Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Bücher der Reihe Advanced Sciences and Technologies for Security Applications

Filter
Filter
Ordnen nachSortieren Reihenfolge der Serie
  • von Babak Akhgar, Hamid Jahankhani & Stefan Kendzierskyj
    104,00 €

  • von Cindy Vestergaard
    121,00 €

  • von Hamid Jahankhani & Reza Montasari
    162,00 €

  • von Hamid Jahankhani, Reza Montasari & Haider Al-Khateeb
    149,00 €

  • von Anna Visvizi & Marek Bodziany
    148,00 €

  •  
    112,00 €

    Chapter "Predictive Policing in 2025: A Scenario" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

  • von Yair Sharan, Ted J. Gordon & Elizabeth Florescu
    122,00 - 124,00 €

  • von Stanislav Abaimov
    119,00 €

    The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through its own imperfections and vulnerabilities. Moreover, quantum computers are further pushing the boundaries of what is possible, by making machine learning cyber agents faster and smarter.With the abundance of often-confusing information and lack of trust in the diverse applications of AI-based technologies, it is essential to have a book that can explain, from a cyber security standpoint, why and at what stage the emerging, powerful technology of machine learning can and should be mistrusted, and how to benefit from it while avoiding potentially disastrous consequences. In addition, this book sheds light on another highly sensitive area ΓÇô the application of machine learning for offensive purposes, an aspect that is widely misunderstood, under-represented in the academic literature and requires immediate expert attention.

  • von Malcolm R. Dando
    157,00 - 158,00 €

  • - Lost in Transition and Transformation
    von Lindy Heinecken
    94,00 €

  •  
    122,00 €

    With our highly connected and interdependent world, the growing threat of infectious diseases and public health crisis has shed light on the requirement for global efforts to manage and combat highly pathogenic infectious diseases and other public health crisis on an unprecedented level.

  • von Stefan Rass, Quanyan Zhu, Sandra Koenig & usw.
    166,00 - 167,00 €

  • von Ritu Gill
    74,00 - 101,00 €

    The COVID-19 pandemic is not only a threat to our health and economy, but also has strong implications for defence and security. Indeed, defence leaders have highlighted a second fight surrounding the spread of COVID-19, namely disinformation and preparing to face adversaries willing to exploit the public health crisis for nefarious purposes. The current pandemic is a breeding ground for the propagation of disinformation, as it represents the first major global health event in which large social media platforms have become the main distributor of information. This multi-national edited volume consists of contributions from Defence Science, academia and industry, including NATO Headquarters, United States, Netherlands, Singapore, United Kingdom and Norway. The content is aimed at a diverse audience, including NATO members, researchers from defence and security organizations, academics, and militaries including analysts and practitioners, as well as policy makers. This volume focuses on various aspects of COVID-19 disinformation, including identifying global dominant disinformation narratives and the methods used to spread disinformation, examining COVID-19 disinformation within the broader context of the cognitive domain, examining the psychological effects of COVID-19 disinformation and COVID-19 disinformation on instant messaging platforms, along with examining various countermeasures to disinformation.

  • von Hamid Jahankhani
    140,00 €

    This book aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst performing business activities.  Furthermore, this book looks to investigate the interactions from both the organization strategy including the cross-functional actors/stakeholders whom are operating within the organization and the various characteristics of operating in a cyber secure ecosystem.The book provides a valuable reference for IT directors, strategic leaders, cybersecurity experts, network security professionals. It is also aimed at researchers seeking to obtain a more profound knowledge of machine learning and deep learning in the context of cybersecurity. Furthermore, the book is an exceptional advanced text for Ph.D. and master's degree programs in cybersecurity, network security and computer science. Each chapter is written by an internationally renowned expert who has extensive experience in law enforcement, industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.

