|
|
Click the serial number on the left to view the details of the item. |
# |
Author | Title | Accn# | Year | Item Type | Claims |
41 |
Kollmitzer, Christian |
Quantum Random Number Generation |
I08800 |
2020 |
eBook |
|
42 |
Malizia, Andrea |
Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference |
I08562 |
2018 |
eBook |
|
43 |
Schneier, Bruce |
Beyond Fear |
I10940 |
2003 |
eBook |
|
44 |
Thoma, Klaus |
European Perspectives on Security Research |
I08524 |
2011 |
eBook |
|
45 |
Pereira, Mauro F |
Terahertz and Mid Infrared Radiation: Detection of Explosives and CBRN (Using Terahertz) |
I08433 |
2014 |
eBook |
|
46 |
Masys, Anthony J |
Networks and Network Analysis for Defence and Security |
I08365 |
2014 |
eBook |
|
47 |
Phelan, Dominic |
Cold War Space Sleuths |
I08106 |
2013 |
eBook |
|
48 |
Apikyan, Samuel |
Nuclear Terrorism and National Preparedness |
I07697 |
2015 |
eBook |
|
49 |
Fellman, Philip Vos |
Conflict and Complexity |
I07689 |
2015 |
eBook |
|
50 |
Tansel Ozyer (ed.) |
Mining Social Networks and Security Informatics |
I07598 |
2013 |
eBook |
|
|
41.
|
|
Title | Quantum Random Number Generation : Theory and Practice |
Author(s) | Kollmitzer, Christian;Schauer, Stefan;Rass, Stefan;Rainer, Benjamin |
Publication | Cham, Springer International Publishing, 2020. |
Description | XXI, 120 p. 49 illus., 33 illus. in color : online resource |
Abstract Note | This book provides an overview of state-of-the-art implementations of quantum random number generators (QRNGs), and especially examines their relation to classical statistical randomness models and numerical techniques for computing random numbers. The reader ??? who ideally has a background in classical statistics, computer science, or cryptography ??? is introduced to the world of quantum bits step by step, and explicit relations between QRNGs and their classical counterparts are identified along the way. Random number generation is a major pillar of cryptography. Capitalizing on the randomness inherent in quantum phenomena is a rapidly evolving branch of quantum cryptography with countless applications for the future. The value of quantum randomness for cryptographic purposes is empirically demonstrated in statistical evaluations of QRNGs??? performance compared to classical techniques for true and pseudorandom number generation. The book then provides an overview of technical implementations of QRNGs, before a concluding discussion of major achievements and remaining obstacles in the field rounds out the coverage, while also opening the door for future research directions |
ISBN,Price | 9783319725963 |
Keyword(s) | 1. Data structures (Computer science)
2. Data Structures and Information Theory
3. EBOOK
4. EBOOK - SPRINGER
5. Mathematical Applications in the Physical Sciences
6. MATHEMATICAL PHYSICS
7. QUANTUM COMPUTERS
8. Quantum computing
9. QUANTUM PHYSICS
10. Security Science and Technology
11. System safety
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I08800 |
|
|
On Shelf |
|
|
|
|
42.
|
|
Title | Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference : Science as the first countermeasure for CBRNE and Cyber threats |
Author(s) | Malizia, Andrea;D'Arienzo, Marco |
Publication | Cham, Springer International Publishing, 2018. |
Description | XII, 458 p. 160 illus., 140 illus. in color : online resource |
Abstract Note | This book presents the proceedings of SICC 2017, a conference devoted to promoting the dissemination of the different methodologies, techniques, theories, strategies, technologies and best practices on the prevention and mitigation of CBRNE risks. As the first scientific international conference on safety & security issues in the CBRNE field, SICC 2017 attracted contributions resulting from fruitful inter-professional collaborations between university and military experts, specialized operators, decision makers and the industry. As such, these proceedings are primarily intended for academics and professionals from public, private and military entities. It is the first trans-disciplinary collection of scientific papers from the numerous fields related to CBRNE |
ISBN,Price | 9783319917917 |
Keyword(s) | 1. CHEMISTRY
2. COMPUTER SECURITY
3. Data protection
4. EBOOK
5. EBOOK - SPRINGER
6. Effects of Radiation/Radiation Protection
7. Radiation protection
8. Radiation???Safety measures
9. Safety in Chemistry, Dangerous Goods
10. Security
11. Security Science and Technology
12. System safety
13. Systems and Data Security
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I08562 |
|
|
On Shelf |
|
|
|
|
43.
|
|
Title | Beyond Fear : Thinking Sensibly About Security in an Uncertain World |
Author(s) | Schneier, Bruce |
Publication | New York, NY, 1. Imprint: Copernicus
2. Springer New York, 2003. |
Description | VIII, 296 p : online resource |
Abstract Note | Many of us, especially since 9/11, have become personally concerned about issues of security, and this is no surprise. Security is near the top of government and corporate agendas around the globe. Security-related stories appear on the front page everyday. How well though, do any of us truly understand what achieving real security involves? In Beyond Fear, Bruce Schneier invites us to take a critical look at not just the threats to our security, but the ways in which we're encouraged to think about security by law enforcement agencies, businesses of all shapes and sizes, and our national governments and militaries. Schneier believes we all can and should be better security consumers, and that the trade-offs we make in the name of security - in terms of cash outlays, taxes, inconvenience, and diminished freedoms - should be part of an ongoing negotiation in our personal, professional, and civic lives, and the subject of an open and informed national discussion. With a well-deserved reputation for original and sometimes iconoclastic thought, Schneier has a lot to say that is provocative, counter-intuitive, and just plain good sense. He explains in detail, for example, why we need to design security systems that don't just work well, but fail well, and why secrecy on the part of government often undermines security. He also believes, for instance, that national ID cards are an exceptionally bad idea: technically unsound, and even destructive of security. And, contrary to a lot of current nay-sayers, he thinks online shopping is fundamentally safe, and that many of the new airline security measure (though by no means all) are actually quite effective. A skeptic of much that's promised by highly touted technologies like biometrics, Schneier is also a refreshingly positive, problem-solving force in the often self-dramatizing and fear-mongering world of security pundits. Schneier helps the reader to understand the issues at stake, and how to best come to one's own conclusions, including the vast infrastructure we already have in place, and the vaster systems--some useful, others useless or worse--that we're being asked to submit to and pay for. Bruce Schneier is the author of seven books, including Applied Cryptography (which Wired called "the one book the National Security Agency wanted never to be published") and Secrets and Lies (described in Fortune as "startlingly lively...[a] jewel box of little surprises you can actually use."). He is also Founder and Chief Technology Officer of Counterpane Internet Security, Inc., and publishes Crypto-Gram, one of the most widely read newsletters in the field of online security |
ISBN,Price | 9780387217123 |
Keyword(s) | 1. Coding and Information Theory
2. CODING THEORY
3. Cryptology
4. Data encryption (Computer science)
5. EBOOK
6. EBOOK - SPRINGER
7. HEALTH
8. INFORMATION THEORY
9. MEDICINE
10. Popular Science in Medicine and Health
11. Popular Science, general
12. Popular works
13. Security Science and Technology
14. SOCIAL WORK
15. System safety
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I10940 |
|
|
On Shelf |
|
|
|
|
44.
|
|
Title | European Perspectives on Security Research |
Author(s) | Thoma, Klaus |
Publication | Berlin, Heidelberg, Springer Berlin Heidelberg, 2011. |
Description | 119 p. 29 illus., 23 illus. in color : online resource |
Abstract Note | Europe???s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ???Safety and Security??? of acatech ??? the German Academy of Science and Engineering ??? invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop |
ISBN,Price | 9783642182198 |
Keyword(s) | 1. EBOOK
2. EBOOK - SPRINGER
3. Industrial safety
4. QUALITY CONTROL
5. Quality Control, Reliability, Safety and Risk
6. RELIABILITY
7. Science, Humanities and Social Sciences, multidisciplinary
8. Security Science and Technology
9. System safety
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I08524 |
|
|
On Shelf |
|
|
|
|
45.
