Bøger i Advanced Sciences and Technologies for Security Applications serien
-
1.590,95 kr. This book aims to analyze from a multidisciplinary perspective the current geopolitical conflict between East and West, between two differentiated and apparently conflicting cosmogonic visions. The geopolitical evolution of the current panorama seems to lead to a new world in the field of international relations, a new board played on a planetary level. Once again, bloc geopolitics can be glimpsed in the immediate future, in which the most important actors such as Russia, China, the United States of America, and the European Union are called to position themselves with respect to the territorial and strategic ambitions of the opponent. International law seems to be overwhelmed by military actions and factual pressure on the ground, while the battle of ideas extends to the technological field and cyberspace. The different origins of the authors, with extensive academic, military, police forces, and business experience undoubtedly enriches the unique perspective that this work intendsto address, always in the attempt to enforce international law and the channels of dialogue between nations, such as the best solution to conflicts.
- Bog
- 1.590,95 kr.
-
1.972,95 kr. Ensuring cybersecurity for smart cities is crucial for a sustainable cyber ecosystem. Given the undeniable complexity of smart cities, fundamental issues such as device configurations and software updates should be addressed when it is most needed to fight cyber-crime and ensure data privacy.This book addresses the cybersecurity challenges associated with smart cities, aiming to provide a bigger picture of the concepts, intelligent techniques, practices and research directions in this area. Furthermore, this book serves as a single source of reference for acquiring knowledge on the technology, processes and people involved in the next-generation of cyber-smart cities.
- Bog
- 1.972,95 kr.
-
1.198,95 kr. This book is the first comprehensive, book-length analysis of Israel and securitization processes. It develops an original analytical framework to ameliorate the theoretical understanding of the audience component during the securitization process, drawing upon insights from both securitization theory, political psychology, and IR theory. This gives us significant new insights into why some audiences are essential to be persuaded for securitization to occur, while others are not. This book also examines the role of the United States in defining what matters in Israeli National Security. In essence, since the United States is Israel's most significant ally, it is essential for the Israeli leadership to gain the American government's support (or its lack of resistance) for almost any securitization acts. The book analyses a highly original set of interviews with prominent figures in Israel who were at the top level of the Israeli decision-making process, including members of the political and military echelons."Through unparalleled access to Israel's political and security echelons, Israel: National Security and Securitization provides a unique overview of Israel¿s decision-maker's political perception over the years". Ehud Olmert- Prime Minister of Israel 2006-2009"Israel: National Security and Securitization provides a powerful analysis of how the State of Israel confronted security threats, and what was the American involvement in the Israeli decision-making process". Amos Yadlin, IDF Military Intelligence Directorate Chief 2006-2010"This book makes us understand securitization in a novel and enlightening way, thus making a substantial contribution to our understanding of national security in general and Israeli security in particular". Gabriel Ben-Dor, University of Haifa "Wertman and Kaunert's book makes an important and unique contribution to the existing and developing literature on securitization". Kobi Michael, Institute for National Security Studies
- Bog
- 1.198,95 kr.
-
2.177,95 kr. This book aims to explore the next generation of online learning challenges including the security and privacy issues of digital transformation strategies that is required in teaching and learning. Also, what efforts does the industry need to invest in changing mind-sets and behaviours of both students and faculty members in adoption of virtual and blended learning?The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of AI, blockchain and self-sovereign identity, but also the adversarial application of AI and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting and addressing AI challenges in higher education.The book provides a valuable reference for cyber security experts and practitioners, network security professionals and higher education strategist and decision-makers. It is also aimed at researchers seeking to obtain a more profound knowledge of machine learning and deep learning in the context of cyber security and AI in higher education. Each chapter is written by an internationally renowned expert who has extensive experience in industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.
- Bog
- 2.177,95 kr.
