Account
Orders
Advanced search
This book looks into the processes of change and renewal of border control and border security and management during the past 30 years after the fall of the Iron Curtain, and the immense challenges in nation-building in South-Eastern Europe after the collapse of former...
Since 9/11, the United States and its allies have been waging an endless War on Terror to counter violent extremism by “winning hearts and minds,” particularly in Afghanistan. However, violent extremism remains on the rise worldwide.The effort and sacrifice of the War...
Through the examination of different themes and subjects the book provides an in depth analysis of the concept of deterrence and its utility in dealing effectively with current threats. Although the concept of deterrence precedes the Cold War, in modern times and...
This book provides a line of communication between academia and end users/practitioners to advance forensic science and boost its contribution to criminal investigations and court cases. By covering the state of the art of promising technologies for the analysis of...
Cybercrime remains a growing challenge in terms of security and privacy practices. Working together, deep learning and cyber security experts have recently made significant advances in the fields of intrusion detection, malicious code analysis and forensic...
This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial...
This edited book captures salient global security challenges and presents ‘design’ solutions in dealing with wicked problems. Through case studies and applied research this book reveals the many perspectives, tools and approaches to support security design....
This volume constitutes the state-of-the-art in active interrogation, widely recognized as indispensable methods for addressing current and future nuclear security needs. Written by a leading group of science and technology experts, this comprehensive reference...
This book contributes to the current knowledge and research on conflict and cross-cultural dialogue, emphasizing how respect, tolerance and dialogue may be quite effective tools for bridging the diverse cultures and, consequently, for solving many of the conflicts of...
There is little doubt that cyber-space has become the battle space for confrontations. However, to conduct cyber operations, a new armory of weapons needs to be employed. No matter how many, or how sophisticated an aggressor’s kinetic weapons are, they are useless in...
This volume examines the role of technology in gathering, assimilating and utilizing intelligence information through the ages. Pushing the boundaries of existing works, the articles contained here take a broad view of the use and implementation of technology and...
This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that...
This edited book examines the contemporary regional security concerns in the Asia-Pacific recognizing the ‘Butterfly effect’, the concept that small causes can have large effects: ‘the flap of a butterfly’s wings can cause a typhoon halfway around the world’. For many...
This book covers many aspects of cyberspace, emphasizing not only its possible ‘negative’ challenge as a threat to security, but also its positive influence as an efficient tool for defense as well as a welcome new factor for economic and industrial production....
This book covers various aspects of leadership in critical situations and under extreme conditions. Today’s leaders often face challenging situations or unexpected difficulties, and mastering these requires a wide spectrum of competencies such as creativity, courage and...
One of the most important aspects for a successful police operation is the ability for the police to obtain timely, reliable and actionable intelligence related to the investigation or incident at hand. Open Source Intelligence (OSINT) provides an invaluable avenue to...
This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first time, it provides security practitioners with a trusted reference and resource designed to guide them through the...
This book is intended to be used as a textbook and research reference for the field of nuclear nonproliferation. The book is primarily technical and focussed on methods of detecting clandestine nuclear material that might be illicitly transported. The book also touches...
This book offers comprehensive coverage of biomarker/biosensor interactions for the rapid detection of weapons of bioterrorism, as well as current research trends and future developments and applications. It will be useful to researchers in this field who...
This book discusses that disasters, whether natural or man-made, are essentially a human phenomenon. When a city becomes gridlocked and its resources depleted, the collective resilience of those who remain on the ground becomes critical to its...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers