|
|
Click the serial number on the left to view the details of the item. |
# |
Author | Title | Accn# | Year | Item Type | Claims |
1 |
Berkman, Paul Arthur |
Building Common Interests in the Arctic Ocean with Global Inclusion |
I12560 |
2022 |
Book |
|
2 |
Abaimov, Stanislav |
Machine Learning for Cyber Agents |
I12486 |
2022 |
Book |
|
3 |
Long, Teng |
Wideband Radar |
I12368 |
2022 |
Book |
|
4 |
Hachikyan, Pavel Pavlovich |
Countering Air Terrorism |
I12325 |
2022 |
Book |
|
5 |
Masys, Anthony J |
Handbook of Security Science |
I12218 |
2022 |
Book |
|
6 |
Hendricks, John S |
Monte Carlo N-Particle Simulations for Nuclear Detection and Safeguards |
I12217 |
2022 |
Book |
|
7 |
Kov??cs, T??nde Anna |
Security-Related Advanced Technologies in Critical Infrastructure Protection |
I12190 |
2022 |
Book |
|
8 |
Kaiwartya, Omprakash |
Security and Privacy in Cyberspace |
I12183 |
2022 |
Book |
|
9 |
Visvizi, Anna |
Artificial Intelligence and Its Contexts |
I11916 |
2021 |
eBook |
|
10 |
Nacht, Michael |
Nuclear Security |
I11912 |
2021 |
eBook |
|
|
1.
|
 |
Title | Building Common Interests in the Arctic Ocean with Global Inclusion : Volume 2 |
Author(s) | Berkman, Paul Arthur;Vylegzhanin, Alexander N;Young, Oran R;Balton, David A;??vretveit, Ole Rasmus |
Publication | Cham, 1. Imprint: Springer
2. Springer International Publishing, 2022. |
Description | XL, 451 p. 72 illus., 67 illus. in color : online resource |
Abstract Note | This book contains an inclusive compilation of perspectives about the Arctic Ocean with contributions that extend from Indigenous residents and early career scientists to Foreign Ministers, involving perspectives across the spectrum of subnational-national-international jurisdictions. The Arctic Ocean is being transformed with global climate warming into a seasonally ice-free sea, creating challenges as well as opportunities that operate short-to-long term, underscoring the necessity to make informed decisions across a continuum of urgencies from security to sustainability time scales. The Arctic Ocean offers a case study with lessons that are especially profound at this moment when humankind is exposed to a pandemic, awakening a common interest in survival across our globally-interconnected civilization unlike any period since the Second World War. This second volume in the Informed Decisionmaking for Sustainability series reveals that building global inclusion involves common interests to address changes effectively ???for the benefit of all on Earth across generations.??? |
ISBN,Price | 9783030893125 |
Keyword(s) | 1. EBOOK
2. EBOOK - SPRINGER
3. Environmental law
4. Environmental sciences???Social aspects
5. Environmental Social Sciences
6. International economic relations
7. INTERNATIONAL ECONOMICS
8. Ocean Sciences
9. OCEANOGRAPHY
10. Security Science and Technology
11. Security systems
|
Item Type | Book |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I12560 |
|
|
On Shelf |
|
|
|
|
2.
|
 |
Title | Machine Learning for Cyber Agents : Attack and Defence |
Author(s) | Abaimov, Stanislav;Martellini, Maurizio |
Publication | Cham, 1. Imprint: Springer
2. Springer International Publishing, 2022. |
Description | XV, 227 p. 27 illus., 23 illus. in color : online resource |
Abstract Note | The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through its own imperfections and vulnerabilities. Moreover, quantum computers are further pushing the boundaries of what is possible, by making machine learning cyber agents faster and smarter. With the abundance of often-confusing information and lack of trust in the diverse applications of AI-based technologies, it is essential to have a book that can explain, from a cyber security standpoint, why and at what stage the emerging, powerful technology of machine learning can and should be mistrusted, and how to benefit from it while avoiding potentially disastrous consequences. In addition, this book sheds light on another highly sensitive area ??? the application of machine learning for offensive purposes, an aspect that is widely misunderstood, under-represented in the academic literature and requires immediate expert attention |
ISBN,Price | 9783030915858 |
Keyword(s) | 1. Computer networks???Security measures
2. Data and Information Security
3. Data protection
4. EBOOK
5. EBOOK - SPRINGER
6. MACHINE LEARNING
7. Mobile and Network Security
8. Security Science and Technology
9. Security systems
|
Item Type | Book |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I12486 |
|
|
On Shelf |
|
|
|
|
3.
