SLIM21

Sort Order Display Format Items / Page  
 
  Click the serial number on the left to view the details of the item.
 #  AuthorTitleAccn#YearItem Type Claims
1 Masys, Anthony J Handbook of Security Science I12218 2022 Book  
2 Karam, P. Andrew Radiological and Nuclear Terrorism I11627 2021 eBook  
3 Hermida, Julian Legal Basis for a National Space Legislation I10973 2004 eBook  
4 Masys, Anthony J Networks and Network Analysis for Defence and Security I08365 2014 eBook  
5 Tansel Ozyer (ed.) Mining Social Networks and Security Informatics I07598 2013 eBook  
(page:1 / 1) [#5]     

1.    
No image available
TitleHandbook of Security Science
Author(s)Masys, Anthony J
PublicationCham, 1. Imprint: Springer 2. Springer International Publishing, 2022.
Description97 illus., 58 illus. in color. eReference : online resource
Abstract NoteThis handbook offers insights into how science (physical, natural and social) and technology can support new developments to manage the complexity resident within the threat and risk landscape. The security landscape can be described as dynamic and complex stemming from the emerging threats and risks that are both persistent and transborder. Globalization, climate change, terrorism, transnational crime can have significant societal impact and forces one to re-evaluate what ???national security??? means. Recent global events such as mass migration, terrorist acts, pandemics and cyber threats highlight the inherent vulnerabilities in our current security posture. As an interdisciplinary body of work, the Handbook of Security Science captures concepts, theories and security science applications, thereby providing a survey of current and emerging trends in security. Through an evidence-based approach, the collection of chapters in the book delivers insightful and comprehensive articulation of the problem and solution space associated with the complex security landscape. In so doing the Handbook of Security Science introduces scientific tools and methodologies to inform security management, risk and resilience decision support systems; insights supporting design of security solutions; approaches to threat, risk and vulnerability analysis; articulation of advanced cyber security solutions; and current developments with respect to integrated computational and analytical solutions that increase our understanding of security physical, social, economic, and technological interrelationships and problem space
ISBN,Price9783319918754
Keyword(s)1. Computer crimes 2. Crime Control and Security 3. Criminology 4. Cybercrime 5. EBOOK 6. EBOOK - SPRINGER 7. Environmental sciences???Social aspects 8. Environmental Social Sciences 9. International Security Studies 10. Military and Defence Studies 11. Politics and war 12. Security Science and Technology 13. Security systems 14. Security, International
Item TypeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I12218     On Shelf    

2.     
No image available
TitleRadiological and Nuclear Terrorism : Their Science, Effects, Prevention, and Recovery
Author(s)Karam, P. Andrew
PublicationCham, Springer International Publishing, 2021.
DescriptionXXI, 290 p. 58 illus., 47 illus. in color : online resource
Abstract NoteThis book discusses multiple aspects of radiological and nuclear terrorism. Do you know what to do if there is a radiological or nuclear emergency in your city? These accidents are not common, but they have happened ??? and even though we have not seen an attack using these weapons, governments around the world are making plans for how to prevent them ??? and for how to respond if necessary. Whether you are an emergency responder, a medical caregiver, a public health official ??? even a member of the public wanting to know how to keep yourself and your loved ones safe ??? there is a need to understand how these weapons work, how radiation affects our health, how to stop an attack from taking place, how to respond appropriately in the event of an emergency, and much more. Unfortunately, the knowledge that is needed to accomplish all of this is lacking at all levels of society and government. In this book, Dr. Andrew Karam, an internationally respected expert in radiation safety and multiple aspects of radiological and nuclear emergencies, discusses how these weapons work and what they can do, how they can affect our health, how to keep yourself safe, and how to react appropriately whether you are a police officer investigating a suspect radiological weapon, a firefighter responding to a radiological or nuclear attack, a nurse or physician caring for potentially contaminated patients, or a governmental official trying to keep the public safe. To do this, he draws upon his extensive experience in the military, the several years he worked directly with emergency responders, his service on a number of advisory committees, and multiple trips overseas in the aftermath of the Fukushima accident and on behalf of the International Atomic Energy Agency, Interpol, and the Health Physics Society.
ISBN,Price9783030691622
Keyword(s)1. Crime Control and Security 2. Criminology 3. EBOOK 4. EBOOK - SPRINGER 5. Emergency medicine 6. Medical physics 7. Public health 8. Radiation dosimetry 9. Radiation Dosimetry and Protection 10. Security Science and Technology 11. Security systems
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I11627     On Shelf    