-
1.222,95 kr. In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications. All wireless communications technologies such as Bluetooth, NFC, wireless sensors, wireless LANs, ZigBee, GSM, and others have their own challenges and security threats.This book addresses some of these challenges focusing on the implication, impact, and mitigations of the stated issues. The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of wireless networks but also the adversarial application of wireless networks and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting, and addressing wireless challenges and threats. The book also looks ahead and forecasts what attacks can be carried out in the future through the malicioususe of the wireless networks if sufficient defenses are not implemented. The research contained in the book fits well into the larger body of work on various aspects of wireless networks and cyber-security.The book provides a valuable reference for cyber-security experts, practitioners, and network security professionals, particularly those interested in the security of the various wireless networks. It is also aimed at researchers seeking to obtain a more profound knowledge in various types of wireless networks in the context of cyber-security, wireless networks, and cybercrime. Furthermore, the book is an exceptional advanced text for Ph.D. and master¿s degree programs in cyber-security, network security, cyber-terrorism, and computer science who are investigating or evaluating a security of a specific wireless network. Each chapter is written by an internationally-renowned expert who has extensive experience in law enforcement, industry, or academia. Furthermore, this bookblends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.
- Bog
- 1.222,95 kr.
-
1.678,95 kr. This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape. The digital policing landscape is dynamic and intricate, emanating from crimes that are both persistent and transnational. Globalization, human and drug trafficking, cybercrime, terrorism, and other forms of transnational crime can have a significant impact on societies around the world. This necessitates a reassessment of what crime, national security, and policing mean. Recent global events such as human and drug trafficking, the COVID-19 pandemic, violent protests, cyber threats, and terrorist activities underline vulnerabilities residing in our current security and digital policing posture. As an interdisciplinary collection of studies, this book encapsulates concepts, theories, and technology applications, offering a comprehensive analysis of current and emerging trends and threats within thecontext of national and international security. Undertaking an evidence-based approach, this book offers an extraordinarily perceptive and detailed account of issues and solutions related to the complex national and international security landscape.To this end, the book:presents insights into emerging and potential technological and methodological solutions as well as advancements in relation to integrated computational and analytical solutions that could be deployed for the purposes of national and international security;provides a comprehensive analysis of technical, ethical, legal, privacy, and civil liberty challenges stemming from the aforementioned advancements;and, accordingly, offers detailed recommendations supporting the design and implementation of best practices including technical, ethical, and legal approaches for national and international security uses.The research contained in the book fits well into thelarger body of work on various aspects of AI, cybersecurity, national security, digital forensics, cyberterrorism, ethics, human rights, cybercrime, and law. It provides a valuable reference for LEAs and security organizations, policymakers, cybersecurity experts, digital forensic practitioners, researchers, academicians, graduates and advanced undergraduates, and other stakeholders with an interest in national and global security.
- Bog
- 1.678,95 kr.
-
1.291,95 - 1.300,95 kr. - Bog
- 1.291,95 kr.
-
1.378,95 - 1.388,95 kr. - Bog
- 1.378,95 kr.
-
562,95 - 812,95 kr. - Bog
- 562,95 kr.
-
1.965,95 - 1.974,95 kr. - Bog
- 1.965,95 kr.
-
1.793,95 - 1.803,95 kr. - Bog
- 1.793,95 kr.
-
1.785,95 kr. This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security. It draws insights from a range of diverse fields, including Computer Science, Social Science, Political Science, International Relations, Criminology, and Law. Furthermore, the book investigates the field of Artificial Intelligence (AI) and related technologies, exploring their dual role in this dynamic landscape of contemporary cyberthreats, with both constructive and malicious implications.The book comprises four distinct themes, with each theme represented by a dedicated Part. Within this organisational framework, each overarching theme is systematically explored through a series of chapters, providing readers with a clear and thematic roadmap for their journey through the content.Part I, Understanding Terrorism and Counter-Terrorism Strategies, of the book explores complexities surrounding contemporary global security challenges. It serves as the foundational segment of the book, consisting of three chapters that critically analyse various dimensions of terrorism and the strategies implemented to combat it.Part II, Cyberterrorism Landscape, of the book offers an in-depth assessment of the current cyberterrorism landscape. This section comprises two critical chapters, each contributing to a comprehensive understanding of the contemporary threats posed by cyberterrorism and their implications for national security.Part III, Countering Cyberterrorism with Technology, of the book forms the core of the book's exploration into leveraging technology to mitigate the threats of cyberterrorism. This section includes four critical chapters, collectively providing an in-depth understanding of the intersection between technology and counterterrorism strategies.Part IV, Artificial Intelligence and National and International Security, of the book delves into the complex relationship between AI technology and the broader security landscape. Comprising three pivotal chapters, this section provides a detailed understanding of AI's transformative role in shaping the future of national and international security.
- Bog
- 1.785,95 kr.