|
 |
Title | Wideband Radar |
Author(s) | Long, Teng;Li, Yang;Zhang, Weifeng;Liu, Quanhua;Chen, Xinliang;Tian, Weiming;Yang, Xiaopeng |
Publication | Singapore, 1. Imprint: Springer
2. Springer Nature Singapore, 2022. |
Description | VIII, 197 p. 100 illus., 65 illus. in color : online resource |
Abstract Note | Wideband Radar focuses on system theories and signal processing techniques for wideband radar systems. Author Professor Teng Long and his fellows present a comprehensive introduction to the fundamental theory, latest technology developments in signal processing and recent progresses in civil applications of wideband radar. Each chapter begins with an introduction describing what a reader will find in that chapter. The book is addressed to all scientists, whether at universities or in industry, who wish to keep abreast of the important advances in wideband radar. We look forward to further excitement ahead and new developments in wideband radar, and we hope to share them with you, our esteemed readers |
ISBN,Price | 9789811975615 |
Keyword(s) | 1. EBOOK
2. EBOOK - SPRINGER
3. ELECTRONIC DEVICES
4. MEASUREMENT
5. Measurement Science and Instrumentation
6. MEASURING INSTRUMENTS
7. Microwaves, RF Engineering and Optical Communications
8. Security Science and Technology
9. Security systems
10. SEMICONDUCTORS
11. SIGNAL PROCESSING
12. Signal, Speech and Image Processing
13. SOLID STATE PHYSICS
14. TELECOMMUNICATION
|
Item Type | Book |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I12368 |
|
|
On Shelf |
|
|
|
|
4.
|
 |
Title | Countering Air Terrorism |
Author(s) | Hachikyan, Pavel Pavlovich |
Publication | Singapore, 1. Imprint: Springer
2. Springer Nature Singapore, 2022. |
Description | XIV, 139 p. 49 illus., 16 illus. in color : online resource |
Abstract Note | This book examines the issues of ensuring anti-terrorist security of an aviation enterprise, provides a history of terrorism in the aviation sector, and analyzes the legal regulations. This book provides mathematical and mathematical???psychological models for reducing the risk of terrorist threats, which makes it possible to objectively increase the safety of air transport facilities, reduce the likelihood of terrorist attacks, save human lives and prevent significant material losses. The solutions of general humanistic problems proposed in the book???preventing accidents and preserving the world???are an original feature of the book, which allows one to treat it with the necessary attention and interest for the reader. The concept of anti-terrorist security of an aviation enterprise presented in this book has been widely tested and introduced into the activities of leading aviation enterprises, including the Interstate Aviation Committee (IAC), and has been used in the investigation of aviation accidents. This book is written for a wide range of audience associated with ensuring aviation transport security and for the end users of airlines???passengers, in order to expand their knowledge about the reliability of using air transport. |
ISBN,Price | 9789811961724 |
Keyword(s) | 1. Aerospace engineering
2. Aerospace Technology and Astronautics
3. ASTRONAUTICS
4. EBOOK
5. EBOOK - SPRINGER
6. Mathematical Modeling and Industrial Mathematics
7. MATHEMATICAL MODELS
8. Political violence
9. Security Science and Technology
10. Security systems
11. TERRORISM
12. Terrorism and Political Violence
|
Item Type | Book |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I12325 |
|
|
On Shelf |
|
|
|
|
5.
