Account
Orders
Advanced search
This book tackles the problem of complexity within IT environments, i.e., "Cybercomplexity," which is generally recognized as a principal source of cybersecurity risk. The book first defines complexity and simplifies its analysis by assuming a probabilistic approach to...
The COVID-19 pandemic is not only a threat to our health and economy, but also has strong implications for defence and security. Indeed, defence leaders have highlighted a second fight surrounding the spread of COVID-19, namely disinformation and preparing to face...
This book aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst performing business activities. Furthermore, this book looks to investigate the interactions from both the organization...
This book aspires to face the challenge of analyzing with due academic rigor, always in the paradigm of security and advanced sciences, but without forgetting the ethical questions that our world raises every day. The work is divided into two main sections: the first...
The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through...
This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to...
This book offers a comprehensive approach to the question of how artificial intelligence (AI) impacts politics, economy, and the society today. In this view, it is quintessential for understanding the complex nature of AI and its role in today’s world. The book has been...
The book provides a valuable reference for cyber security experts, digital forensic practitioners and network security professionals. In recent years, AI has gained substantial attention from researchers in both academia and industry, and as a result AI’s capabilities...
This book is an invaluable reference for those operating within the fields of Cyber Security, Digital Forensics, Digital Policing, Computer Science and Artificial Intelligence. The Internet of Things (IoT) ecosystem presents a wide range of consumer, infrastructure,...
This book intersects the distributed ledger technology (DLT) community with the international security community. Given the increasing application of blockchain technology in the fields of business and international development, there is a growing body of study on other...
The year 2020 and the COVID-19 pandemic marked a huge change globally, both in working and home environments. They posed major challenges for organisations around the world, which were forced to use technological tools to help employees work remotely, while in...
This book explores and analyzes the rapid pace of technological evolution in diplomatic, information, military, and economic sectors, which has contributed to a dynamic international policy environment. Global political stability is greatly influenced by innovations...
This book focuses on threats, especially contaminants, to drinking water and the supply system, especially in municipalities but also in industrial and even residential settings. The safety, security, and suitability landscape can be described as dynamic and complex...
This book describes an adaptable biothreat assessment process to complement overall biorisk management programs, incorporating threat management and the unique natures of biological assets. Further, this book examines the nexus between public health, international...
This book presents sensemaking strategies to support security planning and design. Threats to security are becoming complex and multifaceted and increasingly challenging traditional notions of security. The security landscape is characterized as ‘messes’ and ‘wicked...
This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the...
Since the end of bipolarism, the concept of asymmetric warfare, and of asymmetric conflict in general, has been increasingly applied with regard to armed forces activities and tasks. This book presents the findings of comparative empirical research conducted in selected...
This book provides information on data-driven infrastructure design, analytical approaches, and technological solutions with case studies for smart cities.This book aims to attract works on multidisciplinary research spanning across the computer science and engineering,...
This book assesses potential developments of terrorism and ways to prevent it—the growing threats as new technologies become available — and how the same new technologies may help trap those with potential mal-intent. The drumbeat of terror resonates from...
This book is about the strategic relevance of quantum technologies. It debates the military-specific aspects of this technology. Various chapters of this book cohere around two specific themes. The first theme discusses the global pattern of ongoing civilian and...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers