the knowledge and tools to create a secure haven for your family.Inside this book, you will find:Threat Assessment: Learn how to assess potential risks and vulnerabilities specific to your location and circumstances.Fortifying Your Home: Discover expert tips for fortifying your home against intruders, including practical advice on locks, doors, windows, and landscaping.Smart Home Security: Explore the latest advancements in smart technology and how they can enhance your home's security.Emergency Preparedness: Gain essential insights into creating a family emergency plan, stocking provisions, and handling crisis situations.Effective Communication: Understand the importance of clear communication within your family during emergencies and how it can mitigate panic.Self-Defense Techniques: Acquire basic self-defense skills that can be crucial in protecting yourself and your loved ones.Cybersecurity at Home: Learn about the potential cyber threats that can compromise your family's privacy and how to secure your digital presence.Child Safety: Get guidance on teaching your children about personal safety and establishing boundaries without causing unnecessary fear.Community Engagement: Discover how fostering strong relationships with neighbors and community members can contribute to a safer environment."Home and Family Defense" goes beyond the basics, providing you with a comprehensive roadmap to create a well-protected home and a united family, ready to face any challenges that may arise. Whether you're a new homeowner or someone looking to bolster their security measures, this book is an indispensable resource for safeguarding what matters most. Your home is your haven; let this guide help you make it a safe one.

  • af Tünde Anna Kovács
    853,95 - 1.117,95 kr.

    This book collects the latest research results on security-related advanced technologies. The chapters contain relevant and interesting topics from numerous research. Data science and artificial intelligence research nowadays one of the most important topics for the industry and the security sectors. The autonomy and counter-autonomy research topic are also very interesting. Autonomous cars have become a part of the common days, but their safe and secure application is not assured. The research results in this field want to support and assure safe and secure autonomous applications in our quotidian life. Also, the safe and secure robotics in the industries and the defence assure a high standard of living and the given research results in this area can use to increase it. The researchers work on it and publish the results that can be interesting for the other researchers and the innovators, but also the industrial part members. The researchers work on it and publish the results that can be interesting for the other researchers and the innovators, but also the industrial part members. Communication is a part of our life, but the communication systems mesh all around the world. Communication is the basis of modern life because without it life stop. One other interesting and very important research area is the material sciences. Virtual life cannot exist without hardware and materials. The new technical applications require new materials, that can suffice the mechanical and physical, chemical properties demand. Nowadays a common requirement of the materials the high strength and lightweight. Researchers want to serve the industrial requests and innovate new composite materials or increase the properties of the material through a new technological process. The authors publish the latest results of the security-related research area including the newest innovations and technologies which rise the interest of the defence and the modern industries even the interest of other researchers.

  • af Masoud Abbaszadeh
    1.976,95 - 1.986,95 kr.

    This book discusses the latest advances in cyber-physical security and resilience of cyber-physical systems, including cyber-attack detection, isolation, situation awareness, resilient estimation and resilient control under attack. It presents both theoretical results and important applications of the methods.Security and Resilience in Cyber-Physical Systems begins by introducing the topic of cyber-physical security, covering state-of-the-art trends in both theory and applications, as well as some of the emerging methodologies and future directions for research. It then moves on to detail theoretical methods of attack detection, resilient estimation and control within cyber-physical systems, before discussing their various applications, such as power generation and distribution, autonomous systems, wireless communication networks and chemical plants.Focusing on the detection of and accommodation to cyber-attacks on cyber-physical systems, and including both estimation and artificial-intelligence-based methods, this book will be of interest to researchers, engineers and graduate students within the fields of cyber-physical security and resilient control.

  • af Carl S. Young
    1.960,95 - 1.969,95 kr.

    This book tackles the problem of complexity within IT environments, i.e., "e;Cybercomplexity,"e; which is generally recognized as a principal source of cybersecurity risk. The book first defines complexity and simplifies its analysis by assuming a probabilistic approach to security risk management. It then proposes a simple model of cybercomplexity that is based on Shannon entropy, a basic concept in information theory. The key drivers of cybercomplexity emerge from this model, where these drivers reveal the scale-dependence of cybersecurity risk and explain why macroscopic security controls are required to address cybersecurity risk on an enterprise scale. The significant operational implications of cybercomplexity are also discussed, thereby providing both a theoretical framework and a practical guide to addressing this longstanding problem in cybersecurity risk management.        

  • af Ngoc Le Anh
    2.447,95 - 3.265,95 kr.

