Account
Orders
Advanced search
This book deals with two areas: Global Commons and Security: inextricably melted together and more relevant than ever in a world which is ever globalized and… with an incognita looming on the horizon: the effects of the Coronavirus pandemic upon the International...
This book discusses multiple aspects of radiological and nuclear terrorism. Do you know what to do if there is a radiological or nuclear emergency in your city? These accidents are not common, but they have happened – and even though we have not seen an attack using...
This book presents a comprehensive account of the energy and environmental security perspectives of the developing countries. To address the subject comprehensively, it covers four geographically diverse clusters of developing countries from across the world. The...
This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital...
This book looks into the processes of change and renewal of border control and border security and management during the past 30 years after the fall of the Iron Curtain, and the immense challenges in nation-building in South-Eastern Europe after the collapse of former...
Social media has fundamentally changed communication and interaction in today's society. Apart from being used by individuals, it is also omnipresent in public sector organisations such as the armed forces. This book examines the opportunities and risks associated with...
This book discusses recent brain research and the potentially dangerous dual-use applications of the findings of these research projects. The book is divided into three sections: Part I examines the rise in dual-use concerns within various state’s chemical and...
This book offers a new look at international security management combining practical applications and theoretical foundations for new solutions to today’s complex security and safety challenges. The book’s focus on safety as a positive experience complements the...
Since 9/11, the United States and its allies have been waging an endless War on Terror to counter violent extremism by “winning hearts and minds,” particularly in Afghanistan. However, violent extremism remains on the rise worldwide.The effort and sacrifice of the War...
Chapter “Predictive Policing in 2025: A Scenario” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
This book presents a compendium of selected game- and decision-theoretic models to achieve and assess the security of critical infrastructures. Given contemporary reports on security incidents of various kinds, we can see a paradigm shift to attacks of an increasingly...
The current policing landscape has seen the rise in serious and organized crime across the globe. Criminals are innovating in real-time leveraging cyber, social media, enhanced surveillance to support their activities. In so doing, the criminal landscape has become...
The book presents novel research in the areas of social identity and security when using mobile platforms.The topics cover a broad range of applications related to securing social identity as well as the latest advances in the field, including the presentation of novel...
This book addresses the key security challenges in the big data centric computing and network systems, and discusses how to tackle them using a mix of conventional and state-of-the-art techniques. The incentive for joining big data and advanced analytics is no...
This book discusses some of the strategic lines in front of the trends related to the new challenges of global security in this new century: some rather universal problems (migration, terrorism, cyberspace, conflict resolutions techniques in prisons, economic...
From pirates to smugglers, migrants to hackers, from stolen fish to smuggled drugs, the sea is becoming a place of increasing importance on the global agenda as criminals use it as a theatre to conduct their crimes unfettered. This volume sets out to provide an...
This publication highlights the fast-moving technological advancement and infiltration of Artificial Intelligence into society. Concepts of evolution of society through interconnectivity are explored, together with how the fusion of human and technological interaction...
This book provides the conceptual foundation of security risk assessment and thereby enables reasoning about risk from first principles. It presents the underlying theory that is the basis of a rigorous and universally applicable security risk assessment methodology....
Through the examination of different themes and subjects the book provides an in depth analysis of the concept of deterrence and its utility in dealing effectively with current threats. Although the concept of deterrence precedes the Cold War, in modern times and...
This timely book examines how the South African National Defence Force has adapted to the country’s new security, political and social environment since 1994. In South Africa’s changed political state, how has civilian control of the military been implemented and what...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers