Over the past decade, the security environment has undergone rapid transformation driven by climate change, geopolitical tensions, digitalization, energy transition, and AI integration. These shifts have created a new risk reality where traditional...Loe edasi...
This book provides a rigorous theoretical analysis of the evolution of non-state actors within the contemporary global security architecture. Utilising Securitisation Theory, the authors examine how national movements transition from revolutionary o...Loe edasi...
The work grew out of a very practical problem: the AppSec team was drowning in security scanning alerts but still occasionally missed real issues that had been dismissed as false positives. Wanted to present a way not just to tune individual tools,...Loe edasi...
This book provides a comprehensive guide to the Inventory of Hazardous Materials (IHM), a critical document for ensuring the safe and environmentally sound recycling of ships. At the heart of this book is the matter of compliance with the Hong Kong...Loe edasi...
Security Systems Technologies and Innovation: A Comprehensive History of Advances in the Industry examines the past 50 years and the expansion of the security industry, security technologies, and the field as a whole. An overarching theme...Loe edasi...
This book asserts that there exists a causal relationship between identity, interest, and the exercise of power. The work defines power as the ability to satisfy oneself, which makes power contingent upon belief. It also dissects the concepts of ide...Loe edasi...
This book comprehensively examines the communication challenges posted by regulating large-scale flexible loads These challenges include high access demands, explosive data volume, frequent data transmission, realistic performance-based impact a...Loe edasi...
Now in its second edition, this book introduces an approach to active system control. This approach, when applied through design and development improves our technological systems. It extends concepts of system control using data accumulation, state...Loe edasi...