|
 |
Title | Handbook of Security Science |
Author(s) | Masys, Anthony J |
Publication | Cham, 1. Imprint: Springer
2. Springer International Publishing, 2022. |
Description | 97 illus., 58 illus. in color. eReference : online resource |
Abstract Note | This handbook offers insights into how science (physical, natural and social) and technology can support new developments to manage the complexity resident within the threat and risk landscape. The security landscape can be described as dynamic and complex stemming from the emerging threats and risks that are both persistent and transborder. Globalization, climate change, terrorism, transnational crime can have significant societal impact and forces one to re-evaluate what ???national security??? means. Recent global events such as mass migration, terrorist acts, pandemics and cyber threats highlight the inherent vulnerabilities in our current security posture. As an interdisciplinary body of work, the Handbook of Security Science captures concepts, theories and security science applications, thereby providing a survey of current and emerging trends in security. Through an evidence-based approach, the collection of chapters in the book delivers insightful and comprehensive articulation of the problem and solution space associated with the complex security landscape. In so doing the Handbook of Security Science introduces scientific tools and methodologies to inform security management, risk and resilience decision support systems; insights supporting design of security solutions; approaches to threat, risk and vulnerability analysis; articulation of advanced cyber security solutions; and current developments with respect to integrated computational and analytical solutions that increase our understanding of security physical, social, economic, and technological interrelationships and problem space |
ISBN,Price | 9783319918754 |
Keyword(s) | 1. Computer crimes
2. Crime Control and Security
3. Criminology
4. Cybercrime
5. EBOOK
6. EBOOK - SPRINGER
7. Environmental sciences???Social aspects
8. Environmental Social Sciences
9. International Security Studies
10. Military and Defence Studies
11. Politics and war
12. Security Science and Technology
13. Security systems
14. Security, International
|
Item Type | Book |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I12218 |
|
|
On Shelf |
|
|
|
|
6.
|
 |
Title | Monte Carlo N-Particle Simulations for Nuclear Detection and Safeguards : An Examples-Based Guide for Students and Practitioners |
Author(s) | Hendricks, John S;Swinhoe, Martyn T;Favalli, Andrea |
Publication | Cham, 1. Imprint: Springer
2. Springer International Publishing, 2022. |
Description | XV, 307 p. 106 illus., 82 illus. in color : online resource |
Abstract Note | This open access book is a pedagogical, examples-based guide to using the Monte Carlo N-Particle (MCNP??) code for nuclear safeguards and non-proliferation applications. The MCNP code, general-purpose software for particle transport simulations, is widely used in the field of nuclear safeguards and non-proliferation for numerous applications including detector design and calibration, and the study of scenarios such as measurement of fresh and spent fuel. This book fills a gap in the existing MCNP software literature by teaching MCNP software usage through detailed examples that were selected based on both student feedback and the real-world experience of the nuclear safeguards group at Los Alamos National Laboratory. MCNP input and output files are explained, and the technical details used in MCNP input file preparation are linked to the MCNP code manual. Benefiting from the authors??? decades of experience in MCNP simulation, this book is essential reading for students, academic researchers, and practitioners whose work in nuclear physics or nuclear engineering is related to non-proliferation or nuclear safeguards. Each chapter comes with downloadable input files for the user to easily reproduce the examples in the text |
ISBN,Price | 9783031041297 |
Keyword(s) | 1. Computational Physics and Simulations
2. COMPUTER SIMULATION
3. EBOOK
4. EBOOK - SPRINGER
5. Environmental monitoring
6. MATHEMATICAL PHYSICS
7. NUCLEAR ENERGY
8. NUCLEAR ENGINEERING
9. NUCLEAR PHYSICS
10. Refuse and refuse disposal
11. Security Science and Technology
12. Security systems
13. Waste Management/Waste Technology
|
Item Type | Book |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I12217 |
|
|
On Shelf |
|
|
|
|
7.