    This book presents Proceedings of the International Conference on Intelligent Systems and Networks (ICISN 2022), held at Hanoi in Vietnam. It includes peer reviewed high quality articles on Intelligent System and Networks. It brings together professionals and researchers in the area and presents a platform for exchange of ideas and to foster future collaboration. The topics covered in this book include- Foundations of Computer Science; Computational Intelligence Language and speech processing; Software Engineering Software development methods; Wireless Communications Signal Processing for Communications; Electronics track IoT and Sensor Systems Embedded Systems; etc.

  • af Dmitry Chernov, Didier Sornette, Ali Ayoub & mfl.
    532,95 - 637,95 kr.

  • af Lars Schnieder
    194,95 kr.

    What¿s not secure is not safe ¿ damit die Funktionale Sicherheit von Kraftfahrzeugen nicht durch unberechtigte Zugriffe von außen kompromittiert wird, sind besondere Schutzmaßnahmen erforderlich. Dieses essential verdeutlicht anhand konkreter Beispiele, wie die Angriffssicherheit von Automotive-Systemen von vornherein durch eine zielorientierte Systemgestaltung und -implementierung sowie Tests berücksichtigt wird. Mit Blick auf die Produktion und den Betrieb von Automotive-Systemen wird deutlich, dass die Absicherung gegen unberechtigten Zugriff nicht mit dem Abschluss der Entwicklung endet. Sie ist eine kontinuierlich über den Lebenszyklus fortlaufende Aktivität und erfordert eine nachhaltige Aufmerksamkeit aller beteiligten Zulieferer, des Fahrzeugherstellers sowie des Nutzers. Die vorliegende zweite Auflage beinhaltet eine Anpassung an die fortgeschrittene internationale Normung im Bereich der Automotive Cybersecurity.

  • af Peter Müller, Adrian Perrig, David Basin, mfl.
    1.037,95 - 1.432,95 kr.

  • af Paul Arthur Berkman
    1.310,95 - 1.313,95 kr.

    This book contains an inclusive compilation of perspectives about the Arctic Ocean with contributions that extend from Indigenous residents and early career scientists to Foreign Ministers, involving perspectives across the spectrum of subnational-national-international jurisdictions.  The Arctic Ocean is being transformed with global climate warming into a seasonally ice-free sea, creating challenges as well as opportunities that operate short-to-long term, underscoring the necessity to make informed decisions across a continuum of urgencies from security to sustainability time scales.   The Arctic Ocean offers a case study with lessons that are especially profound at this moment when humankind is exposed to a pandemic, awakening a common interest in survival across our globally-interconnected civilization unlike any period since the Second World War.  This second volume in the Informed Decisionmaking for Sustainability series reveals that building global inclusion involves common interests to address changes effectively "e;for the benefit of all on Earth across generations."e;

  • af Nils Wisiol
    1.385,95 kr.

    This book studies the security of Physical Unclonable Functions (PUFs) based on the Arbiter PUF design, with a focus on so-called modeling attacks. The author shows the insecurity of several designs and proposes a novel construction that is proven to be immune against attacks known in scientific literature. The book explores designs of variants and compositions of the Arbiter PUF, which was introduced as a CMOS-compatible, electrical PUF design, and has received a lot of research attention, albeit being insecure with respect to modeling attacks. After revisiting modeling attacks on the Arbiter PUF and XOR Arbiter PUF, the author demonstrates attacks against the Lightweight Secure XOR Arbiter PUF, Feed-Forward Arbiter PUF, and the Interpose PUF. He then introduces two novel PUF designs, the Beli PUF and the LP-PUF, and analyzes their security against modeling attacks. The book concludes by showing how the LP-PUF is resilient against currently known modeling attacks.

  • af Anthony Masys
    1.414,95 kr.

    Lessons Learned from Afghanistan: Americäs Longest War examines the lessons of how Americäs ¿longest war¿ came to an ignominious end with staggering consequences for the United States and the Afghan nation. Afghanistan today faces an unprecedented humanitarian crisis, looming threat of a civil war and a resurgence of violent extremism organizations similar to pre-9/11. As the U.S. enters a new era in the strategic geopolitical Great Power Competition, an analysis of the original mission intent, shifting policy and strategic objectives, and ineffective implementation of security, political and economic programs reveal critical lessons and questions such as: What led to the ¿strategic failure¿ of the U.S. in Afghanistan? What decisions resulted in the present-day humanitarian, civil, and political crises in Afghanistan? Were these consequences in fact avoidable? Was there an alternative approach that could have maintained the hard-fought gains of the last two decades, and better demonstrated America's standing as a defender of global human rights?Lessons Learned from Afghanistan: Americäs Longest War further explores lessons of the past negotiations between the United States, Taliban, and former U.S. backed Afghan government to suggest alternative pathways that honor the original intent of the mission and meet present-day obligations to an Afghan nation in crisis.

