This book addresses key challenges and advancements in an increasingly automated transport sector, focusing on aeronautical information management and the evolving role of air traffic controllers in ensuring safe, secure, and sustainable aviation. I...Loe edasi...
With cybercrime costs exceeding 10.5 trillion annually and ransomware attacks predicted every two seconds by 2031, traditional signature-based security has reached critical breaking points. Guide to AI for Cybersecurity provides the essential roadm...Loe edasi...
This book provides a rigorous theoretical analysis of the evolution of non-state actors within the contemporary global security architecture. Utilising Securitisation Theory, the authors examine how national movements transition from revolutionary o...Loe edasi...
Over the past decade, the security environment has undergone rapid transformation driven by climate change, geopolitical tensions, digitalization, energy transition, and AI integration. These shifts have created a new risk reality where traditional...Loe edasi...
The work grew out of a very practical problem: the AppSec team was drowning in security scanning alerts but still occasionally missed real issues that had been dismissed as false positives. Wanted to present a way not just to tune individual tools,...Loe edasi...
This book provides a comprehensive guide to the Inventory of Hazardous Materials (IHM), a critical document for ensuring the safe and environmentally sound recycling of ships. At the heart of this book is the matter of compliance with the Hong Kong...Loe edasi...
Security Systems Technologies and Innovation: A Comprehensive History of Advances in the Industry examines the past 50 years and the expansion of the security industry, security technologies, and the field as a whole. An overarching theme...Loe edasi...
This book highlights the maritime applications of Global Navigation Satellite Systems (GNSSs) with emphasis on BeiDou Navigation Satellite System (BDS). The book systematically summarizes the technical standards for maritime applications of GNSS iss...Loe edasi...
This book asserts that there exists a causal relationship between identity, interest, and the exercise of power. The work defines power as the ability to satisfy oneself, which makes power contingent upon belief. It also dissects the concepts of ide...Loe edasi...
This book comprehensively examines the communication challenges posted by regulating large-scale flexible loads These challenges include high access demands, explosive data volume, frequent data transmission, realistic performance-based impact a...Loe edasi...
Now in its second edition, this book introduces an approach to active system control. This approach, when applied through design and development improves our technological systems. It extends concepts of system control using data accumulation, state...Loe edasi...
Chinas Belt and Road Initiative (BRI) represents a monumental shift in the global power landscape. Through ambitious infrastructure projects and strategic economic investments, China has emerged as a formidable challenger to U.S. dominance in the mo...Loe edasi...
This open access book describes the nondestructive assay techniques that are used for the measurement of nuclear material (primarily uranium and plutonium) for nuclear material accountancy purposes. It is a substantial revision to the so-called PAND...Loe edasi...
This book gathers peer-reviewed papers presented on the 11th International Conference on Industrial Economics System and Industrial Security En...Loe edasi...
Everyone needs security: Nations need national security, corporations need corporate security, individuals need personal security, cybersecurity, AI security. What is the common denominator of these security concepts? Security and scie...Loe edasi...
This book offers a forward-looking perspective on the convergence of artificial intelligence (AI) and biotechnology, and its transformative impact on synthetic biology. As these fields evolve rapidly, their integration is reshapi...Loe edasi...
Protocols connect the many devices used in our personal and professional lives. Hence we require assurances that they are secure in the face of threats.Security is too important to leave to intuition and experience alone. We need methodolo...Loe edasi...
This book brings significant added value through multiple dimensions, addressing critical infrastructure vulnerabilities and fostering multisectoral collaboration at national, regional, and international levels. Based on the authors expertise and...Loe edasi...
This book, now in its second edition, presents a paradigm for designing new-generation resilient and evolving computer systems. Book includes key concepts, supporting theory, methods of analysis, and the synthesis of ICT with new properties of evo...Loe edasi...
This book provides thoughtful and extensively researched perspectives, to improve understanding of risks and rewards, and to outline strategies for developing and implementing mature information management capabilities focused on core public safety...Loe edasi...
This book highlights a theoretical framework for architecting the safety and reliability analysis of rail transit trains for active safety assurance. Rail transit is compared to the main artery of regional economy and the backbone of urban travel....Loe edasi...
The intelligent diagnosis and maintenance of the machine mainly includes condition monitoring, fault diagnosis, performance degradation assessment and remaining useful life prediction, which plays an important role in protecting peoples lives and p...Loe edasi...
This book is the 1st volume of proceedings of the 1st Smart Nuclear Power Technology Forum and the 8th China Nuclear Power Plant Digital Technology and Application Seminar held in Shenzhen, China in June 2024. This seminar aims to explore the softwa...Loe edasi...
This book is the 2nd volume of proceedings of the 1st Smart Nuclear Power Technology Forum and the 8th China Nuclear Power Plant Digital Technology and Application Seminar held in Shenzhen, China in June 2024. This seminar aims to explore the softwa...Loe edasi...
This book addresses key challenges and advancements in an increasingly automated transport sector, focusing on aeronautical information management and the evolving role of air traffic controllers in ensuring safe, secure, and sustainable aviation. I...Loe edasi...
With cybercrime costs exceeding 10.5 trillion annually and ransomware attacks predicted every two seconds by 2031, traditional signature-based security has reached critical breaking points. Guide to AI for Cybersecurity provides the essential roadm...Loe edasi...
This book provides a rigorous theoretical analysis of the evolution of non-state actors within the contemporary global security architecture. Utilising Securitisation Theory, the authors examine how national movements transition from revolutionary o...Loe edasi...
Over the past decade, the security environment has undergone rapid transformation driven by climate change, geopolitical tensions, digitalization, energy transition, and AI integration. These shifts have created a new risk reality where traditional...Loe edasi...
The work grew out of a very practical problem: the AppSec team was drowning in security scanning alerts but still occasionally missed real issues that had been dismissed as false positives. Wanted to present a way not just to tune individual tools,...Loe edasi...
This book provides a comprehensive guide to the Inventory of Hazardous Materials (IHM), a critical document for ensuring the safe and environmentally sound recycling of ships. At the heart of this book is the matter of compliance with the Hong Kong...Loe edasi...
Security Systems Technologies and Innovation: A Comprehensive History of Advances in the Industry examines the past 50 years and the expansion of the security industry, security technologies, and the field as a whole. An overarching theme...Loe edasi...
This book highlights the maritime applications of Global Navigation Satellite Systems (GNSSs) with emphasis on BeiDou Navigation Satellite System (BDS). The book systematically summarizes the technical standards for maritime applications of GNSS iss...Loe edasi...
This book asserts that there exists a causal relationship between identity, interest, and the exercise of power. The work defines power as the ability to satisfy oneself, which makes power contingent upon belief. It also dissects the concepts of ide...Loe edasi...
This book comprehensively examines the communication challenges posted by regulating large-scale flexible loads These challenges include high access demands, explosive data volume, frequent data transmission, realistic performance-based impact a...Loe edasi...