  • von Richard Jiang
    94,00 - 97,00 €

    This book highlights recent advances in smart cities technologies, with a focus on new technologies such as biometrics, blockchains, data encryption, data mining, machine learning, deep learning, cloud security, and mobile security.  During the past five years, digital cities have been emerging as a technology reality that will come to dominate the usual life of people, in either developed or developing countries. Particularly, with big data issues from smart cities, privacy and security have been a widely concerned matter due to its relevance and sensitivity extensively present in cybersecurity, healthcare, medical service, e-commercial, e-governance, mobile banking, e-finance, digital twins, and so on. These new topics rises up with the era of smart cities and mostly associate with public sectors, which are vital to the modern life of people. This volume summarizes the recent advances in addressing the challenges on big data privacy and security in smart cities and points out the future research direction around this new challenging topic.

  • von Gitanjali Adlakha-Hutcheon
    94,00 - 95,00 €

    This book explores types of disruptions in defence and security, ways to assess disruptions triggered by technological advancements or the lack of legal frameworks; the consequent delays or disruptions to making decisions, creative idea generation and finally the innovative pathways to counter such disruptions. What do disruption, ideation and innovation have in common? How do disruptions, ideas and innovation coexist within defence and security? They all influence and impact decision-making. Disruptions drive decision-making. Ideation raises solutions to resolve the disruptions and innovation brings ideas into life. While disruptions may be common place in the business world, where disruptive technologies displace pre-existing ones; they are less prevalent in defence, even less so within the realm of security. For the last 10 years, there has been talk of disruptive technologies and even adoption of terms such as emerging and disruptive technologies by the largest military alliance-NATO, yet the means to assess these remain elusive. It offers researchers opportunities to assess different types of disruptions, ideate and innovate on scientific grounds to counter disruptions, thereby bolstering the defence and security community's ability to make decisions better.

  • von Carl S. Young
    157,00 €

    This book tackles the problem of complexity within IT environments, i.e., "e;Cybercomplexity,"e; which is generally recognized as a principal source of cybersecurity risk. The book first defines complexity and simplifies its analysis by assuming a probabilistic approach to security risk management. It then proposes a simple model of cybercomplexity that is based on Shannon entropy, a basic concept in information theory. The key drivers of cybercomplexity emerge from this model, where these drivers reveal the scale-dependence of cybersecurity risk and explain why macroscopic security controls are required to address cybersecurity risk on an enterprise scale. The significant operational implications of cybercomplexity are also discussed, thereby providing both a theoretical framework and a practical guide to addressing this longstanding problem in cybersecurity risk management.        

  • von Sonny S. Patel
    94,00 - 94,00 €

    This book addresses the operationalization of community resilience in the United Kingdom (UK) in connection with severe floods. Written for early academic professionals, students, and community practitioners, it investigates the educational and practical meaning and application of community resilience using a UK-centric local-level case study. Exploring the perceptions of both those who have been affected by a natural hazard and those who have not, the book reveals how trust, community resources, and neighborhood security can offer effective ways of bringing communities together after a natural hazard.The author introduces the topic of community resilience as it applies to disasters in Chapter 1 and its implications for securing and improving the wellbeing of disaster-affected communities in Chapters 2 and 3. In Chapter 4, the lessons learned contributing to the available information and research on community resilience are reviewed. Finally, the author offers recommendations and outlines future directions in coping with the uncertainty and insecurity caused by natural hazards in Chapter 5.

  • von Christopher Nelson
    54,00 - 74,00 €

    This book addresses ways that governments, international organizations, and other stakeholders can utilize data to uncover illicit trade in materials and equipment that could be used to support chemical, biological, nuclear, and advanced conventional weapons systems. Key concepts of strategic trade are introduced, including examples of strategic goods and their potential uses in weapons of mass destruction (WMDs) and weapons systems, the interplay between the Harmonized System and strategic trade control regimes, and the data available for analysis in the field. Innovative, yet practical methodologies to analyze strategic trade cover the use of crime scripts, risk assessment indicators, mirror statistics, market share analysis, and transshipment and re-export analysis.There are also chapters on leading-edge techniques involving machine learning and network analysis that have shown promise in other areas of crime and illicit trade investigations. Each chapter provides step-by-step instructions on applying the technique, numerous case studies and examples, and discussions of the strengths and weaknesses of each approach. This volume is designed to provide all types of analysts with practical pathways for understanding, detecting, and disrupting illicit procurement of materials and equipment needed to produce WMDs and advanced weapons.