  • af Junqiu Li
    1.780,95 - 1.789,95 kr.

    This book focuses on the thermal management technology of lithium-ion batteries for vehicles. It introduces the charging and discharging temperature characteristics of lithium-ion batteries for vehicles, the method for modeling heat generation of lithium-ion batteries, experimental research and simulation on air-cooled and liquid-cooled heat dissipation of lithium-ion batteries, lithium-ion battery heating method based on PTC and wide-line metal film, self-heating using sinusoidal alternating current. This book is mainly for practitioners in the new energy vehicle industry, and it is suitable for reading and reference by researchers and engineering technicians in related fields such as new energy vehicles, thermal management and batteries. It can also be used as a reference book for undergraduates and graduate students in energy and power, electric vehicles, batteries and other related majors.

  • af Paul Haskell-Dowland
    1.971,95 kr.

    Ensuring cybersecurity for smart cities is crucial for a sustainable cyber ecosystem. Given the undeniable complexity of smart cities, fundamental issues such as device configurations and software updates should be addressed when it is most needed to fight cyber-crime and ensure data privacy.This book addresses the cybersecurity challenges associated with smart cities, aiming to provide a bigger picture of the concepts, intelligent techniques, practices and research directions in this area. Furthermore, this book serves as a single source of reference for acquiring knowledge on the technology, processes and people involved in the next-generation of cyber-smart cities.

  • af Jonatan Echebarria Fernandez, Tafsir Matin Johansson, Dimitrios Dalaklis, mfl.
    1.405,95 kr.

    This book provides a comprehensive overview of smart ports and remote technologies in the maritime industry. It demonstrates how modern advances in artificial intelligence and robotics have transformed the shipping industry, and assesses the impact of this technology from a law and governance standpoint. The book covers a range of topics including port autonomous operations systems, cybersecurity, big data analytics, digitalization and blockchain to throw light on the opportunities and benefits of these new technologies in improving security and safety. It also considers the challenges and threats of their application. It concludes by examining the trajectory of national and international regulatory developments. The book will appeal to scholars and students of maritime technology, law and governance, as well as practitioners and policymakers.Chapters 8, 19 and 20 are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

  • af Clay Escobedo Olsen
    244,95 kr.

    This book will take you on a revealing journey.Why do we believe that an armed stranger is our main threat when we are twice as likely to die from a traffic accident or fall? Sadly, violent crime victims are often injured by people they know who hurt them at or near the victim's home, according to violent crime statistics.The author, Clay Escobedo Olsen, uses crime statistics from verifiable sources and fictional stories, called "Storytime," to guide the reader in exploring these ideas on survival and defense. He exposes "uncomfortable truths" when the analysis goes against prevailing wisdom, such as the stranger-danger example above.For self-defense, guns are not the only or even the best option. For many civilians, carrying a firearm concealed for protection can be more harmful than beneficial. Holistic self-defense takes into account the benefits and possible harms of various self-defense techniques and shows you how to analyze them yourself to create the right strategy for your unique situation. You will learn that and much more.¿Why we believe what we do about violent crime¿What crimes are rare, and what crimes are more common¿Is the concealed carry of a firearm the only self-defense method?¿How can we reduce our chances of becoming a victim of crime?¿De-escalation techniques for out of control encounters¿How to tell if someone you know may victimize you¿How to defend your home and protect your valuables¿Which home defense hacks will make you safer and which may endanger yourself or your family¿How to safely interact with law enforcement¿Possible legal ramifications of defending yourself¿How to do your own research If you are considering how to better defend your home and how to defend your family inside and outside the home, Beyond Weapons-A Holistic Guide to Self-Defense will instruct you in making solid, data based decisions on how best to accomplish your goal of keeping those you love safe from violent crime.

  • af Clay Escobedo Olsen
    192,95 kr.

