Markedets billigste bøger
Levering: 1 - 2 hverdage

Bøger i Advanced Sciences and Technologies for Security Applications serien

Filter
Filter
Sorter efterSorter Serie rækkefølge
  • af Reza Montasari
    1.391,95 kr.

    This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security. It draws insights from a range of diverse fields, including Computer Science, Social Science, Political Science, International Relations, Criminology, and Law. Furthermore, the book investigates the field of Artificial Intelligence (AI) and related technologies, exploring their dual role in this dynamic landscape of contemporary cyberthreats, with both constructive and malicious implications.The book comprises four distinct themes, with each theme represented by a dedicated Part. Within this organisational framework, each overarching theme is systematically explored through a series of chapters, providing readers with a clear and thematic roadmap for their journey through the content.Part I, Understanding Terrorism and Counter-Terrorism Strategies, of the book explores complexities surrounding contemporary global security challenges. It serves as the foundational segment of the book, consisting of three chapters that critically analyse various dimensions of terrorism and the strategies implemented to combat it.Part II, Cyberterrorism Landscape, of the book offers an in-depth assessment of the current cyberterrorism landscape. This section comprises two critical chapters, each contributing to a comprehensive understanding of the contemporary threats posed by cyberterrorism and their implications for national security.Part III, Countering Cyberterrorism with Technology, of the book forms the core of the book's exploration into leveraging technology to mitigate the threats of cyberterrorism. This section includes four critical chapters, collectively providing an in-depth understanding of the intersection between technology and counterterrorism strategies.Part IV, Artificial Intelligence and National and International Security, of the book delves into the complex relationship between AI technology and the broader security landscape. Comprising three pivotal chapters, this section provides a detailed understanding of AI's transformative role in shaping the future of national and international security.

  • af Hamid Jahankhani
    1.429,95 - 1.662,95 kr.

  • af Christian Kaunert
    1.208,95 - 1.253,95 kr.

  • af Christopher Nelson
    600,95 - 713,95 kr.

    This book addresses ways that governments, international organizations, and other stakeholders can utilize data to uncover illicit trade in materials and equipment that could be used to support chemical, biological, nuclear, and advanced conventional weapons systems. Key concepts of strategic trade are introduced, including examples of strategic goods and their potential uses in weapons of mass destruction (WMDs) and weapons systems, the interplay between the Harmonized System and strategic trade control regimes, and the data available for analysis in the field. Innovative, yet practical methodologies to analyze strategic trade cover the use of crime scripts, risk assessment indicators, mirror statistics, market share analysis, and transshipment and re-export analysis.There are also chapters on leading-edge techniques involving machine learning and network analysis that have shown promise in other areas of crime and illicit trade investigations. Each chapter provides step-by-step instructions on applying the technique, numerous case studies and examples, and discussions of the strengths and weaknesses of each approach. This volume is designed to provide all types of analysts with practical pathways for understanding, detecting, and disrupting illicit procurement of materials and equipment needed to produce WMDs and advanced weapons.

  • af Deeph Chana
    1.098,95 - 1.167,95 kr.

  • af Sonny S. Patel
    879,95 - 988,95 kr.

    This book addresses the operationalization of community resilience in the United Kingdom (UK) in connection with severe floods. Written for early academic professionals, students, and community practitioners, it investigates the educational and practical meaning and application of community resilience using a UK-centric local-level case study. Exploring the perceptions of both those who have been affected by a natural hazard and those who have not, the book reveals how trust, community resources, and neighborhood security can offer effective ways of bringing communities together after a natural hazard.The author introduces the topic of community resilience as it applies to disasters in Chapter 1 and its implications for securing and improving the wellbeing of disaster-affected communities in Chapters 2 and 3. In Chapter 4, the lessons learned contributing to the available information and research on community resilience are reviewed. Finally, the author offers recommendations and outlines future directions in coping with the uncertainty and insecurity caused by natural hazards in Chapter 5.

  • af Reza Montasari
    1.305,95 kr.

