We a good story
Quick delivery in the UK

Books in the Advanced Sciences and Technologies for Security Applications series

Filter
Filter
Sort bySort Series order
  • by J. Martín Ramírez & Bartolomé Bauzá-Abril
    £40.99

  • by Richard Hill, Hamid Jahankhani, Reza Montasari & et al.
    £131.99

  • by Yair Sharan, Ted J. Gordon & Elizabeth Florescu
    £120.99

  • by Stefan Rass, Quanyan Zhu, Sandra Koenig & et al.
    £164.49

  •  
    £120.99

    With our highly connected and interdependent world, the growing threat of infectious diseases and public health crisis has shed light on the requirement for global efforts to manage and combat highly pathogenic infectious diseases and other public health crisis on an unprecedented level.

  • by Stanislav Abaimov
    £97.49

    The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through its own imperfections and vulnerabilities. Moreover, quantum computers are further pushing the boundaries of what is possible, by making machine learning cyber agents faster and smarter.With the abundance of often-confusing information and lack of trust in the diverse applications of AI-based technologies, it is essential to have a book that can explain, from a cyber security standpoint, why and at what stage the emerging, powerful technology of machine learning can and should be mistrusted, and how to benefit from it while avoiding potentially disastrous consequences. In addition, this book sheds light on another highly sensitive area ΓÇô the application of machine learning for offensive purposes, an aspect that is widely misunderstood, under-represented in the academic literature and requires immediate expert attention.

  •  
    £131.99

    This is a critical analytical and leadership requirement in this age of volatility, uncertainty, complexity and ambiguity that characterizes the security landscape.This book is useful for academics, graduate students in global security, and government and security planning practitioners.

  •  
    £116.49

    Chapter "Predictive Policing in 2025: A Scenario" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

  • by Malcolm R. Dando
    £164.49

  • - Lost in Transition and Transformation
    by Lindy Heinecken
    £99.49

  • by Carl S. Young
    £105.99

    This book provides the conceptual foundation of security risk assessment and thereby enables reasoning about risk from first principles.

  •  
    £110.49

    Since the end of bipolarism, the concept of asymmetric warfare, and of asymmetric conflict in general, has been increasingly applied with regard to armed forces activities and tasks. This book presents the findings of comparative empirical research conducted in selected military units by a group of distinguished experts on military organization, who hail from the eight participating countries: Bulgaria, Cameroon, Denmark, Finland, Italy, Lithuania, the Philippines and Spain.It discusses remarks made by military leaders with extensive experience in the field regarding current doctrines on military leadership and their applicability in the field, as well as proposals and suggestions for new directions.ΓÇ£It is a complex relation, always based on respect and politeness, but often with mismatched interests.ΓÇ¥ (Army Colonel).ΓÇ£It makes you realize that there is a cultural gap. You must firstly understand who you are going to relate to, and the culture of these people, and then try to establish a certain kind of relationship.  Often the platoon commander states his objective and must try to establish a relationship, contact with the village chief.ΓÇ¥  (Army Lieutenant, Platoon Commander).ΓÇ£[In Afghanistan] We had meals with the locals, sometimes the food didnΓÇÖt taste good, but you had to eat it if you wanted to be welcomed back againΓÇ¥ (Army Captain, Company Commander).These are just some of the many voices stemming from the ground in diverse international asymmetric conflict theatres (in Iraq, in Kosovo, in AfghanistanΓǪ), comments by military officers, commanders at different hierarchical levels, asked to reflect on their experiences as military leaders in crisis response operations.Military professionals, and military leaders in particular, perceive themselves as facing ambiguous situations that require an update in their professional training, and new skills to confront unexpected and unpredictable factors. Drawing on lived experiences, the book offers insights into what a new kind of leadership means when leaders have to cope with diverse and unclear missions. It also addresses leadership styles and behaviours, as well as individual adaptive behaviours on the part of military leaders, with special reference to middle and middle-high level ranks, such as captains, majors and colonels.Given its scope, the book will appeal not only to military professionals and military affairs scholars and experts, but also to readers interested in gaining a better understanding of the challenges that international expeditionary units are facing in crisis areas around the globe. 

  • - Emerging Challenges at the Frontiers of Counter-Terrorism
     
    £39.99

    This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies.

  • - Emerging Challenges at the Frontiers of Counter-Terrorism
     
    £50.99

    This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies.

  •  
    £38.99

    This book describes an adaptable biothreat assessment process to complement overall biorisk management programs, incorporating threat management and the unique natures of biological assets.

  • - Trends and Advances
     
    £131.99

    This book provides information on data-driven infrastructure design, analytical approaches, and technological solutions with case studies for smart cities. This book aims to attract works on multidisciplinary research spanning across the computer science and engineering, environmental studies, services, urban planning and development, social sciences and industrial engineering on technologies, case studies, novel approaches, and visionary ideas related to data-driven innovative solutions and big data-powered applications to cope with the real world challenges for building smart cities.

  • - The Potential of Distributed Ledger Technology for Nonproliferation and Export Controls
     
    £120.99

    This book intersects the distributed ledger technology (DLT) community with the international security community.

  • - Development, Use, and Proliferation
     
    £120.99

    This book explores and analyzes emerging innovations within today's most cutting-edge science and technology (S&T) areas, which are cited as carrying the potential to revolutionize governmental structures, economies, and international security.

  •  
    £99.49

    By reporting end users commentaries at the end of each chapter, the relevant academic community is provided with clear indications on where to direct further technological developments in order to meet the law requirements for operational deployment, as well as the specific needs of the end users.

  • - Challenges and Solutions in Smart Environments
     
    £79.99

    Given its scope, the book offers a valuable resource for students, researchers, IT professionals and providers, citizens, consumers and policymakers involved or interested in the modern security procedures needed to protect our information and communication resources.

  •  
    £79.99

    This book, written by leaders in the protection field of critical infrastructures, provides an extended overview of the technological and operative advantages together with the security problems and challenges of the new paradigm of the Internet of Things in today's industry, also known as the Industry Internet of Things (IIoT).

  • - New Solutions to Complexity
     
    £142.49

    This book offers a new look at international security management combining practical applications and theoretical foundations for new solutions to today's complex security and safety challenges.

  •  
    £120.99

    Chapter "Predictive Policing in 2025: A Scenario" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

  • by Alexandra Jayeun Lee
    £50.99

    This book discusses that disasters, whether natural or man-made, are essentially a human phenomenon. When a city becomes gridlocked and its resources depleted, the collective resilience of those who remain on the ground becomes critical to its immediate survival and recovery.

  • by Angela L. Workman-Stark
    £45.49 - 120.99

    This book provides a roadmap for how police services can address incivility in the workplace and become more inclusive from the inside out.

  • - Concepts and Approaches for Current and Emerging Threats
     
    £120.99

    Through the examination of different themes and subjects the book provides an in depth analysis of the concept of deterrence and its utility in dealing effectively with current threats. Although the concept of deterrence precedes the Cold War, in modern times and in its traditional form deterrence is seen as the product of the Cold War, which transformed 'narrow' deterrence approaches into widespread orthodoxy. Increasingly however emerging threats and challenges call into question the traditional concept of deterrence. There are many elements that challenge the concept of deterrence and its effectiveness. For instance it is not just that the concept can be ambiguous and broad, but also there have to be a number of conditions for it to be successfully implemented.This collection contributes to a growing field of research in a relatively under-studied area of interrogating the concept of deterrence itself through a multi-disciplinary approach. Through the use of primary and secondary sources, as well as interviews, this book covers a wide range of disciplinary approaches on deterrence and the contributors cover a broad array of subjects. The research assembled here focuses on deterring extremism, conflict resolution and diplomacy, investigating technological developments, effects of globalisation, social movements, economics, the relationship of resilience to effective deterrence, and the associated complexity of contemporary interdependencies to create a contextualised concept of modern deterrence. Social science and historical methodologies are utilized to gain a comprehensive cross-section of analysis that will reveal the strengths and weaknesses of the use of deterrence as a national security strategy, as well as highlighting the various types of power available for use by the state to create multi-faceted deterrence in order to deal effectively and efficiently with complex emerging challenges.

  • - Development, Use, and Proliferation
     
    £120.99

    This book explores and analyzes emerging innovations within today's most cutting-edge science and technology (S&T) areas, which are cited as carrying the potential to revolutionize governmental structures, economies, and international security.

  • - Science, Technology and Systems
     
    £153.49

    This volume constitutes the state-of-the-art in active interrogation, widely recognized as indispensable methods for addressing current and future nuclear security needs. Written by a leading group of science and technology experts, this comprehensive reference presents technologies and systems in the context of the fundamental physics challenges and practical requirements. It compares the features, limitations, technologies, and impact of passive and active measurement techniques; describes radiation sources for active interrogation including electron and ion accelerators, intense lasers, and radioisotope-based sources; and it describes radiation detectors used for active interrogation. Entire chapters are devoted to data acquisition and processing systems, modeling and simulation, data interpretation and algorithms, and a survey of working active measurement systems. Active Interrogation in Nuclear Security is structured to appeal to a range of audiences, including graduate students, active researchers in the field, and policy analysts.The first book devoted entirely to active interrogationPresents a focused review of the relevant physicsSurveys available technologyAnalyzes scientific and technology trends Provides historical and policy context Igor Jovanovic is a Professor of Nuclear Engineering and Radiological Sciences at the University of Michigan and has previously also taught at Penn State University and Purdue University. He received his Ph.D. from University of California, Berkeley and worked as physicist at Lawrence Livermore National Laboratory. Dr. Jovanovic has made numerous contributions to the science and technology of radiation detection, as well as the radiation sources for use in active interrogation in nuclear security. He has taught numerous undergraduate and graduate courses in areas that include radiation detection, nuclear physics, and nuclear security. At University of Michigan Dr. Jovanovic is the director of Neutron Science Laboratory and is also associated with the Center for Ultrafast Optical Science. Anna Erickson is an Assistant Professor in the Nuclear and Radiological Engineering Program of the G.W. Woodruff School of Mechanical Engineering at Georgia Institute of Technology. Previously, she was a postdoctoral researcher in the Advanced Detectors Group at Lawrence Livermore National Laboratory. Dr. Erickson received her PhD from Massachusetts Institute of Technology with a focus on radiation detection for active interrogation applications. Her research interests focus on nuclear non-proliferation including antineutrino analysis and non-traditional detector design and characterization. She teaches courses in advanced experimental detection for reactor and nuclear nonproliferation applications, radiation dosimetry and fast reactor analysis.

Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.