3.     
No image available
TitleLegal Basis for a National Space Legislation
Author(s)Hermida, Julian
PublicationDordrecht, Springer Netherlands, 2004.
DescriptionXXXI, 275 p : online resource
Abstract NoteA. GENERAL BACKGROUND ???The foremost goal of the international community in the area [of private space launch services] should be to induce states to implement effective licensing procedures applicable to commercial ventures for which state responsibility may 1 exist. ??? 1. PRIVATE SECTOR PARTICIPATION IN THE SPACE INDUSTRY In the first decades of the space age, military and state security motivations indicated the direction of national space programs. Now the development of space activities depends essentially upon the possibility of recovering 2 investments. Private sector-driven commercial endeavors in outer space have been increasing exponentially and have experienced a significant quantitative growth over the last years. Spacefarers promote commercial participation of private companies in operations related to outer space, and, thus, the private sector is now increasingly providing satellite telecommunications, remote sensing, global positioning and space launch services directly to its customers. In this context, overall revenues for the worldwide space industry 3 amounted to US$ 82 billion in 2001. In the late 1990???s the transponder demand, in particular Ku- band transponders, was consistently on the rise due 4 to the escalated utilization of geostationary satellite transponders. Global positioning systems have been playing an increasingly important role in navigation, and remote sensing systems are mapping and documenting nearly 1 E. A. Frankle & E. J. Steptoe, ???Legal Considerations Affecting Commercial Space Launches From International Territory???, (1999) 50 IISL at 10. Emphasis added. 2 H. L
ISBN,Price9781402025327
Keyword(s)1. Astronomy, Observations and Techniques 2. Astronomy???Observations 3. Conflict of laws 4. Criminology 5. Criminology and Criminal Justice, general 6. EBOOK 7. EBOOK - SPRINGER 8. INTERNATIONAL LAW 9. Law of the sea 10. Law of the Sea, Air and Outer Space 11. Observations, Astronomical 12. Private international law 13. Private International Law, International & Foreign Law, Comparative Law
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I10973     On Shelf    

4.     
No image available
TitleNetworks and Network Analysis for Defence and Security
Author(s)Masys, Anthony J
PublicationCham, Springer International Publishing, 2014.
DescriptionXVIII, 287 p. 55 illus., 39 illus. in color : online resource
Abstract NoteNetworks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic and cyber domains. Threats to national security, such as that against critical infrastructures not only stem from man-made acts but also from natural hazards. Katrina (2005), Fukushima (2011) and Hurricane Sandy (2012) are examples highlighting the vulnerability of critical infrastructures to natural hazards and the crippling effect they have on the social and economic well-being of a community and a nation. With this dynamic and complex threat landscape, network analysis has emerged as a key enabler in supporting defence and security. With the advent of ???big data??? and increasing processing power, network analysis can reveal insights with regards to structural and dynamic properties thereby facilitating greater understanding of complex networks, their entities, interdependencies, vulnerabilities to produce insights for creative solutions. This book will be well positioned to inform defence, security and intelligence professionals and researchers with regards to leading methodologies and approaches
ISBN,Price9783319041476
Keyword(s)1. APPLICATION SOFTWARE 2. Applications of Graph Theory and Complex Networks 3. Computer Appl. in Social and Behavioral Sciences 4. Criminology 5. Criminology and Criminal Justice, general 6. EBOOK 7. EBOOK - SPRINGER 8. GAME THEORY 9. Game Theory, Economics, Social and Behav. Sciences 10. PHYSICS 11. Security Science and Technology 12. System safety
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I08365     On Shelf    

5.    
No image available
TitleMining Social Networks and Security Informatics
Author(s)Tansel Ozyer (ed.);Zeki Erdem (ed.);Jon Rokne (ed.);Suheil Khoury (ed.)
PublicationDordrecht, Springer Netherlands, 2013.
DescriptionVI, 283 p. 92 illus : online resource
Abstract NoteCrime, terrorism and security are in the forefront of current societal concerns. This edited volume presents research based on social network techniques showing how data from crime and terror networks can be analyzed and how information can be extracted. The topics covered include crime data mining and visualization; organized crime detection; crime network visualization; computational criminology; aspects of terror network analyses and threat prediction including cyberterrorism and the related area of dark web; privacy issues in social networks; security informatics; graph algorithms for social networks; general aspects of social networks such as pattern and anomaly detection; community discovery; link analysis and spatio-temporal network mining. These topics will be of interest to researchers and practitioners in the general area of security informatics.?? The volume will also serve as a general reference for readers that would want to become familiar with current research in the fast growing field of cybersecurity
ISBN,Price9789400763593
Keyword(s)1. COMPLEXITY 2. COMPUTATIONAL COMPLEXITY 3. Criminology 4. Criminology and Criminal Justice, general 5. DATA MINING 6. Data Mining and Knowledge Discovery 7. EBOOK 8. EBOOK - SPRINGER 9. ECONOMIC THEORY 10. Economic Theory/Quantitative Economics/Mathematical Methods 11. Security Science and Technology 12. System safety
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I07598     On Shelf    

(page:1 / 1) [#5]