SLIM21

Sort Order Display Format Items / Page  
 
  Click the serial number on the left to view the details of the item.
 #  AuthorTitleAccn#YearItem Type Claims
41 Kollmitzer, Christian Quantum Random Number Generation I08800 2020 eBook  
42 Malizia, Andrea Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference I08562 2018 eBook  
43 Schneier, Bruce Beyond Fear I10940 2003 eBook  
44 Thoma, Klaus European Perspectives on Security Research I08524 2011 eBook  
45 Pereira, Mauro F Terahertz and Mid Infrared Radiation: Detection of Explosives and CBRN (Using Terahertz) I08433 2014 eBook  
46 Masys, Anthony J Networks and Network Analysis for Defence and Security I08365 2014 eBook  
47 Phelan, Dominic Cold War Space Sleuths I08106 2013 eBook  
48 Apikyan, Samuel Nuclear Terrorism and National Preparedness I07697 2015 eBook  
49 Fellman, Philip Vos Conflict and Complexity I07689 2015 eBook  
50 Tansel Ozyer (ed.) Mining Social Networks and Security Informatics I07598 2013 eBook  
(page:5 / 6) [#59] First Page   Previous Page   Next Page   Last Page 

41.    
No image available
TitleQuantum Random Number Generation : Theory and Practice
Author(s)Kollmitzer, Christian;Schauer, Stefan;Rass, Stefan;Rainer, Benjamin
PublicationCham, Springer International Publishing, 2020.
DescriptionXXI, 120 p. 49 illus., 33 illus. in color : online resource
Abstract NoteThis book provides an overview of state-of-the-art implementations of quantum random number generators (QRNGs), and especially examines their relation to classical statistical randomness models and numerical techniques for computing random numbers. The reader ??? who ideally has a background in classical statistics, computer science, or cryptography ??? is introduced to the world of quantum bits step by step, and explicit relations between QRNGs and their classical counterparts are identified along the way. Random number generation is a major pillar of cryptography. Capitalizing on the randomness inherent in quantum phenomena is a rapidly evolving branch of quantum cryptography with countless applications for the future. The value of quantum randomness for cryptographic purposes is empirically demonstrated in statistical evaluations of QRNGs??? performance compared to classical techniques for true and pseudorandom number generation. The book then provides an overview of technical implementations of QRNGs, before a concluding discussion of major achievements and remaining obstacles in the field rounds out the coverage, while also opening the door for future research directions
ISBN,Price9783319725963
Keyword(s)1. Data structures (Computer science) 2. Data Structures and Information Theory 3. EBOOK 4. EBOOK - SPRINGER 5. Mathematical Applications in the Physical Sciences 6. MATHEMATICAL PHYSICS 7. QUANTUM COMPUTERS 8. Quantum computing 9. QUANTUM PHYSICS 10. Security Science and Technology 11. System safety
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I08800     On Shelf    

42.     
No image available
TitleEnhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference : Science as the first countermeasure for CBRNE and Cyber threats
Author(s)Malizia, Andrea;D'Arienzo, Marco
PublicationCham, Springer International Publishing, 2018.
DescriptionXII, 458 p. 160 illus., 140 illus. in color : online resource
Abstract NoteThis book presents the proceedings of SICC 2017, a conference devoted to promoting the dissemination of the different methodologies, techniques, theories, strategies, technologies and best practices on the prevention and mitigation of CBRNE risks. As the first scientific international conference on safety & security issues in the CBRNE field, SICC 2017 attracted contributions resulting from fruitful inter-professional collaborations between university and military experts, specialized operators, decision makers and the industry. As such, these proceedings are primarily intended for academics and professionals from public, private and military entities. It is the first trans-disciplinary collection of scientific papers from the numerous fields related to CBRNE
ISBN,Price9783319917917
Keyword(s)1. CHEMISTRY 2. COMPUTER SECURITY 3. Data protection 4. EBOOK 5. EBOOK - SPRINGER 6. Effects of Radiation/Radiation Protection 7. Radiation protection 8. Radiation???Safety measures 9. Safety in Chemistry, Dangerous Goods 10. Security 11. Security Science and Technology 12. System safety 13. Systems and Data Security
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I08562     On Shelf    

43.     
No image available
TitleBeyond Fear : Thinking Sensibly About Security in an Uncertain World
Author(s)Schneier, Bruce
PublicationNew York, NY, 1. Imprint: Copernicus 2. Springer New York, 2003.
DescriptionVIII, 296 p : online resource
Abstract NoteMany of us, especially since 9/11, have become personally concerned about issues of security, and this is no surprise. Security is near the top of government and corporate agendas around the globe. Security-related stories appear on the front page everyday. How well though, do any of us truly understand what achieving real security involves? In Beyond Fear, Bruce Schneier invites us to take a critical look at not just the threats to our security, but the ways in which we're encouraged to think about security by law enforcement agencies, businesses of all shapes and sizes, and our national governments and militaries. Schneier believes we all can and should be better security consumers, and that the trade-offs we make in the name of security - in terms of cash outlays, taxes, inconvenience, and diminished freedoms - should be part of an ongoing negotiation in our personal, professional, and civic lives, and the subject of an open and informed national discussion. With a well-deserved reputation for original and sometimes iconoclastic thought, Schneier has a lot to say that is provocative, counter-intuitive, and just plain good sense. He explains in detail, for example, why we need to design security systems that don't just work well, but fail well, and why secrecy on the part of government often undermines security. He also believes, for instance, that national ID cards are an exceptionally bad idea: technically unsound, and even destructive of security. And, contrary to a lot of current nay-sayers, he thinks online shopping is fundamentally safe, and that many of the new airline security measure (though by no means all) are actually quite effective. A skeptic of much that's promised by highly touted technologies like biometrics, Schneier is also a refreshingly positive, problem-solving force in the often self-dramatizing and fear-mongering world of security pundits. Schneier helps the reader to understand the issues at stake, and how to best come to one's own conclusions, including the vast infrastructure we already have in place, and the vaster systems--some useful, others useless or worse--that we're being asked to submit to and pay for. Bruce Schneier is the author of seven books, including Applied Cryptography (which Wired called "the one book the National Security Agency wanted never to be published") and Secrets and Lies (described in Fortune as "startlingly lively...[a] jewel box of little surprises you can actually use."). He is also Founder and Chief Technology Officer of Counterpane Internet Security, Inc., and publishes Crypto-Gram, one of the most widely read newsletters in the field of online security
ISBN,Price9780387217123
Keyword(s)1. Coding and Information Theory 2. CODING THEORY 3. Cryptology 4. Data encryption (Computer science) 5. EBOOK 6. EBOOK - SPRINGER 7. HEALTH 8. INFORMATION THEORY 9. MEDICINE 10. Popular Science in Medicine and Health 11. Popular Science, general 12. Popular works 13. Security Science and Technology 14. SOCIAL WORK 15. System safety
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I10940     On Shelf    

44.     
No image available
TitleEuropean Perspectives on Security Research
Author(s)Thoma, Klaus
PublicationBerlin, Heidelberg, Springer Berlin Heidelberg, 2011.
Description119 p. 29 illus., 23 illus. in color : online resource
Abstract NoteEurope???s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ???Safety and Security??? of acatech ??? the German Academy of Science and Engineering ??? invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop
ISBN,Price9783642182198
Keyword(s)1. EBOOK 2. EBOOK - SPRINGER 3. Industrial safety 4. QUALITY CONTROL 5. Quality Control, Reliability, Safety and Risk 6. RELIABILITY 7. Science, Humanities and Social Sciences, multidisciplinary 8. Security Science and Technology 9. System safety
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I08524     On Shelf    

45.     
No image available
TitleTerahertz and Mid Infrared Radiation: Detection of Explosives and CBRN (Using Terahertz)
Author(s)Pereira, Mauro F;Shulika, Oleksiy
PublicationDordrecht, Springer Netherlands, 2014.
DescriptionXIII, 196 p. 103 illus., 70 illus. in color : online resource
Abstract NoteThe reader will find here a timely update on new THz sources and detection schemes as well as concrete applications to the detection of Explosives and CBRN. Included is a method to identify hidden RDX-based explosives (pure and plastic ones) in the frequency domain study by Fourier Transformation, which has been complemented by the demonstration of improvement of the quality of the images captured commercially available THz passive cameras. The presented examples show large potential for the detection of small hidden objects at long distances (6-10 m). ??Complementing the results in the short-wavelength range, laser spectroscopy with a mid-infrared, room temperature, continuous wave, DFB laser diode and high performance DFB QCL have been demonstrated to offer excellent enabling sensor technologies for environmental monitoring, medical diagnostics, industrial and security applications.?? From the new source point of view a number of systems have been presented - From superconductors to semiconductors, e.g. Detection of Terahertz Waves from Superconducting Bi2Sr2CaCu2O8+?? Intrinsic Josephson Junctions.?? The quest for a compact room temperature THz source and the recent advances in high power mid-IR QCLs lead to the development of a semiconductor THz source based on intracavity difference frequency generation. Furthermore, alternative electrically pumped THz sources based on the high emission efficiency predicted for polaritonic states in the ultra-strong coupling regime led to the demonstration of electroluminescent devices.?? Finally, antipolaritons in dispersive media were discussed and different aspects of the interaction of THz radiation with biomater were presented
ISBN,Price9789401785723
Keyword(s)1. Characterization and Evaluation of Materials 2. EBOOK 3. EBOOK - SPRINGER 4. LASERS 5. MATERIALS SCIENCE 6. MICROSCOPY 7. Optics, Lasers, Photonics, Optical Devices 8. PHOTONICS 9. Security Science and Technology 10. SPECTROSCOPY 11. Spectroscopy and Microscopy 12. Spectroscopy/Spectrometry 13. System safety
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I08433     On Shelf    

46.     
No image available
TitleNetworks and Network Analysis for Defence and Security
Author(s)Masys, Anthony J
PublicationCham, Springer International Publishing, 2014.
DescriptionXVIII, 287 p. 55 illus., 39 illus. in color : online resource
Abstract NoteNetworks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic and cyber domains. Threats to national security, such as that against critical infrastructures not only stem from man-made acts but also from natural hazards. Katrina (2005), Fukushima (2011) and Hurricane Sandy (2012) are examples highlighting the vulnerability of critical infrastructures to natural hazards and the crippling effect they have on the social and economic well-being of a community and a nation. With this dynamic and complex threat landscape, network analysis has emerged as a key enabler in supporting defence and security. With the advent of ???big data??? and increasing processing power, network analysis can reveal insights with regards to structural and dynamic properties thereby facilitating greater understanding of complex networks, their entities, interdependencies, vulnerabilities to produce insights for creative solutions. This book will be well positioned to inform defence, security and intelligence professionals and researchers with regards to leading methodologies and approaches
ISBN,Price9783319041476
Keyword(s)1. APPLICATION SOFTWARE 2. Applications of Graph Theory and Complex Networks 3. Computer Appl. in Social and Behavioral Sciences 4. Criminology 5. Criminology and Criminal Justice, general 6. EBOOK 7. EBOOK - SPRINGER 8. GAME THEORY 9. Game Theory, Economics, Social and Behav. Sciences 10. PHYSICS 11. Security Science and Technology 12. System safety
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I08365     On Shelf    

47.     
No image available
TitleCold War Space Sleuths : The Untold Secrets of the Soviet Space Program
Author(s)Phelan, Dominic
PublicationNew York, NY, Springer New York, 2013.
DescriptionXIX, 300 p : online resource
Abstract NoteCold War Space Sleuths reads like a Cold War espionage novel, but the reality of the story about the dedicated amateur observers bent on finding out about Soviet spaceflight during the Cold War is just as exciting and absorbing. Told in the sleuth's own words, each chapter unfolds a piece of the hidden history of what was happening behind the Iron Curtain. Coming from all over the world, including Russia itself, the amateur spies give first-hand accounts of often-forgotten aspects of the Cold War space race. Amongst others, their stories include: - the history of the Kettering Group; - looking inside the Russian archives; - unsolved mysteries, such as why cosmonauts were airbrushed out of the official archives; - reading between the lines of the Soviet media; - the impact of Gorbachev's glasnost on sleuthing; - new research, including chapters by James Oberg, Asif Siddiqi, and Bart Hendrickx
ISBN,Price9781461430520
Keyword(s)1. Aerospace engineering 2. Aerospace Technology and Astronautics 3. ASTRONAUTICS 4. ASTRONOMY 5. EBOOK 6. EBOOK - SPRINGER 7. Popular Science in Astronomy 8. Security Science and Technology 9. System safety
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I08106     On Shelf    