  • von Maurizio Martellini & Stanislav Abaimov
    83,00 €

  • von Igor Khripunov
    127,00 €

    This book attempts to look into the genesis of security culture as a concept which emerged with the recognition of the role of the human factor in the context of security. It traces the rapid evolution of security culture into a multi-functional discipline reinforced by supplementary tools such as assessment and enhancement methodologies, reviews practical steps to harmonize nuclear safety and security culture as well as recommends its practical application to address insider threats and their consequences. In addition, it demonstrates how to tailor the generic model of nuclear security culture to meet specific needs of diverse facilities and activities in different countries. Finally, the book discusses several challenges which need to be addressed to make security culture a user-friendly, universal, and sustainable instrument to turn the perception of the human factor as a liability into an asset of nuclear security.

  • von Anthony J. Masys
    113,00 €

    Global security threats have created a complex risk landscape that is challenging and transforming society. These global security issues intersect and influence the political, economic, social, technological, ecological and legal dimensions of the complex risk landscape and are now transborder thereby becoming national security issues. Accessing the innovation space to support safety, security and defence capabilities is critical in order to mitigate new and evolving threats.Through real-world examples of innovation, this book provides a detailed examination of the innovation space as it pertains to the application of S&T to safety and security threats and challenges. This book is of most interest to public and private sector innovators as well as academician and graduate students working in the safety and security domain.

  • von J. Martín Ramírez
    131,00 €

    This book aims to analyze from a multidisciplinary perspective the current geopolitical conflict between East and West, between two differentiated and apparently conflicting cosmogonic visions. The geopolitical evolution of the current panorama seems to lead to a new world in the field of international relations, a new board played on a planetary level. Once again, bloc geopolitics can be glimpsed in the immediate future, in which the most important actors such as Russia, China, the United States of America, and the European Union are called to position themselves with respect to the territorial and strategic ambitions of the opponent. International law seems to be overwhelmed by military actions and factual pressure on the ground, while the battle of ideas extends to the technological field and cyberspace. The different origins of the authors, with extensive academic, military, police forces, and business experience undoubtedly enriches the unique perspective that this work intendsto address, always in the attempt to enforce international law and the channels of dialogue between nations, such as the best solution to conflicts.

  • von Paul Haskell-Dowland
    158,00 €

    Ensuring cybersecurity for smart cities is crucial for a sustainable cyber ecosystem. Given the undeniable complexity of smart cities, fundamental issues such as device configurations and software updates should be addressed when it is most needed to fight cyber-crime and ensure data privacy.This book addresses the cybersecurity challenges associated with smart cities, aiming to provide a bigger picture of the concepts, intelligent techniques, practices and research directions in this area. Furthermore, this book serves as a single source of reference for acquiring knowledge on the technology, processes and people involved in the next-generation of cyber-smart cities.

  • von Christian Kaunert
    103,00 €

    This book is the first comprehensive, book-length analysis of Israel and securitization processes. It develops an original analytical framework to ameliorate the theoretical understanding of the audience component during the securitization process, drawing upon insights from both securitization theory, political psychology, and IR theory. This gives us significant new insights into why some audiences are essential to be persuaded for securitization to occur, while others are not. This book also examines the role of the United States in defining what matters in Israeli National Security. In essence, since the United States is Israel's most significant ally, it is essential for the Israeli leadership to gain the American government's support (or its lack of resistance) for almost any securitization acts. The book analyses a highly original set of interviews with prominent figures in Israel who were at the top level of the Israeli decision-making process, including members of the political and military echelons."Through unparalleled access to Israel's political and security echelons, Israel: National Security and Securitization provides a unique overview of Israel¿s decision-maker's political perception over the years". Ehud Olmert- Prime Minister of Israel 2006-2009"Israel: National Security and Securitization provides a powerful analysis of how the State of Israel confronted security threats, and what was the American involvement in the Israeli decision-making process". Amos Yadlin, IDF Military Intelligence Directorate Chief 2006-2010"This book makes us understand securitization in a novel and enlightening way, thus making a substantial contribution to our understanding of national security in general and Israeli security in particular". Gabriel Ben-Dor, University of Haifa "Wertman and Kaunert's book makes an important and unique contribution to the existing and developing literature on securitization". Kobi Michael, Institute for National Security Studies