    This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape. The digital policing landscape is dynamic and intricate, emanating from crimes that are both persistent and transnational. Globalization, human and drug trafficking, cybercrime, terrorism, and other forms of transnational crime can have a significant impact on societies around the world. This necessitates a reassessment of what crime, national security, and policing mean. Recent global events such as human and drug trafficking, the COVID-19 pandemic, violent protests, cyber threats, and terrorist activities underline vulnerabilities residing in our current security and digital policing posture. As an interdisciplinary collection of studies, this book encapsulates concepts, theories, and technology applications, offering a comprehensive analysis of current and emerging trends and threats within thecontext of national and international security. Undertaking an evidence-based approach, this book offers an extraordinarily perceptive and detailed account of issues and solutions related to the complex national and international security landscape.To this end, the book:presents insights into emerging and potential technological and methodological solutions as well as advancements in relation to integrated computational and analytical solutions that could be deployed for the purposes of national and international security;provides a comprehensive analysis of technical, ethical, legal, privacy, and civil liberty challenges stemming from the aforementioned advancements;and, accordingly, offers detailed recommendations supporting the design and implementation of best practices including technical, ethical, and legal approaches for national and international security uses.The research contained in the book fits well into thelarger body of work on various aspects of AI, cybersecurity, national security, digital forensics, cyberterrorism, ethics, human rights, cybercrime, and law. It provides a valuable reference for LEAs and security organizations, policymakers, cybersecurity experts, digital forensic practitioners, researchers, academicians, graduates and advanced undergraduates, and other stakeholders with an interest in national and global security.

  • af Richard Jiang
    988,95 - 1.074,95 kr.

    This book highlights recent advances in smart cities technologies, with a focus on new technologies such as biometrics, blockchains, data encryption, data mining, machine learning, deep learning, cloud security, and mobile security.  During the past five years, digital cities have been emerging as a technology reality that will come to dominate the usual life of people, in either developed or developing countries. Particularly, with big data issues from smart cities, privacy and security have been a widely concerned matter due to its relevance and sensitivity extensively present in cybersecurity, healthcare, medical service, e-commercial, e-governance, mobile banking, e-finance, digital twins, and so on. These new topics rises up with the era of smart cities and mostly associate with public sectors, which are vital to the modern life of people. This volume summarizes the recent advances in addressing the challenges on big data privacy and security in smart cities and points out the future research direction around this new challenging topic.

  • af Gitanjali Adlakha-Hutcheon
    879,95 - 988,95 kr.

    This book explores types of disruptions in defence and security, ways to assess disruptions triggered by technological advancements or the lack of legal frameworks; the consequent delays or disruptions to making decisions, creative idea generation and finally the innovative pathways to counter such disruptions. What do disruption, ideation and innovation have in common? How do disruptions, ideas and innovation coexist within defence and security? They all influence and impact decision-making. Disruptions drive decision-making. Ideation raises solutions to resolve the disruptions and innovation brings ideas into life. While disruptions may be common place in the business world, where disruptive technologies displace pre-existing ones; they are less prevalent in defence, even less so within the realm of security. For the last 10 years, there has been talk of disruptive technologies and even adoption of terms such as emerging and disruptive technologies by the largest military alliance-NATO, yet the means to assess these remain elusive. It offers researchers opportunities to assess different types of disruptions, ideate and innovate on scientific grounds to counter disruptions, thereby bolstering the defence and security community's ability to make decisions better.

  • af Ayman El Hajjar
    1.305,95 kr.

    In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications. All wireless communications technologies such as Bluetooth, NFC, wireless sensors, wireless LANs, ZigBee, GSM, and others have their own challenges and security threats.This book addresses some of these challenges focusing on the implication, impact, and mitigations of the stated issues. The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of wireless networks but also the adversarial application of wireless networks and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting, and addressing wireless challenges and threats. The book also looks ahead and forecasts what attacks can be carried out in the future through the malicioususe of the wireless networks if sufficient defenses are not implemented. The research contained in the book fits well into the larger body of work on various aspects of wireless networks and cyber-security.The book provides a valuable reference for cyber-security experts, practitioners, and network security professionals, particularly those interested in the security of the various wireless networks. It is also aimed at researchers seeking to obtain a more profound knowledge in various types of wireless networks in the context of cyber-security, wireless networks, and cybercrime. Furthermore, the book is an exceptional advanced text for Ph.D. and master¿s degree programs in cyber-security, network security, cyber-terrorism, and computer science who are investigating or evaluating a security of a specific wireless network. Each chapter is written by an internationally-renowned expert who has extensive experience in law enforcement, industry, or academia. Furthermore, this bookblends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.

