Account
Orders
Advanced search
With our highly connected and interdependent world, the growing threat of infectious diseases and public health crisis has shed light on the requirement for global efforts to manage and combat highly pathogenic infectious diseases and other public health crisis on an...
This book provides a line of communication between academia and end users/practitioners to advance forensic science and boost its contribution to criminal investigations and court cases. By covering the state of the art of promising technologies for the analysis of...
This book explores and analyzes emerging innovations within today’s most cutting-edge science and technology (S&T) areas, which are cited as carrying the potential to revolutionize governmental structures, economies, and international security. Some have argued that...
Cybercrime remains a growing challenge in terms of security and privacy practices. Working together, deep learning and cyber security experts have recently made significant advances in the fields of intrusion detection, malicious code analysis and forensic...
This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial...
This book argues that security and defense have never been true priorities in the European Union, and have constantly been marginalized by the elites since the Soviet Union collapsed and the Warsaw Pact disintegrated. Despite the official rhetoric, only a few tangible...
This book aims to highlight the gaps and the transparency issues in the clinical research and trials processes and how there is a lack of information flowing back to researchers and patients involved in those trials. Lack of data transparency is an underlying theme...
This book addresses the latest approaches to holistic Cyber-Physical System (CPS) resilience in real-world industrial applications. Ensuring the resilience of CPSs requires cross-discipline analysis and involves many challenges and open issues, including...
This book presents the latest trends in attacks and protection methods of Critical Infrastructures. It describes original research models and applied solutions for protecting major emerging threats in Critical Infrastructures and their underlying networks. It presents a...
This book provides a comprehensive overview of the current and emerging challenges of cyber criminology, victimization and profiling. It is a compilation of the outcomes of the collaboration between researchers and practitioners in the cyber criminology field, IT law...
This book describes a systematic approach to risk assessment for complex socio-technical systems like industrial processes, especially innovative ones. It provides an overview of applications of system dynamics theory and methodologies on industrial systems in order to...
This edited book captures salient global security challenges and presents ‘design’ solutions in dealing with wicked problems. Through case studies and applied research this book reveals the many perspectives, tools and approaches to support security design....
This book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the...
This book systematically studies how game theory can be used to improve security in chemical industrial areas, capturing the intelligent interactions between security managers and potential adversaries. The recent unfortunate terrorist attacks on critical...
This volume constitutes the state-of-the-art in active interrogation, widely recognized as indispensable methods for addressing current and future nuclear security needs. Written by a leading group of science and technology experts, this comprehensive reference...
The protection of the homeland is the top priority for U.S. national security strategy. Strategic defense, however, has been an overlooked dimension in the vast literature on the U.S. strategic posture, with even less attention given to the necessity and dynamics of...
This book contributes to the current knowledge and research on conflict and cross-cultural dialogue, emphasizing how respect, tolerance and dialogue may be quite effective tools for bridging the diverse cultures and, consequently, for solving many of the conflicts of...
There is little doubt that cyber-space has become the battle space for confrontations. However, to conduct cyber operations, a new armory of weapons needs to be employed. No matter how many, or how sophisticated an aggressor’s kinetic weapons are, they are useless in...
This volume examines the role of technology in gathering, assimilating and utilizing intelligence information through the ages. Pushing the boundaries of existing works, the articles contained here take a broad view of the use and implementation of technology and...
This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers