Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Bücher der Reihe Advanced Sciences and Technologies for Security Applications

Filter
Filter
Ordnen nachSortieren Reihenfolge der Serie
  • - From Strategy to Implementation
     
    167,00 €

    Examples of OSINT range from information posted on social media as one of the most openly available means of accessing and gathering Open Source Intelligence to location data, OSINT obtained from the darkweb to combinations of OSINT with real-time analytical capabilities and closed sources.

  •  
    139,00 €

    This book examines the roles of sensors, physics-based attributes, classification methods, and performance evaluation in automatic target recognition.

  • - Security and Sovereignty in an Uncertain World
     
    103,00 €

    The protection of the homeland is the top priority for U.S. national security strategy. Strategic defense, however, has been an overlooked dimension in the vast literature on the U.S. strategic posture, with even less attention given to the necessity and dynamics of security collaboration within North America. Drawing on the expertise of scholars from the U.S., Canada and Mexico, the book offers a wide range of perspectives on recent trends in, and future prospects for, the military and political evolution of North American strategic defense.North American strategic defense is a topic too often taken for granted: as this excellent book shows, that is a mistake. In the 21st century, perhaps even more than the 20th, it will be an issue of cardinal importance to both the United States and Canada.Eliot A. CohenRobert E. Osgood Professor of Strategic Studies, Johns Hopkins School of Advanced International StudiesNORAD's binational command is unique, and this timely and ambitious book examines its continued relevance to North American defense against a host of new global threats. It broadens the focus of what we mean by North American defense, contemplates how we might include Mexico in various regional security arrangements, and considers the dynamics of expanded North American interdependence in the Trump era.Laura DawsonDirector of the Canada Institute, Woodrow Wilson International Center for ScholarsNorth American Strategic Defense in the 21st Century is an important book. This edited volume brings together a galaxy of stars, both rising and established, with outstanding credentials regarding NORAD and associated matter in the study of security. This original and well-written volume is the first of its kind since the Cold War - long overdue and impressive in contents. The chapters cover both panoramic issues and more specific matters, and the collection is essential reading for academics, policy-makers and the general public.Patrick JamesDornsife Dean's Professor, School of International Relations, University of Southern California

  • - A Transformative Approach
     
    185,00 €

    The book systematically deals with the core aspects of urban resilience: systems, management issues and populations.The taxonomy can be broken down into threats, systems, resilience cycles and recovery types in the context of urban resilience.

  • - Challenges, Trends and Priorities
     
    82,00 €

    This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first time, it provides security practitioners with a trusted reference and resource designed to guide them through the complexities and operational challenges associated with the management of contemporary and emerging cybercrime and cyberterrorism (CC/CT) issues.Benefiting from the input of three major European Commission funded projects the book's content is enriched with case studies, explanations of strategic responses and contextual information providing the theoretical underpinning required for the clear interpretation and application of cyber law, policy and practice, this unique volume helps to consolidate the increasing role and responsibility of society as a whole, including law enforcement agencies (LEAs), the private sector and academia, to tackle CC/CT. This new contribution to CC/CT knowledge follows a multi-disciplinary philosophy supported by leading experts across academia, private industry and government agencies. This volume goes well beyond the guidance of LEAs, academia and private sector policy documents and doctrine manuals by considering CC/CT challenges in a wider practical and operational context. It juxtaposes practical experience and, where appropriate, policy guidance, with academic commentaries to reflect upon and illustrate the complexity of cyber ecosystem ensuring that all security practitioners are better informed and prepared to carry out their CC/CT responsibilities to protect the citizens they serve.

  • - Issues and Implications of Digital Arms
     
    84,00 €

    There is little doubt that cyber-space has become the battle space for confrontations. However, to conduct cyber operations, a new armory of weapons needs to be employed. No matter how many, or how sophisticated an aggressor¿s kinetic weapons are, they are useless in cyber-space. This book looks at the milieu of the cyber weapons industry, as well as the belligerents who use cyber weapons. It discusses what distinguishes these hardware devices and software programs from computer science in general.  It does this by focusing on specific aspects of the topic¿contextual issues of why cyber-space is the new battleground, defensive cyber weapons, offensive cyber weapons, dual-use weapons, and the implications these weapons systems have for practice. Contrary to popular opinion, the use of cyber weapons is not limited to nation states; though this is where the bulk of news reporting focuses. The reality is that there isn¿t a sector of the political-economy that is immune to cyber skirmishes. So, this book looks at cyber weapons not only by national security agencies and the military, but also by law enforcement, and the business sector¿the latter includes administrations termed non-government organisations (NGOs).  This book offers study material suitable for a wide-ranging audience¿students, professionals, researchers, policy officers, and ICT specialists.

  • - Security and Sovereignty in an Uncertain World
     
    104,00 €

    The protection of the homeland is the top priority for U.S. national security strategy. Strategic defense, however, has been an overlooked dimension in the vast literature on the U.S. strategic posture, with even less attention given to the necessity and dynamics of security collaboration within North America. Drawing on the expertise of scholars from the U.S., Canada and Mexico, the book offers a wide range of perspectives on recent trends in, and future prospects for, the military and political evolution of North American strategic defense.North American strategic defense is a topic too often taken for granted: as this excellent book shows, that is a mistake. In the 21st century, perhaps even more than the 20th, it will be an issue of cardinal importance to both the United States and Canada.Eliot A. CohenRobert E. Osgood Professor of Strategic Studies, Johns Hopkins School of Advanced International StudiesNORAD's binational command is unique, and this timely and ambitious book examines its continued relevance to North American defense against a host of new global threats. It broadens the focus of what we mean by North American defense, contemplates how we might include Mexico in various regional security arrangements, and considers the dynamics of expanded North American interdependence in the Trump era.Laura DawsonDirector of the Canada Institute, Woodrow Wilson International Center for ScholarsNorth American Strategic Defense in the 21st Century is an important book. This edited volume brings together a galaxy of stars, both rising and established, with outstanding credentials regarding NORAD and associated matter in the study of security. This original and well-written volume is the first of its kind since the Cold War - long overdue and impressive in contents. The chapters cover both panoramic issues and more specific matters, and the collection is essential reading for academics, policy-makers and the general public.Patrick JamesDornsife Dean's Professor, School of International Relations, University of Southern California

  • - Recognizing Vulnerabilities, Creating Opportunities
     
    122,00 €

    With our highly connected and interdependent world, the growing threat of infectious diseases and public health crisis has shed light on the requirement for global efforts to manage and combat highly pathogenic infectious diseases and other public health crisis on an unprecedented level.

  • - Issues and Implications of Digital Arms
     
    61,00 €

    There is little doubt that cyber-space has become the battle space for confrontations. However, to conduct cyber operations, a new armory of weapons needs to be employed. No matter how many, or how sophisticated an aggressor's kinetic weapons are, they are useless in cyber-space. This book looks at the milieu of the cyber weapons industry, as well as the belligerents who use cyber weapons. It discusses what distinguishes these hardware devices and software programs from computer science in general.  It does this by focusing on specific aspects of the topic-contextual issues of why cyber-space is the new battleground, defensive cyber weapons, offensive cyber weapons, dual-use weapons, and the implications these weapons systems have for practice. Contrary to popular opinion, the use of cyber weapons is not limited to nation states; though this is where the bulk of news reporting focuses. The reality is that there isn't a sector of the political-economy that is immune to cyber skirmishes. So, this book looks at cyber weapons not only by national security agencies and the military, but also by law enforcement, and the business sector-the latter includes administrations termed non-government organisations (NGOs).  This book offers study material suitable for a wide-ranging audience-students, professionals, researchers, policy officers, and ICT specialists.

  • - A Critical Assessment
    von Peter Lehr
    121,00 €

    This book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future. The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies - weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that promise an increase in safety and security when it comes to the dangers posed by these terrorists. This part also includes a critical discussion of advantages and disadvantages of such technologies that are, quite often, sold as a 'silver bullet' approach in the fight against terrorism. Controversies such as those triggered by the abuse of millimeter wave scanners deployed at several Western European airports will demonstrate that there are costs involved with regard to human rights. The third, analytical part takes the critical discussion further by arguing that the uncritical fielding of new surveillance and control technologies in parallel with the on-going outsourcing and privatization of key services of the state could well lead to dystopias as envisaged in a rather prescient way by the so-called cyperpunk novels of the 1980s. The book concludes with the question that any liberal democracy should ask itself: how far can we go with regard to hardening our societies against terrorist threats?

