Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Paradigms on technology development for security practitioners
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Paradigms on technology development for security practitioners/ edited by Ilias Gkotsis ... [et al.].
other author:
Gkotsis, Ilias.
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xvii, 535 p. :ill. (chiefly color), digital ; : 24 cm.;
Contained By:
Springer Nature eBook
Subject:
Crime prevention - Technological innovations. -
Online resource:
https://doi.org/10.1007/978-3-031-62083-6
ISBN:
9783031620836
Paradigms on technology development for security practitioners
Paradigms on technology development for security practitioners
[electronic resource] /edited by Ilias Gkotsis ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xvii, 535 p. :ill. (chiefly color), digital ;24 cm. - Security informatics and law enforcement,2523-8515. - Security informatics and law enforcement..
Introduction -- Part 1: Cyber Crime, Cyber Terrorism and Cyber Security -- Cybercrime and terrorism -- Cyber Security -- AI and Cyber -- Part 2: Effective management and security of EU external borders -- Border Security Technologies -- Methodological approaches to border security -- Integrated platforms for border security management -- Part 3 Serious and Organized Crime (SOC) -- Multimodal Data Fusion for combating SOC -- Big Data Processing and Analytics in context of SOC -- Data Visualisation and Decision Support -- Artificial Intelligence for combating SOC -- Part 4: Critical Infrastructures (CI) Resilience and Public Space Protection -- Cyber and System security for protection of CI -- Physical security of CI -- Case studies in protection of CI -- Protection of Public Spaces -- Part 5: Civil Protection and Disaster-Resilient Societies -- Crisis management -- Disaster management and Resilience strengthening technologies -- First responders technology -- Part 6: Strengthened Security Research and Innovation -- Part 7: Enhancing the defense capabilities of the EU -- Conclusion.
Open access.
This open access book is authored by a rich mix of contributors from across the landscape of research, academia, LEAs, civil protection, and other first responders, practitioners, public and private organizations and industry to address some of the most contemporary challenges within global security domain. The authors cover topics such as protection of critical infrastructures (CI), serious and organized crime, counter (cyber) terrorism, border management, cybercrime, cybersecurity, management of disasters and crises, big data analytics, the application of AI and the legal and ethical dimensions of the implementation of cutting-edge technologies. The book benefits from research actions and lessons learned from more than 35 EU R&D projects within the security domain. The book not only addresses theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, real world applied solutions, methodologies, and case studies within security domain. This is an open access book. Presents security practitioner driven technologies from practical, theoretical and legal/ethical point of view Offers R&D perspectives on strengthening security potential based on input from multidisciplinary stakeholders Addresses security topics from LEAs, Civil Protection authorities, first responders, cyber-security organizations, Critical Infrastructure operators and other stakeholders involved in societal resilience This book is open access, which means that you have free and unlimited access.
ISBN: 9783031620836
Standard No.: 10.1007/978-3-031-62083-6doiSubjects--Topical Terms:
1487566
Crime prevention
--Technological innovations.
LC Class. No.: HV7936.T35
Dewey Class. No.: 363.2
Paradigms on technology development for security practitioners
LDR
:03805nam a2200349 a 4500
001
1160510
003
DE-He213
005
20240930130236.0
006
m d
007
cr nn 008maaau
008
251029s2025 sz s 0 eng d
020
$a
9783031620836
$q
(electronic bk.)
020
$a
9783031620829
$q
(paper)
024
7
$a
10.1007/978-3-031-62083-6
$2
doi
035
$a
978-3-031-62083-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
HV7936.T35
072
7
$a
TNKS
$2
bicssc
072
7
$a
SCI055000
$2
bisacsh
072
7
$a
TNKS
$2
thema
082
0 4
$a
363.2
$2
23
090
$a
HV7936.T35
$b
P222 2025
245
0 0
$a
Paradigms on technology development for security practitioners
$h
[electronic resource] /
$c
edited by Ilias Gkotsis ... [et al.].
260
$a
Cham :
$c
2025.
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
300
$a
xvii, 535 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
490
1
$a
Security informatics and law enforcement,
$x
2523-8515
505
0
$a
Introduction -- Part 1: Cyber Crime, Cyber Terrorism and Cyber Security -- Cybercrime and terrorism -- Cyber Security -- AI and Cyber -- Part 2: Effective management and security of EU external borders -- Border Security Technologies -- Methodological approaches to border security -- Integrated platforms for border security management -- Part 3 Serious and Organized Crime (SOC) -- Multimodal Data Fusion for combating SOC -- Big Data Processing and Analytics in context of SOC -- Data Visualisation and Decision Support -- Artificial Intelligence for combating SOC -- Part 4: Critical Infrastructures (CI) Resilience and Public Space Protection -- Cyber and System security for protection of CI -- Physical security of CI -- Case studies in protection of CI -- Protection of Public Spaces -- Part 5: Civil Protection and Disaster-Resilient Societies -- Crisis management -- Disaster management and Resilience strengthening technologies -- First responders technology -- Part 6: Strengthened Security Research and Innovation -- Part 7: Enhancing the defense capabilities of the EU -- Conclusion.
506
$a
Open access.
520
$a
This open access book is authored by a rich mix of contributors from across the landscape of research, academia, LEAs, civil protection, and other first responders, practitioners, public and private organizations and industry to address some of the most contemporary challenges within global security domain. The authors cover topics such as protection of critical infrastructures (CI), serious and organized crime, counter (cyber) terrorism, border management, cybercrime, cybersecurity, management of disasters and crises, big data analytics, the application of AI and the legal and ethical dimensions of the implementation of cutting-edge technologies. The book benefits from research actions and lessons learned from more than 35 EU R&D projects within the security domain. The book not only addresses theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, real world applied solutions, methodologies, and case studies within security domain. This is an open access book. Presents security practitioner driven technologies from practical, theoretical and legal/ethical point of view Offers R&D perspectives on strengthening security potential based on input from multidisciplinary stakeholders Addresses security topics from LEAs, Civil Protection authorities, first responders, cyber-security organizations, Critical Infrastructure operators and other stakeholders involved in societal resilience This book is open access, which means that you have free and unlimited access.
650
0
$a
Crime prevention
$x
Technological innovations.
$3
1487566
650
0
$a
Law enforcement
$x
Technological innovations.
$3
796147
650
1 4
$a
Security Science and Technology.
$3
783419
650
2 4
$a
Data and Information Security.
$3
1365785
650
2 4
$a
Computational Intelligence.
$3
768837
700
1
$a
Gkotsis, Ilias.
$3
1487564
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
830
0
$a
Security informatics and law enforcement.
$3
1487565
856
4 0
$u
https://doi.org/10.1007/978-3-031-62083-6
950
$a
Physics and Astronomy (SpringerNature-11651)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login