|
|
Title | Terahertz and Mid Infrared Radiation: Detection of Explosives and CBRN (Using Terahertz) |
Author(s) | Pereira, Mauro F;Shulika, Oleksiy |
Publication | Dordrecht, Springer Netherlands, 2014. |
Description | XIII, 196 p. 103 illus., 70 illus. in color : online resource |
Abstract Note | The reader will find here a timely update on new THz sources and detection schemes as well as concrete applications to the detection of Explosives and CBRN. Included is a method to identify hidden RDX-based explosives (pure and plastic ones) in the frequency domain study by Fourier Transformation, which has been complemented by the demonstration of improvement of the quality of the images captured commercially available THz passive cameras. The presented examples show large potential for the detection of small hidden objects at long distances (6-10 m). ??Complementing the results in the short-wavelength range, laser spectroscopy with a mid-infrared, room temperature, continuous wave, DFB laser diode and high performance DFB QCL have been demonstrated to offer excellent enabling sensor technologies for environmental monitoring, medical diagnostics, industrial and security applications.?? From the new source point of view a number of systems have been presented - From superconductors to semiconductors, e.g. Detection of Terahertz Waves from Superconducting Bi2Sr2CaCu2O8+?? Intrinsic Josephson Junctions.?? The quest for a compact room temperature THz source and the recent advances in high power mid-IR QCLs lead to the development of a semiconductor THz source based on intracavity difference frequency generation. Furthermore, alternative electrically pumped THz sources based on the high emission efficiency predicted for polaritonic states in the ultra-strong coupling regime led to the demonstration of electroluminescent devices.?? Finally, antipolaritons in dispersive media were discussed and different aspects of the interaction of THz radiation with biomater were presented |
ISBN,Price | 9789401785723 |
Keyword(s) | 1. Characterization and Evaluation of Materials
2. EBOOK
3. EBOOK - SPRINGER
4. LASERS
5. MATERIALS SCIENCE
6. MICROSCOPY
7. Optics, Lasers, Photonics, Optical Devices
8. PHOTONICS
9. Security Science and Technology
10. SPECTROSCOPY
11. Spectroscopy and Microscopy
12. Spectroscopy/Spectrometry
13. System safety
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I08433 |
|
|
On Shelf |
|
|
|
|
46.
|
|
Title | Networks and Network Analysis for Defence and Security |
Author(s) | Masys, Anthony J |
Publication | Cham, Springer International Publishing, 2014. |
Description | XVIII, 287 p. 55 illus., 39 illus. in color : online resource |
Abstract Note | Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic and cyber domains. Threats to national security, such as that against critical infrastructures not only stem from man-made acts but also from natural hazards. Katrina (2005), Fukushima (2011) and Hurricane Sandy (2012) are examples highlighting the vulnerability of critical infrastructures to natural hazards and the crippling effect they have on the social and economic well-being of a community and a nation. With this dynamic and complex threat landscape, network analysis has emerged as a key enabler in supporting defence and security. With the advent of ???big data??? and increasing processing power, network analysis can reveal insights with regards to structural and dynamic properties thereby facilitating greater understanding of complex networks, their entities, interdependencies, vulnerabilities to produce insights for creative solutions. This book will be well positioned to inform defence, security and intelligence professionals and researchers with regards to leading methodologies and approaches |
ISBN,Price | 9783319041476 |
Keyword(s) | 1. APPLICATION SOFTWARE
2. Applications of Graph Theory and Complex Networks
3. Computer Appl. in Social and Behavioral Sciences
4. Criminology
5. Criminology and Criminal Justice, general
6. EBOOK
7. EBOOK - SPRINGER
8. GAME THEORY
9. Game Theory, Economics, Social and Behav. Sciences
10. PHYSICS
11. Security Science and Technology
12. System safety
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I08365 |
|
|
On Shelf |
|
|
|
|
47.
|
|
Title | Cold War Space Sleuths : The Untold Secrets of the Soviet Space Program |
Author(s) | Phelan, Dominic |
Publication | New York, NY, Springer New York, 2013. |
Description | XIX, 300 p : online resource |
Abstract Note | Cold War Space Sleuths reads like a Cold War espionage novel, but the reality of the story about the dedicated amateur observers bent on finding out about Soviet spaceflight during the Cold War is just as exciting and absorbing. Told in the sleuth's own words, each chapter unfolds a piece of the hidden history of what was happening behind the Iron Curtain. Coming from all over the world, including Russia itself, the amateur spies give first-hand accounts of often-forgotten aspects of the Cold War space race. Amongst others, their stories include: - the history of the Kettering Group; - looking inside the Russian archives; - unsolved mysteries, such as why cosmonauts were airbrushed out of the official archives; - reading between the lines of the Soviet media; - the impact of Gorbachev's glasnost on sleuthing; - new research, including chapters by James Oberg, Asif Siddiqi, and Bart Hendrickx |
ISBN,Price | 9781461430520 |
Keyword(s) | 1. Aerospace engineering
2. Aerospace Technology and Astronautics
3. ASTRONAUTICS
4. ASTRONOMY
5. EBOOK
6. EBOOK - SPRINGER
7. Popular Science in Astronomy
8. Security Science and Technology
9. System safety
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I08106 |
|
|
On Shelf |
|
|
|
|
48.
|
|
Title | Nuclear Terrorism and National Preparedness |
Author(s) | Apikyan, Samuel;Diamond, David |
Publication | Dordrecht, Springer Netherlands, 2015. |
Description | IX, 263 p. 95 illus., 74 illus. in color : online resource |
Abstract Note | The nuclear crisis in Fukushima and growing threats of nuclear terrorism must serve as a wake-up call, prompting greater action to prepare ourselves for nuclear and radiological disasters. Our strategy to prepare for these threats is multi-layered and the events of these past years have proved the necessity to re-evaluate the national and international preparedness goals on a scale never before considered. The programme of NATO Advanced Research Workshop on ???Preparedness for Nuclear and Radiological Threats??? has been focused on science and technology challenges associated with our need to improve the national and international capacity and capability to prevent, protect against, mitigate the effects of, respond to, and recover from the nuclear and radiological disasters, including nuclear and radiological accident, terrorist attack by Improvised Nuclear Device (IND) or by ???Dirty Bomb???-Radiological Dispersal Device (RDD), that pose the greatest risk to the national and international security and safety |
ISBN,Price | 9789401798914 |
Keyword(s) | 1. EBOOK
2. EBOOK - SPRINGER
3. Effects of Radiation/Radiation Protection
4. NUCLEAR ENERGY
5. Radiation protection
6. Radiation???Safety measures
7. Security Science and Technology
8. System safety
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I07697 |
|
|
On Shelf |
|
|
|
|
49.
|
|
Title | Conflict and Complexity : Countering Terrorism, Insurgency, Ethnic and Regional Violence |
Author(s) | Fellman, Philip Vos;Bar-Yam, Yaneer;Minai, Ali A |
Publication | New York, NY, Springer New York, 2015. |
Description | X, 292 p. 68 illus., 57 illus. in color : online resource |
Abstract Note | Complexity science affords a number of novel tools for examining terrorism, particularly network analysis and NK-Boolean fitness landscapes as well as other tools drawn from non-linear dynamical systems modeling. This book follows the methodologies of complex adaptive systems research in their application to addressing the problems of terrorism, specifically terrorist networks, their structure and various methods of mapping and interdicting them as well as exploring the complex landscape of network-centric and irregular warfare. A variety of new models and approaches are presented here, including Dynamic Network Analysis, DIME/PMESII models, percolation models and emergent models of insurgency. In addition, the analysis is informed by practical experience, with analytical and policy guidance from authors who have served within the U.S. Department of Defense, the British Ministry of Defence as well as those who have served in a civilian capacity as advisors on terrorism and counter-terrorism |
ISBN,Price | 9781493917051 |
Keyword(s) | 1. APPLICATION SOFTWARE
2. Applications of Graph Theory and Complex Networks
3. COMPLEXITY
4. COMPUTATIONAL COMPLEXITY
5. Computer Appl. in Social and Behavioral Sciences
6. EBOOK
7. EBOOK - SPRINGER
8. Methodology of the Social Sciences
9. PHYSICS
10. Security Science and Technology
11. SOCIAL SCIENCES
12. System safety
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I07689 |
|
|
On Shelf |
|
|
|
| |