  • - From Strategy to Implementation
     
    158,00 €

    Examples of OSINT range from information posted on social media as one of the most openly available means of accessing and gathering Open Source Intelligence to location data, OSINT obtained from the darkweb to combinations of OSINT with real-time analytical capabilities and closed sources.

  •  
    113,00 €

    This volume explores the interpersonal, organizational, and technological enablers and barriers to information and intelligence sharing in multinational and multiagency military, humanitarian, and counterterrorism operations.

  • - Understanding Root Cause and Complex Causality
     
    141,00 €

    It opens the black box of disasters by presenting 'forensic analysis approaches' to disasters, thereby revealing the complex causality that characterizes them and explaining how and why hazards do, or do not, become disasters.

  •  
    141,00 €

    remote sensing systems and validation in real-sample analysis.The authors describe advances in all stages of biosensor development: theselection of biochemical components, their use in biosensor assembly, detection principles and improvements and applications for real sample assays.

  • - Evaluating Risk in Complex Industrial Systems
     
    95,00 €

    This book describes a systematic approach to risk assessment for complex socio-technical systems like industrial processes, especially innovative ones. It provides an overview of applications of system dynamics theory and methodologies on industrial systems in order to demonstrate the relevance of such an approach in helping to assess risks in such complex systems. An important feature of this approach is that it takes into account the dynamic of the interactions of the components (technical, human and organizational ones) in order to study and simulate the behavior of the system. This methodology helps to define the failures and/or accident scenarios and to implement and test the prevention and protection barriers. This book is of particular interest to students and teachers at university level (Master and Doctorate) and to engineers interested in risk analysis and management.

  • - From Risk Modelling to Threat Counteraction
     
    131,00 €

    This book addresses the latest approaches to holistic Cyber-Physical System (CPS) resilience in real-world industrial applications. Ensuring the resilience of CPSs requires cross-discipline analysis and involves many challenges and open issues, including how to address evolving cyber-security threats.

  • - Theories, Methods, Tools and Technologies
     
    140,00 €

    This book presents the latest trends in attacks and protection methods of Critical Infrastructures. It describes original research models and applied solutions for protecting major emerging threats in Critical Infrastructures and their underlying networks. It presents a number of emerging endeavors, from newly adopted technical expertise in industrial security to efficient modeling and implementation of attacks and relevant security measures in industrial control systems; including advancements in hardware and services security, interdependency networks, risk analysis, and control systems security along with their underlying protocols.Novel attacks against Critical Infrastructures (CI) demand novel security solutions. Simply adding more of what is done already (e.g. more thorough risk assessments, more expensive Intrusion Prevention/Detection Systems, more efficient firewalls, etc.) is simply not enough against threats and attacks that seem to have evolved beyond modern analyses and protection methods.The knowledge presented here will help Critical Infrastructure authorities, security officers, Industrial Control Systems (ICS) personnel and relevant researchers to (i) get acquainted with advancements in the field, (ii) integrate security research into their industrial or research work, (iii) evolve current practices in modeling and analyzing Critical Infrastructures, and (iv) moderate potential crises and emergencies influencing or emerging from Critical Infrastructures.

  • von Genserik Reniers & Laobing Zhang
    75,00 €

    This book systematically studies how game theory can be used to improve security in chemical industrial areas, capturing the intelligent interactions between security managers and potential adversaries.

  • - Innovative Perspectives on Complex Problems
     
    113,00 €

    This edited book captures salient global security challenges and presents 'design' solutions in dealing with wicked problems. These global risks have been in the headlines in the last year (Global Risks Report) and pose significant security challenges both nationally and globally.