  • af Carl S. Young
    1.541,95 - 1.788,95 kr.

    This book tackles the problem of complexity within IT environments, i.e., "e;Cybercomplexity,"e; which is generally recognized as a principal source of cybersecurity risk. The book first defines complexity and simplifies its analysis by assuming a probabilistic approach to security risk management. It then proposes a simple model of cybercomplexity that is based on Shannon entropy, a basic concept in information theory. The key drivers of cybercomplexity emerge from this model, where these drivers reveal the scale-dependence of cybersecurity risk and explain why macroscopic security controls are required to address cybersecurity risk on an enterprise scale. The significant operational implications of cybercomplexity are also discussed, thereby providing both a theoretical framework and a practical guide to addressing this longstanding problem in cybersecurity risk management.        

  • af Hamid Jahankhani
    1.561,95 kr.

    This book aims to explore the next generation of online learning challenges including the security and privacy issues of digital transformation strategies that is required in teaching and learning. Also, what efforts does the industry need to invest in changing mind-sets and behaviours of both students and faculty members in adoption of virtual and blended learning?The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of AI, blockchain and self-sovereign identity, but also the adversarial application of AI and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting and addressing AI challenges in higher education.The book provides a valuable reference for cyber security experts and practitioners, network security professionals and higher education strategist and decision-makers. It is also aimed at researchers seeking to obtain a more profound knowledge of machine learning and deep learning in the context of cyber security and AI in higher education. Each chapter is written by an internationally renowned expert who has extensive experience in industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.

  • af Hamid Jahankhani
    1.536,95 - 1.549,95 kr.

    This book aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst performing business activities.  Furthermore, this book looks to investigate the interactions from both the organization strategy including the cross-functional actors/stakeholders whom are operating within the organization and the various characteristics of operating in a cyber secure ecosystem.The book provides a valuable reference for IT directors, strategic leaders, cybersecurity experts, network security professionals. It is also aimed at researchers seeking to obtain a more profound knowledge of machine learning and deep learning in the context of cybersecurity. Furthermore, the book is an exceptional advanced text for Ph.D. and master's degree programs in cybersecurity, network security and computer science. Each chapter is written by an internationally renowned expert who has extensive experience in law enforcement, industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.

  • af Ritu Gill
    790,95 - 1.081,95 kr.

    The COVID-19 pandemic is not only a threat to our health and economy, but also has strong implications for defence and security. Indeed, defence leaders have highlighted a second fight surrounding the spread of COVID-19, namely disinformation and preparing to face adversaries willing to exploit the public health crisis for nefarious purposes. The current pandemic is a breeding ground for the propagation of disinformation, as it represents the first major global health event in which large social media platforms have become the main distributor of information. This multi-national edited volume consists of contributions from Defence Science, academia and industry, including NATO Headquarters, United States, Netherlands, Singapore, United Kingdom and Norway. The content is aimed at a diverse audience, including NATO members, researchers from defence and security organizations, academics, and militaries including analysts and practitioners, as well as policy makers. This volume focuses on various aspects of COVID-19 disinformation, including identifying global dominant disinformation narratives and the methods used to spread disinformation, examining COVID-19 disinformation within the broader context of the cognitive domain, examining the psychological effects of COVID-19 disinformation and COVID-19 disinformation on instant messaging platforms, along with examining various countermeasures to disinformation.

  • af Christian Kaunert
    988,95 kr.

