We a good story
Quick delivery in the UK

Books in the Advanced Sciences and Technologies for Security Applications series

Filter
Filter
Sort bySort Series order
  • - Security and Sovereignty in an Uncertain World
     
    £104.49

    The protection of the homeland is the top priority for U.S. national security strategy. Strategic defense, however, has been an overlooked dimension in the vast literature on the U.S. strategic posture, with even less attention given to the necessity and dynamics of security collaboration within North America. Drawing on the expertise of scholars from the U.S., Canada and Mexico, the book offers a wide range of perspectives on recent trends in, and future prospects for, the military and political evolution of North American strategic defense.North American strategic defense is a topic too often taken for granted: as this excellent book shows, that is a mistake. In the 21st century, perhaps even more than the 20th, it will be an issue of cardinal importance to both the United States and Canada.Eliot A. CohenRobert E. Osgood Professor of Strategic Studies, Johns Hopkins School of Advanced International StudiesNORAD's binational command is unique, and this timely and ambitious book examines its continued relevance to North American defense against a host of new global threats. It broadens the focus of what we mean by North American defense, contemplates how we might include Mexico in various regional security arrangements, and considers the dynamics of expanded North American interdependence in the Trump era.Laura DawsonDirector of the Canada Institute, Woodrow Wilson International Center for ScholarsNorth American Strategic Defense in the 21st Century is an important book. This edited volume brings together a galaxy of stars, both rising and established, with outstanding credentials regarding NORAD and associated matter in the study of security. This original and well-written volume is the first of its kind since the Cold War - long overdue and impressive in contents. The chapters cover both panoramic issues and more specific matters, and the collection is essential reading for academics, policy-makers and the general public.Patrick JamesDornsife Dean's Professor, School of International Relations, University of Southern California

  •  
    £114.49

    Chapter "Predictive Policing in 2025: A Scenario" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

  • - New Solutions to Complexity
     
    £134.99

    This book offers a new look at international security management combining practical applications and theoretical foundations for new solutions to today's complex security and safety challenges.

  •  
    £93.99

    Chapters provide innovative thinking on themes including cyber security, maritime security, transnational crime, human security, globalization and economic security.

  • by Alexandra Jayeun Lee
    £47.99

    This book discusses that disasters, whether natural or man-made, are essentially a human phenomenon. When a city becomes gridlocked and its resources depleted, the collective resilience of those who remain on the ground becomes critical to its immediate survival and recovery.

  • - A Transformative Approach
     
    £165.49

    The book systematically deals with the core aspects of urban resilience: systems, management issues and populations.The taxonomy can be broken down into threats, systems, resilience cycles and recovery types in the context of urban resilience.

  • - Challenges, Trends and Priorities
     
    £114.49

    This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first time, it provides security practitioners with a trusted reference and resource designed to guide them through the complexities and operational challenges associated with the management of contemporary and emerging cybercrime and cyberterrorism (CC/CT) issues.Benefiting from the input of three major European Commission funded projects the book's content is enriched with case studies, explanations of strategic responses and contextual information providing the theoretical underpinning required for the clear interpretation and application of cyber law, policy and practice, this unique volume helps to consolidate the increasing role and responsibility of society as a whole, including law enforcement agencies (LEAs), the private sector and academia, to tackle CC/CT. This new contribution to CC/CT knowledge follows a multi-disciplinary philosophy supported by leading experts across academia, private industry and government agencies. This volume goes well beyond the guidance of LEAs, academia and private sector policy documents and doctrine manuals by considering CC/CT challenges in a wider practical and operational context. It juxtaposes practical experience and, where appropriate, policy guidance, with academic commentaries to reflect upon and illustrate the complexity of cyber ecosystem ensuring that all security practitioners are better informed and prepared to carry out their CC/CT responsibilities to protect the citizens they serve.

  • - Technologies for Civilian, Military and Cyber Surveillance
     
    £144.99

    This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including gait recognition, face-based physiology-assisted recognition, face recognition in the visible and infrared bands, and cross-spectral iris recognition.The second part of the book, Surveillance for Security and Defense, discusses the ethical issues raised by the use of surveillance systems in the name of combatting terrorism and ensuring security. It presents different generations of satellite surveillance systems and discusses the requirements for real-time satellite surveillance in military contexts. In addition, it explores the new standards of surveillance using unmanned air vehicles and drones, proposes surveillance techniques for detecting stealth aircrafts and drones, and highlights key techniques for maritime border surveillance, bio-warfare and bio-terrorism detection.The last part of the book, Cyber Surveillance, provides a review of data hiding techniques that are used to hinder electronic surveillance. It subsequently presents methods for collecting and analyzing information from social media sites and discusses techniques for detecting internal and external threats posed by various individuals (such as spammers, cyber-criminals, suspicious users or extremists in general). The book concludes by examining how high-performance computing environments can be exploited by malicious users, and what surveillance methods need to be put in place to protect these valuable infrastructures. The book is primarily intended for military and law enforcement personnel who use surveillance-related technologies, as well as researchers, Master¿s and Ph.D. students who are interested in learning about the latest advances in military, civilian and cyber surveillance.

  • - A Critical Assessment
    by Peter Lehr
    £90.49

    This book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future. The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies - weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that promise an increase in safety and security when it comes to the dangers posed by these terrorists. This part also includes a critical discussion of advantages and disadvantages of such technologies that are, quite often, sold as a 'silver bullet' approach in the fight against terrorism. Controversies such as those triggered by the abuse of millimeter wave scanners deployed at several Western European airports will demonstrate that there are costs involved with regard to human rights. The third, analytical part takes the critical discussion further by arguing that the uncritical fielding of new surveillance and control technologies in parallel with the on-going outsourcing and privatization of key services of the state could well lead to dystopias as envisaged in a rather prescient way by the so-called cyperpunk novels of the 1980s. The book concludes with the question that any liberal democracy should ask itself: how far can we go with regard to hardening our societies against terrorist threats?

  •  
    £104.49

    This book contributes to the current knowledge and research on conflict and cross-cultural dialogue, emphasizing how respect, tolerance and dialogue may be quite effective tools for bridging the diverse cultures and, consequently, for solving many of the conflicts of today's world, characterized by a dynamic interchange of populations with very diverse cultural and ethnic backgrounds. For this purpose, we rely on reputed scholars from ten different countries, and from different cultures and fields of expertise, which allows for diverse contributions from a valuable interdisciplinary perspective. The first section of the book deals with the correlation between cultural differences and conflict, while also showing how such conflicts can be prevented and, should they arise, managed and solved. The second section addresses a different, more specific issue: how cultural expression means and tools for cultural communication may lead to conflict whereas they may help to avoid it as well. Finally, the third section analyzes how legal and justice systems deal with cross-cultural conflicts as well as with situations which may lead to cross-cultural conflicts, thus assessing to which extent such systems contribute to avoid and/or solve such kind of conflicts.

  • - Innovative Perspectives on Complex Problems
     
    £114.49

    This edited book captures salient global security challenges and presents 'design' solutions in dealing with wicked problems. These global risks have been in the headlines in the last year (Global Risks Report) and pose significant security challenges both nationally and globally.

  • by Genserik Reniers & Laobing Zhang
    £47.99

    This book systematically studies how game theory can be used to improve security in chemical industrial areas, capturing the intelligent interactions between security managers and potential adversaries.

  • - Science, Technology and Systems
     
    £144.99

    This volume constitutes the state-of-the-art in active interrogation, widely recognized as indispensable methods for addressing current and future nuclear security needs. Written by a leading group of science and technology experts, this comprehensive reference presents technologies and systems in the context of the fundamental physics challenges and practical requirements. It compares the features, limitations, technologies, and impact of passive and active measurement techniques; describes radiation sources for active interrogation including electron and ion accelerators, intense lasers, and radioisotope-based sources; and it describes radiation detectors used for active interrogation. Entire chapters are devoted to data acquisition and processing systems, modeling and simulation, data interpretation and algorithms, and a survey of working active measurement systems. Active Interrogation in Nuclear Security is structured to appeal to a range of audiences, including graduate students, active researchers in the field, and policy analysts.The first book devoted entirely to active interrogationPresents a focused review of the relevant physicsSurveys available technologyAnalyzes scientific and technology trends Provides historical and policy context Igor Jovanovic is a Professor of Nuclear Engineering and Radiological Sciences at the University of Michigan and has previously also taught at Penn State University and Purdue University. He received his Ph.D. from University of California, Berkeley and worked as physicist at Lawrence Livermore National Laboratory. Dr. Jovanovic has made numerous contributions to the science and technology of radiation detection, as well as the radiation sources for use in active interrogation in nuclear security. He has taught numerous undergraduate and graduate courses in areas that include radiation detection, nuclear physics, and nuclear security. At University of Michigan Dr. Jovanovic is the director of Neutron Science Laboratory and is also associated with the Center for Ultrafast Optical Science. Anna Erickson is an Assistant Professor in the Nuclear and Radiological Engineering Program of the G.W. Woodruff School of Mechanical Engineering at Georgia Institute of Technology. Previously, she was a postdoctoral researcher in the Advanced Detectors Group at Lawrence Livermore National Laboratory. Dr. Erickson received her PhD from Massachusetts Institute of Technology with a focus on radiation detection for active interrogation applications. Her research interests focus on nuclear non-proliferation including antineutrino analysis and non-traditional detector design and characterization. She teaches courses in advanced experimental detection for reactor and nuclear nonproliferation applications, radiation dosimetry and fast reactor analysis.

  •  
    £98.99

    This book, written by leaders in the protection field of critical infrastructures, provides an extended overview of the technological and operative advantages together with the security problems and challenges of the new paradigm of the Internet of Things in today's industry, also known as the Industry Internet of Things (IIoT).

  •  
    £93.99

    Chapters provide innovative thinking on themes including cyber security, maritime security, transnational crime, human security, globalization and economic security.

  • by Genserik Reniers & Laobing Zhang
    £47.99

    This book systematically studies how game theory can be used to improve security in chemical industrial areas, capturing the intelligent interactions between security managers and potential adversaries.

  • - A Critical Assessment
    by Peter Lehr
    £90.49

    This book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future. The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies - weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that promise an increase in safety and security when it comes to the dangers posed by these terrorists. This part also includes a critical discussion of advantages and disadvantages of such technologies that are, quite often, sold as a 'silver bullet' approach in the fight against terrorism. Controversies such as those triggered by the abuse of millimeter wave scanners deployed at several Western European airports will demonstrate that there are costs involved with regard to human rights. The third, analytical part takes the critical discussion further by arguing that the uncritical fielding of new surveillance and control technologies in parallel with the on-going outsourcing and privatization of key services of the state could well lead to dystopias as envisaged in a rather prescient way by the so-called cyperpunk novels of the 1980s. The book concludes with the question that any liberal democracy should ask itself: how far can we go with regard to hardening our societies against terrorist threats?

Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.