  •  
    108,00 €

    This book contributes to the current knowledge and research on conflict and cross-cultural dialogue, emphasizing how respect, tolerance and dialogue may be quite effective tools for bridging the diverse cultures and, consequently, for solving many of the conflicts of today's world, characterized by a dynamic interchange of populations with very diverse cultural and ethnic backgrounds. For this purpose, we rely on reputed scholars from ten different countries, and from different cultures and fields of expertise, which allows for diverse contributions from a valuable interdisciplinary perspective. The first section of the book deals with the correlation between cultural differences and conflict, while also showing how such conflicts can be prevented and, should they arise, managed and solved. The second section addresses a different, more specific issue: how cultural expression means and tools for cultural communication may lead to conflict whereas they may help to avoid it as well. Finally, the third section analyzes how legal and justice systems deal with cross-cultural conflicts as well as with situations which may lead to cross-cultural conflicts, thus assessing to which extent such systems contribute to avoid and/or solve such kind of conflicts.

  • - Challenges and Advances for the 21st Century
     
    131,00 €

  • - Technologies for Civilian, Military and Cyber Surveillance
     
    159,00 €

    This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including gait recognition, face-based physiology-assisted recognition, face recognition in the visible and infrared bands, and cross-spectral iris recognition.The second part of the book, Surveillance for Security and Defense, discusses the ethical issues raised by the use of surveillance systems in the name of combatting terrorism and ensuring security. It presents different generations of satellite surveillance systems and discusses the requirements for real-time satellite surveillance in military contexts. In addition, it explores the new standards of surveillance using unmanned air vehicles and drones, proposes surveillance techniques for detecting stealth aircrafts and drones, and highlights key techniques for maritime border surveillance, bio-warfare and bio-terrorism detection.The last part of the book, Cyber Surveillance, provides a review of data hiding techniques that are used to hinder electronic surveillance. It subsequently presents methods for collecting and analyzing information from social media sites and discusses techniques for detecting internal and external threats posed by various individuals (such as spammers, cyber-criminals, suspicious users or extremists in general). The book concludes by examining how high-performance computing environments can be exploited by malicious users, and what surveillance methods need to be put in place to protect these valuable infrastructures. The book is primarily intended for military and law enforcement personnel who use surveillance-related technologies, as well as researchers, Master¿s and Ph.D. students who are interested in learning about the latest advances in military, civilian and cyber surveillance.

  • von Angela L. Workman-Stark
    83,00 - 120,00 €

    This book provides a roadmap for how police services can address incivility in the workplace and become more inclusive from the inside out.

  •  
    181,00 €

    This book covers various aspects of leadership in critical situations and under extreme conditions. Insights from the study of in extremis leadership can help researchers and practitioners understand the individual, team and contextual factors that influence leadership and, ultimately, organizational efficiency and effectiveness.

  • - Risks and Benefits for Society, Security and Development
     
    114,00 €

    This book covers many aspects of cyberspace, emphasizing not only its possible 'negative' challenge as a threat to security, but also its positive influence as an efficient tool for defense as well as a welcome new factor for economic and industrial production.

  • - From Problem Framing to Problem Solving
     
    96,00 €

    This book captures current trends and developments in the field of systems thinking and soft operations research which can be applied to solve today's problems of dynamic complexity and interdependency.

  • - Understanding Root Cause and Complex Causality
     
    141,00 €

    It opens the black box of disasters by presenting 'forensic analysis approaches' to disasters, thereby revealing the complex causality that characterizes them and explaining how and why hazards do, or do not, become disasters.

  •  
    114,00 €

    This volume explores the interpersonal, organizational, and technological enablers and barriers to information and intelligence sharing in multinational and multiagency military, humanitarian, and counterterrorism operations.

  • - A Transformative Approach
     
    186,00 €

    The book systematically deals with the core aspects of urban resilience: systems, management issues and populations.The taxonomy can be broken down into threats, systems, resilience cycles and recovery types in the context of urban resilience.

  • von Alexandra Jayeun Lee
    50,00 - 65,00 €

    This book discusses that disasters, whether natural or man-made, are essentially a human phenomenon. When a city becomes gridlocked and its resources depleted, the collective resilience of those who remain on the ground becomes critical to its immediate survival and recovery.

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.