    This book is the first comprehensive, book-length analysis of Israel and securitization processes. It develops an original analytical framework to ameliorate the theoretical understanding of the audience component during the securitization process, drawing upon insights from both securitization theory, political psychology, and IR theory. This gives us significant new insights into why some audiences are essential to be persuaded for securitization to occur, while others are not. This book also examines the role of the United States in defining what matters in Israeli National Security. In essence, since the United States is Israel's most significant ally, it is essential for the Israeli leadership to gain the American government's support (or its lack of resistance) for almost any securitization acts. The book analyses a highly original set of interviews with prominent figures in Israel who were at the top level of the Israeli decision-making process, including members of the political and military echelons."Through unparalleled access to Israel's political and security echelons, Israel: National Security and Securitization provides a unique overview of Israel¿s decision-maker's political perception over the years". Ehud Olmert- Prime Minister of Israel 2006-2009"Israel: National Security and Securitization provides a powerful analysis of how the State of Israel confronted security threats, and what was the American involvement in the Israeli decision-making process". Amos Yadlin, IDF Military Intelligence Directorate Chief 2006-2010"This book makes us understand securitization in a novel and enlightening way, thus making a substantial contribution to our understanding of national security in general and Israeli security in particular". Gabriel Ben-Dor, University of Haifa "Wertman and Kaunert's book makes an important and unique contribution to the existing and developing literature on securitization". Kobi Michael, Institute for National Security Studies

  • af Paul Haskell-Dowland
    1.436,95 kr.

    Ensuring cybersecurity for smart cities is crucial for a sustainable cyber ecosystem. Given the undeniable complexity of smart cities, fundamental issues such as device configurations and software updates should be addressed when it is most needed to fight cyber-crime and ensure data privacy.This book addresses the cybersecurity challenges associated with smart cities, aiming to provide a bigger picture of the concepts, intelligent techniques, practices and research directions in this area. Furthermore, this book serves as a single source of reference for acquiring knowledge on the technology, processes and people involved in the next-generation of cyber-smart cities.

  • af J. Martín Ramírez
    1.134,95 kr.

    This book aims to analyze from a multidisciplinary perspective the current geopolitical conflict between East and West, between two differentiated and apparently conflicting cosmogonic visions. The geopolitical evolution of the current panorama seems to lead to a new world in the field of international relations, a new board played on a planetary level. Once again, bloc geopolitics can be glimpsed in the immediate future, in which the most important actors such as Russia, China, the United States of America, and the European Union are called to position themselves with respect to the territorial and strategic ambitions of the opponent. International law seems to be overwhelmed by military actions and factual pressure on the ground, while the battle of ideas extends to the technological field and cyberspace. The different origins of the authors, with extensive academic, military, police forces, and business experience undoubtedly enriches the unique perspective that this work intendsto address, always in the attempt to enforce international law and the channels of dialogue between nations, such as the best solution to conflicts.

  • af Anthony J. Masys
    1.098,95 kr.

    Global security threats have created a complex risk landscape that is challenging and transforming society. These global security issues intersect and influence the political, economic, social, technological, ecological and legal dimensions of the complex risk landscape and are now transborder thereby becoming national security issues. Accessing the innovation space to support safety, security and defence capabilities is critical in order to mitigate new and evolving threats.Through real-world examples of innovation, this book provides a detailed examination of the innovation space as it pertains to the application of S&T to safety and security threats and challenges. This book is of most interest to public and private sector innovators as well as academician and graduate students working in the safety and security domain.

  • af Igor Khripunov
    1.208,95 kr.

    This book attempts to look into the genesis of security culture as a concept which emerged with the recognition of the role of the human factor in the context of security. It traces the rapid evolution of security culture into a multi-functional discipline reinforced by supplementary tools such as assessment and enhancement methodologies, reviews practical steps to harmonize nuclear safety and security culture as well as recommends its practical application to address insider threats and their consequences. In addition, it demonstrates how to tailor the generic model of nuclear security culture to meet specific needs of diverse facilities and activities in different countries. Finally, the book discusses several challenges which need to be addressed to make security culture a user-friendly, universal, and sustainable instrument to turn the perception of the human factor as a liability into an asset of nuclear security.

  • af Maurizio Martellini & Stanislav Abaimov
    825,95 kr.

  • af Anna Visvizi & Marek Bodziany
    1.429,95 kr.

  • af Hamid Jahankhani, Reza Montasari & Haider Al-Khateeb
    1.335,95 kr.

  • af Hamid Jahankhani & Reza Montasari
    1.436,95 kr.

  • af Cindy Vestergaard
    1.208,95 kr.

  • af Babak Akhgar, Hamid Jahankhani & Stefan Kendzierskyj
    1.100,95 kr.

  • af Margaret E. Kosal
    1.210,95 kr.

  • af Carmen Maftei & Ashok Vaseashta
    990,95 kr.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.