48.     
No image available
TitleNuclear Terrorism and National Preparedness
Author(s)Apikyan, Samuel;Diamond, David
PublicationDordrecht, Springer Netherlands, 2015.
DescriptionIX, 263 p. 95 illus., 74 illus. in color : online resource
Abstract NoteThe nuclear crisis in Fukushima and growing threats of nuclear terrorism must serve as a wake-up call, prompting greater action to prepare ourselves for nuclear and radiological disasters. Our strategy to prepare for these threats is multi-layered and the events of these past years have proved the necessity to re-evaluate the national and international preparedness goals on a scale never before considered. The programme of NATO Advanced Research Workshop on ???Preparedness for Nuclear and Radiological Threats??? has been focused on science and technology challenges associated with our need to improve the national and international capacity and capability to prevent, protect against, mitigate the effects of, respond to, and recover from the nuclear and radiological disasters, including nuclear and radiological accident, terrorist attack by Improvised Nuclear Device (IND) or by ???Dirty Bomb???-Radiological Dispersal Device (RDD), that pose the greatest risk to the national and international security and safety
ISBN,Price9789401798914
Keyword(s)1. EBOOK 2. EBOOK - SPRINGER 3. Effects of Radiation/Radiation Protection 4. NUCLEAR ENERGY 5. Radiation protection 6. Radiation???Safety measures 7. Security Science and Technology 8. System safety
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I07697     On Shelf    

49.     
No image available
TitleConflict and Complexity : Countering Terrorism, Insurgency, Ethnic and Regional Violence
Author(s)Fellman, Philip Vos;Bar-Yam, Yaneer;Minai, Ali A
PublicationNew York, NY, Springer New York, 2015.
DescriptionX, 292 p. 68 illus., 57 illus. in color : online resource
Abstract NoteComplexity science affords a number of novel tools for examining terrorism, particularly network analysis and NK-Boolean fitness landscapes as well as other tools drawn from non-linear dynamical systems modeling. This book follows the methodologies of complex adaptive systems research in their application to addressing the problems of terrorism, specifically terrorist networks, their structure and various methods of mapping and interdicting them as well as exploring the complex landscape of network-centric and irregular warfare. A variety of new models and approaches are presented here, including Dynamic Network Analysis, DIME/PMESII models, percolation models and emergent models of insurgency. In addition, the analysis is informed by practical experience, with analytical and policy guidance from authors who have served within the U.S. Department of Defense, the British Ministry of Defence as well as those who have served in a civilian capacity as advisors on terrorism and counter-terrorism
ISBN,Price9781493917051
Keyword(s)1. APPLICATION SOFTWARE 2. Applications of Graph Theory and Complex Networks 3. COMPLEXITY 4. COMPUTATIONAL COMPLEXITY 5. Computer Appl. in Social and Behavioral Sciences 6. EBOOK 7. EBOOK - SPRINGER 8. Methodology of the Social Sciences 9. PHYSICS 10. Security Science and Technology 11. SOCIAL SCIENCES 12. System safety
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I07689     On Shelf    

50.    
No image available
TitleMining Social Networks and Security Informatics
Author(s)Tansel Ozyer (ed.);Zeki Erdem (ed.);Jon Rokne (ed.);Suheil Khoury (ed.)
PublicationDordrecht, Springer Netherlands, 2013.
DescriptionVI, 283 p. 92 illus : online resource
Abstract NoteCrime, terrorism and security are in the forefront of current societal concerns. This edited volume presents research based on social network techniques showing how data from crime and terror networks can be analyzed and how information can be extracted. The topics covered include crime data mining and visualization; organized crime detection; crime network visualization; computational criminology; aspects of terror network analyses and threat prediction including cyberterrorism and the related area of dark web; privacy issues in social networks; security informatics; graph algorithms for social networks; general aspects of social networks such as pattern and anomaly detection; community discovery; link analysis and spatio-temporal network mining. These topics will be of interest to researchers and practitioners in the general area of security informatics.?? The volume will also serve as a general reference for readers that would want to become familiar with current research in the fast growing field of cybersecurity
ISBN,Price9789400763593
Keyword(s)1. COMPLEXITY 2. COMPUTATIONAL COMPLEXITY 3. Criminology 4. Criminology and Criminal Justice, general 5. DATA MINING 6. Data Mining and Knowledge Discovery 7. EBOOK 8. EBOOK - SPRINGER 9. ECONOMIC THEORY 10. Economic Theory/Quantitative Economics/Mathematical Methods 11. Security Science and Technology 12. System safety
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I07598     On Shelf    

(page:5 / 6) [#59] First Page   Previous Page   Next Page   Last Page