  • von Hamid Jahankhani
    185,00 €

    This book aims to explore the next generation of online learning challenges including the security and privacy issues of digital transformation strategies that is required in teaching and learning. Also, what efforts does the industry need to invest in changing mind-sets and behaviours of both students and faculty members in adoption of virtual and blended learning?The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of AI, blockchain and self-sovereign identity, but also the adversarial application of AI and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting and addressing AI challenges in higher education.The book provides a valuable reference for cyber security experts and practitioners, network security professionals and higher education strategist and decision-makers. It is also aimed at researchers seeking to obtain a more profound knowledge of machine learning and deep learning in the context of cyber security and AI in higher education. Each chapter is written by an internationally renowned expert who has extensive experience in industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.

  • von Ayman El Hajjar
    140,00 €

    In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications. All wireless communications technologies such as Bluetooth, NFC, wireless sensors, wireless LANs, ZigBee, GSM, and others have their own challenges and security threats.This book addresses some of these challenges focusing on the implication, impact, and mitigations of the stated issues. The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of wireless networks but also the adversarial application of wireless networks and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting, and addressing wireless challenges and threats. The book also looks ahead and forecasts what attacks can be carried out in the future through the malicioususe of the wireless networks if sufficient defenses are not implemented. The research contained in the book fits well into the larger body of work on various aspects of wireless networks and cyber-security.The book provides a valuable reference for cyber-security experts, practitioners, and network security professionals, particularly those interested in the security of the various wireless networks. It is also aimed at researchers seeking to obtain a more profound knowledge in various types of wireless networks in the context of cyber-security, wireless networks, and cybercrime. Furthermore, the book is an exceptional advanced text for Ph.D. and master¿s degree programs in cyber-security, network security, cyber-terrorism, and computer science who are investigating or evaluating a security of a specific wireless network. Each chapter is written by an internationally-renowned expert who has extensive experience in law enforcement, industry, or academia. Furthermore, this bookblends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.

  • von Reza Montasari
    139,00 €

    This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape. The digital policing landscape is dynamic and intricate, emanating from crimes that are both persistent and transnational. Globalization, human and drug trafficking, cybercrime, terrorism, and other forms of transnational crime can have a significant impact on societies around the world. This necessitates a reassessment of what crime, national security, and policing mean. Recent global events such as human and drug trafficking, the COVID-19 pandemic, violent protests, cyber threats, and terrorist activities underline vulnerabilities residing in our current security and digital policing posture. As an interdisciplinary collection of studies, this book encapsulates concepts, theories, and technology applications, offering a comprehensive analysis of current and emerging trends and threats within thecontext of national and international security. Undertaking an evidence-based approach, this book offers an extraordinarily perceptive and detailed account of issues and solutions related to the complex national and international security landscape.To this end, the book:presents insights into emerging and potential technological and methodological solutions as well as advancements in relation to integrated computational and analytical solutions that could be deployed for the purposes of national and international security;provides a comprehensive analysis of technical, ethical, legal, privacy, and civil liberty challenges stemming from the aforementioned advancements;and, accordingly, offers detailed recommendations supporting the design and implementation of best practices including technical, ethical, and legal approaches for national and international security uses.The research contained in the book fits well into thelarger body of work on various aspects of AI, cybersecurity, national security, digital forensics, cyberterrorism, ethics, human rights, cybercrime, and law. It provides a valuable reference for LEAs and security organizations, policymakers, cybersecurity experts, digital forensic practitioners, researchers, academicians, graduates and advanced undergraduates, and other stakeholders with an interest in national and global security.

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.