語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Paradigms on technology development for security practitioners
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Paradigms on technology development for security practitioners/ edited by Ilias Gkotsis ... [et al.].
其他作者:
Gkotsis, Ilias.
出版者:
Cham :Springer Nature Switzerland : : 2025.,
面頁冊數:
xvii, 535 p. :ill. (chiefly color), digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Computational Intelligence. -
電子資源:
https://doi.org/10.1007/978-3-031-62083-6
ISBN:
9783031620836
Paradigms on technology development for security practitioners
Paradigms on technology development for security practitioners
[electronic resource] /edited by Ilias Gkotsis ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xvii, 535 p. :ill. (chiefly color), digital ;24 cm. - Security informatics and law enforcement,2523-8515. - Security informatics and law enforcement..
Introduction -- Part 1: Cyber Crime, Cyber Terrorism and Cyber Security -- Cybercrime and terrorism -- Cyber Security -- AI and Cyber -- Part 2: Effective management and security of EU external borders -- Border Security Technologies -- Methodological approaches to border security -- Integrated platforms for border security management -- Part 3 Serious and Organized Crime (SOC) -- Multimodal Data Fusion for combating SOC -- Big Data Processing and Analytics in context of SOC -- Data Visualisation and Decision Support -- Artificial Intelligence for combating SOC -- Part 4: Critical Infrastructures (CI) Resilience and Public Space Protection -- Cyber and System security for protection of CI -- Physical security of CI -- Case studies in protection of CI -- Protection of Public Spaces -- Part 5: Civil Protection and Disaster-Resilient Societies -- Crisis management -- Disaster management and Resilience strengthening technologies -- First responders technology -- Part 6: Strengthened Security Research and Innovation -- Part 7: Enhancing the defense capabilities of the EU -- Conclusion.
Open access.
This open access book is authored by a rich mix of contributors from across the landscape of research, academia, LEAs, civil protection, and other first responders, practitioners, public and private organizations and industry to address some of the most contemporary challenges within global security domain. The authors cover topics such as protection of critical infrastructures (CI), serious and organized crime, counter (cyber) terrorism, border management, cybercrime, cybersecurity, management of disasters and crises, big data analytics, the application of AI and the legal and ethical dimensions of the implementation of cutting-edge technologies. The book benefits from research actions and lessons learned from more than 35 EU R&D projects within the security domain. The book not only addresses theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, real world applied solutions, methodologies, and case studies within security domain. This is an open access book. Presents security practitioner driven technologies from practical, theoretical and legal/ethical point of view Offers R&D perspectives on strengthening security potential based on input from multidisciplinary stakeholders Addresses security topics from LEAs, Civil Protection authorities, first responders, cyber-security organizations, Critical Infrastructure operators and other stakeholders involved in societal resilience This book is open access, which means that you have free and unlimited access.
ISBN: 9783031620836
Standard No.: 10.1007/978-3-031-62083-6doiSubjects--Topical Terms:
768837
Computational Intelligence.
LC Class. No.: HV7936.T35
Dewey Class. No.: 363.2
Paradigms on technology development for security practitioners
LDR
:03805nam a2200349 a 4500
001
1160510
003
DE-He213
005
20240930130236.0
006
m d
007
cr nn 008maaau
008
251029s2025 sz s 0 eng d
020
$a
9783031620836
$q
(electronic bk.)
020
$a
9783031620829
$q
(paper)
024
7
$a
10.1007/978-3-031-62083-6
$2
doi
035
$a
978-3-031-62083-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
HV7936.T35
072
7
$a
TNKS
$2
bicssc
072
7
$a
SCI055000
$2
bisacsh
072
7
$a
TNKS
$2
thema
082
0 4
$a
363.2
$2
23
090
$a
HV7936.T35
$b
P222 2025
245
0 0
$a
Paradigms on technology development for security practitioners
$h
[electronic resource] /
$c
edited by Ilias Gkotsis ... [et al.].
260
$a
Cham :
$c
2025.
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
300
$a
xvii, 535 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
490
1
$a
Security informatics and law enforcement,
$x
2523-8515
505
0
$a
Introduction -- Part 1: Cyber Crime, Cyber Terrorism and Cyber Security -- Cybercrime and terrorism -- Cyber Security -- AI and Cyber -- Part 2: Effective management and security of EU external borders -- Border Security Technologies -- Methodological approaches to border security -- Integrated platforms for border security management -- Part 3 Serious and Organized Crime (SOC) -- Multimodal Data Fusion for combating SOC -- Big Data Processing and Analytics in context of SOC -- Data Visualisation and Decision Support -- Artificial Intelligence for combating SOC -- Part 4: Critical Infrastructures (CI) Resilience and Public Space Protection -- Cyber and System security for protection of CI -- Physical security of CI -- Case studies in protection of CI -- Protection of Public Spaces -- Part 5: Civil Protection and Disaster-Resilient Societies -- Crisis management -- Disaster management and Resilience strengthening technologies -- First responders technology -- Part 6: Strengthened Security Research and Innovation -- Part 7: Enhancing the defense capabilities of the EU -- Conclusion.
506
$a
Open access.
520
$a
This open access book is authored by a rich mix of contributors from across the landscape of research, academia, LEAs, civil protection, and other first responders, practitioners, public and private organizations and industry to address some of the most contemporary challenges within global security domain. The authors cover topics such as protection of critical infrastructures (CI), serious and organized crime, counter (cyber) terrorism, border management, cybercrime, cybersecurity, management of disasters and crises, big data analytics, the application of AI and the legal and ethical dimensions of the implementation of cutting-edge technologies. The book benefits from research actions and lessons learned from more than 35 EU R&D projects within the security domain. The book not only addresses theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, real world applied solutions, methodologies, and case studies within security domain. This is an open access book. Presents security practitioner driven technologies from practical, theoretical and legal/ethical point of view Offers R&D perspectives on strengthening security potential based on input from multidisciplinary stakeholders Addresses security topics from LEAs, Civil Protection authorities, first responders, cyber-security organizations, Critical Infrastructure operators and other stakeholders involved in societal resilience This book is open access, which means that you have free and unlimited access.
650
2 4
$a
Computational Intelligence.
$3
768837
650
2 4
$a
Data and Information Security.
$3
1365785
650
1 4
$a
Security Science and Technology.
$3
783419
650
0
$a
Law enforcement
$x
Technological innovations.
$3
796147
650
0
$a
Crime prevention
$x
Technological innovations.
$3
1487566
700
1
$a
Gkotsis, Ilias.
$3
1487564
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
830
0
$a
Security informatics and law enforcement.
$3
1487565
856
4 0
$u
https://doi.org/10.1007/978-3-031-62083-6
950
$a
Physics and Astronomy (SpringerNature-11651)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入