    This book will take you on a revealing journey.Why do we believe that an armed stranger is our main threat when we are twice as likely to die from a traffic accident or fall? Sadly, violent crime victims are often injured by people they know who hurt them at or near the victim's home, according to violent crime statistics.The author, Clay Escobedo Olsen, uses crime statistics from verifiable sources and fictional stories, called "Storytime," to guide the reader in exploring these ideas on survival and defense. He exposes "uncomfortable truths" when the analysis goes against prevailing wisdom, such as the stranger-danger example above.For self-defense, guns are not the only or even the best option. For many civilians, carrying a firearm concealed for protection can be more harmful than beneficial. Holistic self-defense takes into account the benefits and possible harms of various self-defense techniques and shows you how to analyze them yourself to create the right strategy for your unique situation. You will learn that and much more.¿Why we believe what we do about violent crime¿What crimes are rare, and what crimes are more common¿Is the concealed carry of a firearm the only self-defense method?¿How can we reduce our chances of becoming a victim of crime?¿De-escalation techniques for out of control encounters¿How to tell if someone you know may victimize you¿How to defend your home and protect your valuables¿Which home defense hacks will make you safer and which may endanger yourself or your family¿How to safely interact with law enforcement¿Possible legal ramifications of defending yourself¿How to do your own research If you are considering how to better defend your home and how to defend your family inside and outside the home, Beyond Weapons-A Holistic Guide to Self-Defense will instruct you in making solid, data based decisions on how best to accomplish your goal of keeping those you love safe from violent crime.

  • af Anthony J. Masys
    1.301,95 kr.

    Global security threats have created a complex risk landscape that is challenging and transforming society. These global security issues intersect and influence the political, economic, social, technological, ecological and legal dimensions of the complex risk landscape and are now transborder thereby becoming national security issues. Accessing the innovation space to support safety, security and defence capabilities is critical in order to mitigate new and evolving threats.Through real-world examples of innovation, this book provides a detailed examination of the innovation space as it pertains to the application of S&T to safety and security threats and challenges. This book is of most interest to public and private sector innovators as well as academician and graduate students working in the safety and security domain.

  • af Jianwei Liu
    2.182,95 kr.

    This book focuses on security science and technology, data and information security, and mobile and network security for space-air-ground integrated networks (SAGINs). SAGIN are expected to play an increasingly important role in providing real-time, flexible, and integrated communication and data transmission services in an efficient manner. Today, SAGINs have been widely developed for a range of applications in navigation, environmental monitoring, traffic management, counter-terrorism, etc. However, security becomes a major concern, since the satellites, spacecrafts, and aircrafts are susceptible to a variety of traditional/specific network-based attacks, including eavesdropping, session hijacking, and illegal access.In this book, we review the theoretical foundations of SAGIN security. We also address a range of related security threats and provide cutting-edge solutions in the aspect of ground network security, airborne network security, space network security, and provide future trends in SAGIN security. The book goes from an introduction to the topic¿s background, to a description of the basic theory, and then to cutting-edge technologies, making it suitable for readers at all levels including professional researchers and beginners. To gain the most from the book, readers should have taken prior courses in information theory, cryptography, network security, etc.

  • af Igor Khripunov
    1.585,95 kr.

    This book attempts to look into the genesis of security culture as a concept which emerged with the recognition of the role of the human factor in the context of security. It traces the rapid evolution of security culture into a multi-functional discipline reinforced by supplementary tools such as assessment and enhancement methodologies, reviews practical steps to harmonize nuclear safety and security culture as well as recommends its practical application to address insider threats and their consequences. In addition, it demonstrates how to tailor the generic model of nuclear security culture to meet specific needs of diverse facilities and activities in different countries. Finally, the book discusses several challenges which need to be addressed to make security culture a user-friendly, universal, and sustainable instrument to turn the perception of the human factor as a liability into an asset of nuclear security.

  • af Stephen B. Leatherman
    537,95 kr.

    Aquatic Accidents is a uniquely comprehensive book analyzing the full range of water-based accidents in both the natural environment (e.g., oceans, lakes and rivers) and built facilities (e.g., swimming pools, waterparks, and spas). People are naturally drawn to the water, from back-yard swimming pools to the number one tourist destination, the beach. Accidents are far too common, and most are preventable with foresight provided by this book. The various water activities discussed in Aquatic Accidents cause needless injuries and even death. This book gives you the tools to identify these hazards and initiate actions to save lives. Aquatic Accidents is especially useful for property owners with aquatic environments, parks and recreation professionals and accident/injury attorneys. Features in this book include: The most effective ways to prevent drowningHow to recognize a drowning victim Diving - a major cause of spinal cord injuries Rip currents - the greatest beach hazard Swimming pool, waterpark, and spa accident prevention Snorkeling, scuba diving, and boating safety Lake and river danger recognition and avoidance

  • af Anthony Masys
    1.297,95 kr.