|
 |
Title | Security-Related Advanced Technologies in Critical Infrastructure Protection : Theoretical and Practical Approach |
Author(s) | Kov??cs, T??nde Anna;Nyikes, Zolt??n;F??rstner, Igor |
Publication | Dordrecht, 1. Imprint: Springer
2. Springer Netherlands, 2022. |
Description | XIV, 469 p. 113 illus. in color : online resource |
Abstract Note | This book collects the latest research results on security-related advanced technologies. The chapters contain relevant and interesting topics from numerous research. Data science and artificial intelligence research nowadays one of the most important topics for the industry and the security sectors. The autonomy and counter-autonomy research topic are also very interesting. Autonomous cars have become a part of the common days, but their safe and secure application is not assured. The research results in this field want to support and assure safe and secure autonomous applications in our quotidian life. Also, the safe and secure robotics in the industries and the defence assure a high standard of living and the given research results in this area can use to increase it. The researchers work on it and publish the results that can be interesting for the other researchers and the innovators, but also the industrial part members. The researchers work on it and publish the results that can be interesting for the other researchers and the innovators, but also the industrial part members. Communication is a part of our life, but the communication systems mesh all around the world. Communication is the basis of modern life because without it life stop. One other interesting and very important research area is the material sciences. Virtual life cannot exist without hardware and materials. The new technical applications require new materials, that can suffice the mechanical and physical, chemical properties demand. Nowadays a common requirement of the materials the high strength and lightweight. Researchers want to serve the industrial requests and innovate new composite materials or increase the properties of the material through a new technological process. The authors publish the latest results of the security-related research area including the newest innovations and technologies which rise the interest of the defence and the modern industries even the interest of other researchers |
ISBN,Price | 9789402421743 |
Keyword(s) | 1. Cooperating objects (Computer systems)
2. Cyber-Physical Systems
3. EBOOK
4. EBOOK - SPRINGER
5. Science and Technology Studies
6. Science???Social aspects
7. Security Science and Technology
8. Security systems
|
Item Type | Book |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I12190 |
|
|
On Shelf |
|
|
|
|
8.
|
 |
Title | Security and Privacy in Cyberspace |
Author(s) | Kaiwartya, Omprakash;Kaushik, Keshav;Gupta, Sachin Kumar;Mishra, Ashutosh;Kumar, Manoj |
Publication | Singapore, 1. Imprint: Springer
2. Springer Nature Singapore, 2022. |
Description | VI, 226 p. 113 illus., 76 illus. in color : online resource |
Abstract Note | This book highlights the literature and the practical aspects to understand cybersecurity and privacy in various networks and communication devices. It provides details of emerging technologies on various networks by protecting the privacy and security of cyberspace. This book presents state-of-the-art advances in the field of cryptography and network security, cybersecurity and privacy, providing a good reference for professionals and researchers |
ISBN,Price | 9789811919602 |
Keyword(s) | 1. Blockchain
2. Blockchains (Databases)
3. Data Analysis and Big Data
4. EBOOK
5. EBOOK - SPRINGER
6. Internet of things
7. Quantitative research
8. QUANTUM COMMUNICATION
9. Quantum Communications and Cryptography
10. Security Science and Technology
11. Security systems
|
Item Type | Book |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I12183 |
|
|
On Shelf |
|
|
|
|
9.