    Even before the outbreak of the COVID-19 pandemic, the Central Region faced numerous obstacles to building a stable and prosperous future. The region, which encompasses the Middle East, the Horn of Africa, Central Asia, and South Asia, has been plagued by economic and political uncertainty amidst dramatic shifts in the global power structure. With the pandemic now exacerbating the volatility in this already fragile region, the U.S.'s strategic objectives are rife for re-examination.A complicated stew of factors such as weakening of established governance systems, the emboldening of extremist individuals and groups through advances in digital technology, the humanitarian crises in Afghanistan and Syria, and the intensification of the great power competition with China and Russia are creating a fertile environment for the growth of violent extremist organizations (VEOs). Such organizations take advantage of vulnerable, aggrieved, and traumatized populations to fuel radicalization, recruitment, and unrest, which further undermine stability and the potential for peace and prosperity.While it is still early to fully understand how the ongoing response to the COVID-19 pandemic will impact U.S. policy, this book provides a timely analysis of relevant dynamics such as popular radicalization, digital information ecosystems, networks of influence, and new capabilities to recognize and prepare for other such black swan events in the region.

  • af Maurizio Martellini & Stanislav Abaimov
    1.000,95 kr.

  • af Hideaki Ishii
    1.405,95 - 1.963,95 kr.

    This book comprises a set of chapters that introduce various topics pertinent to novel approaches towards enhancing cyber-physical measures for increased security and resilience levels in control systems. The unifying theme of these approaches lies in the utilization of knowledge and models of the physical systems, rather than an attempt to reinvigorate conventional IT-based security measures.The contributing authors present perspectives on network security, game theory, and control, as well as views on how these disciplines can be combined to design resilient, safe, and secure control systems. The book explores how attacks in different forms, such as false data injections and denial-of-service can be very harmful, and may not be detected unless the security measures exploit the physical models.  Several applications are discussed, power systems being considered most thoroughly. Because of its interdisciplinary nature-techniques from systems control, game theory, signal processing and computer science all make contributions-Security and Resilience of Control Systems will be of interest to academics, practitioners and graduate students with a broad spectrum of interests.

  • af Wei Dai, Kristin Lauter & Kim Laine
    1.189,95 kr.

  • af Eva Moehlecke de Baseggio¿
    761,95 kr.

    Soziale Medien haben die Kommunikation und Interaktion in der heutigen Gesellschaft grundlegend verändert. Sie werden nicht nur von Privatpersonen genutzt, sondern sind auch in Organisationen des öffentlichen Sektors wie den Streitkräften allgegenwärtig.Dieses Buch untersucht die Chancen und Risiken von Social Media im Kontext der Streitkräfte aus einer internationalen, sozialwissenschaftlichen Perspektive. Es erörtert die Auswirkungen sozialer Medien auf den Alltag von Militärangehörigen und analysiert, inwieweit soziale Medien deren Leistung beeinflussen, sei es als Ablenkung oder als Quelle wahrgenommener Wertschätzung. Sie beleuchtet insbesondere die Darstellung von Männlichkeit und Weiblichkeit in militärischen Social-Media-Kanälen, da die Art und Weise, wie das Geschlecht in den sozialen Medien dargestellt wird, Auswirkungen darauf hat, wie sich zukünftige Rekruten und - am anderen Ende des militärischen Karrierespektrums - Veteranen angesprochen fühlen.Das Buch befasst sich auch mit der neuen Form der Folgediskussion, die es den Streitkräften ermöglicht, mit der Bevölkerung zu interagieren. In den sozialen Medien werden die Streitkräfte öffentlich präsentiert, was die Meinung der Öffentlichkeit über sie prägt. Außerdem können die Streitkräfte die Debatten als Instrument zur Beobachtung der Einstellung der Gesellschaft zu ihnen oder zu Ereignissen, die sich auf die Gesellschaft auswirken, nutzen. Umgekehrt können die sozialen Medien den Militärangehörigen eine Stimme verleihen und ihnen ermöglichen, sich öffentlich Gehör zu verschaffen. Da Diskussionen in sozialen Medien nur begrenzt kontrollierbar sind, verändert der Kontext, in dem die Streitkräfte diskutiert werden, ihren Einflussbereich und führt möglicherweise zu einem Kontrollverlust. Ein extremes Beispiel hierfür ist die Nutzung sozialer Medien als Instrument zur strategischen Verbreitung von Fehlinformationen, um die öffentliche Meinung zu beeinflussen und die nationale Sicherheit zu gefährden. Darüber hinaus führt die Nutzung sozialer Medien zur Demoralisierung von Gegnern oder zur Beeinträchtigung ihrer Glaubwürdigkeit dazu, dass soziale Medien als Cyberwaffe betrachtet werden, die Politik und militärische Aktivitäten beeinflusst.

  • af Anna Visvizi & Marek Bodziany
    1.771,95 kr.

  • af Hamid Jahankhani & Reza Montasari
    1.970,95 kr.

  • af Walter D. Loveland
    660,95 kr.

  • af Michael Frank, Michael Nacht & Stanley Prussin
    531,95 kr.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.