|
 |
Title | Artificial Intelligence and Its Contexts : Security, Business and Governance |
Author(s) | Visvizi, Anna;Bodziany, Marek |
Publication | Cham, Springer International Publishing, 2021. |
Description | VIII, 240 p. 31 illus., 13 illus. in color : online resource |
Abstract Note | This book offers a comprehensive approach to the question of how artificial intelligence (AI) impacts politics, economy, and the society today. In this view, it is quintessential for understanding the complex nature of AI and its role in today???s world. The book has been divided into three parts. Part one is devoted to the question of how AI will be used for security and defense purposes, including combat in war zones. Part two looks at the value added of AI and machine learning for decision-making in the fields of politics and business. Part three consists of case studies???covering the EU, the USA, Saudi Arabia, Portugal, and Poland???that discuss how AI is being used in the realms of politics, security and defense. The discussion in the book opens with the question of the nature of AI, as well as of ethics and the use of AI in combat. Subsequently, the argument covers issues as diverse as the militarization of AI, the use of AI in strategic studies and military strategy design. These topics are followed by an insight into AI and strategic communication (StratCom), including disinformation, as well as into AI and finance. The case-studies included in part 3 of the book offer a captivating overview of how AI is being employed to stimulate growth and development, to promote data- and evidence-driven policy-making, to enable efficient and inclusive digital transformation and other related issues. Written by academics and practitioners in an academically sound, yet approachable manner, this volume queries issues and topics that form the thrust of processes that transform world politics, economics and society. As such, this volume will serve as the primer for students, researchers, lectures and other professionals who seek to understand and engage with the variety of issues AI implicates |
ISBN,Price | 9783030889722 |
Keyword(s) | 1. ARTIFICIAL INTELLIGENCE
2. Computer crimes
3. Cybercrime
4. EBOOK
5. EBOOK - SPRINGER
6. Security Science and Technology
7. Security systems
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I11916 |
|
|
On Shelf |
|
|
|
|
10.
|  |
Title | Nuclear Security : The Nexus Among Science, Technology and Policy |
Author(s) | Nacht, Michael;Frank, Michael;Prussin, Stanley |
Publication | Cham, Springer International Publishing, 2021. |
Description | XVII, 340 p. 77 illus., 44 illus. in color : online resource |
Abstract Note | This textbook is the first comprehensive and systematic account of the science, technology and policy issues associated with nuclear energy and nuclear weapons. Throughout their account of the evolution of nuclear policy, from its origin to the early Trump presidency, the authors interweave clear technical expositions of the science and technology that underpin and constrain it. The book begins by tracing the early work in atomic physics, the discovery of fission, and the developments that led to the Manhattan Project and the delivery of atomic bombs against Japan that ended World War II. It follows the initial failed attempts at nuclear disarmament, the onset of the Cold War nuclear arms competition, and the development of light water reactors to harness nuclear energy for electric power generation. The authors thoroughly unpack the problem of nuclear proliferation, examining the strategy and incentives for states that have and have not pursued nuclear weapons, and providing an overview of the nuclear arsenals of the current nuclear weapon states. They trace the technical, political and strategic evolution of deterrence, arms control and disarmament policies from the first attempts for an Outer Space Treaty in 1957 through the new START treaty of 2009. At critical junctures in the narrative, the authors explain the relevant nuclear science and technology including nuclear fission and criticality; nuclear materials and enrichment; nuclear detonation and nuclear weapons effects; nuclear weapons stockpile constraints, stewardship and surveillance; nuclear fusion and thermonuclear weapons; technologies for monitoring, verification and proliferation; and nuclear forensics. They conclude with an assessment of contemporary issues ranging from the Joint Comprehensive Plan of Action reached to halt Iran???s nuclear weapons development program, to the threat of nuclear terrorism, the perceived nuclear weapons policies of Russia and China, and the US efforts to provide disincentives for its allies to acquire their own nuclear weapons by maintaining credible security guarantees |
ISBN,Price | 9783030750855 |
Keyword(s) | 1. EBOOK
2. EBOOK - SPRINGER
3. Energy and state
4. Energy policy
5. Energy Policy, Economics and Management
6. International Security Studies
7. NUCLEAR ENERGY
8. NUCLEAR ENGINEERING
9. Security Science and Technology
10. Security systems
11. Security, International
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I11912 |
|
|
On Shelf |
|
|
|
| |