• Kapcsolat

  • Hírlevél

  • Rólunk

  • Szállítási lehetőségek

  • Prospero könyvpiaci podcast

  • Hírek

  • Security-Related Advanced Technologies in Critical Infrastructure Protection: Theoretical and Practical Approach

    Security-Related Advanced Technologies in Critical Infrastructure Protection by Kovács, Tünde Anna; Nyikes, Zoltán; Fürstner, Igor;

    Theoretical and Practical Approach

    Sorozatcím: NATO Science for Peace and Security Series C: Environmental Security;

      • 20% KEDVEZMÉNY?

      • A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
      • Kiadói listaár EUR 106.99
      • Az ár azért becsült, mert a rendelés pillanatában nem lehet pontosan tudni, hogy a beérkezéskor milyen lesz a forint árfolyama az adott termék eredeti devizájához képest. Ha a forint romlana, kissé többet, ha javulna, kissé kevesebbet kell majd fizetnie.

        44 374 Ft (42 261 Ft + 5% áfa)
      • Kedvezmény(ek) 20% (cc. 8 875 Ft off)
      • Kedvezményes ár 35 499 Ft (33 809 Ft + 5% áfa)

    44 374 Ft

    db

    Beszerezhetőség

    Megrendelésre a kiadó utánnyomja a könyvet. Rendelhető, de a szokásosnál kicsit lassabban érkezik meg.

    Why don't you give exact delivery time?

    A beszerzés időigényét az eddigi tapasztalatokra alapozva adjuk meg. Azért becsült, mert a terméket külföldről hozzuk be, így a kiadó kiszolgálásának pillanatnyi gyorsaságától is függ. A megadottnál gyorsabb és lassabb szállítás is elképzelhető, de mindent megteszünk, hogy Ön a lehető leghamarabb jusson hozzá a termékhez.

    Hosszú leírás:

    This book collects the latest research results on security-related advanced technologies. The chapters contain relevant and interesting topics from numerous research. Data science and artificial intelligence research nowadays one of the most important topics for the industry and the security sectors. The autonomy and counter-autonomy research topic are also very interesting. Autonomous cars have become a part of the common days, but their safe and secure application is not assured. The research results in this field want to support and assure safe and secure autonomous applications in our quotidian life. Also, the safe and secure robotics in the industries and the defence assure a high standard of living and the given research results in this area can use to increase it. The researchers work on it and publish the results that can be interesting for the other researchers and the innovators, but also the industrial part members. The researchers work on it and publish the results thatcan be interesting for the other researchers and the innovators, but also the industrial part members. Communication is a part of our life, but the communication systems mesh all around the world. Communication is the basis of modern life because without it life stop. One other interesting and very important research area is the material sciences. Virtual life cannot exist without hardware and materials. The new technical applications require new materials, that can suffice the mechanical and physical, chemical properties demand. Nowadays a common requirement of the materials the high strength and lightweight. Researchers want to serve the industrial requests and innovate new composite materials or increase the properties of the material through a new technological process. The authors publish the latest results of the security-related research area including the newest innovations and technologies which rise the interest of the defence and the modern industries even the interest of other researchers.

    Több

    Tartalomjegyzék:

    1. Critical Threat of Critical Infrastructures: the Human Factor the Human Factor.- 2. Applications of Hopkinson Bar Technique for Capability Testing of High-Energy Absorption Materials.- 3. A Method for Approximating Circular Error Probable.- 4. Machine Learning Aspects of Internet Firewall Data.- 5. The end of encryption? - the era of quantum computers.- 6. Can Blockchain Technology be a Solution for Safety in No-Trust Environments?.- 7.A Security Assessment of AI, Related to the Financial Institutions.- 8. Machine Learning Based Network Intrusion Detection System for Internet of Things Cybersecurity.- 9. Need for Cybersecurity Solutions in IoT Systems.- 10. Information Security Challenges and Solutions in Smart Nations.- 11. Gis Aided Safety Assessment of The Urban Green Areas.- 12. Digital Competence and Security Awareness from the Perspective of Sustainability.- 13. Vibration Analysis and Characterization of Damaged Structural Glass Elements.- 14. The Effects of Electromagnetic Waves on Human Health.- 15. Material testing under dynamic loadings – proper design of critical infrastructure structural elements.- 16. Collaborative Robots in the Critical Infrastructure Area Review.- 17. Challenges for the Energy Sector in the Light of Climate Change.- 18. Fuzzy-Based Intrusion Detection Systems.- 19. UAV Route Planning in Urban and Suburban Surveillance Scenarios.- 20. Automated Guided Vehicles Safety Issues and Security Aspects.- 21. Interconnected Drone Systems for Monitoring Regional Safety Issues in Field Agriculture.- 22. Noise Level Assessment in an Urban Agglomeration.- 23. Model of Resilience Assessment of Electricity Infrastructure.- 24. Li-Ion Batteries - an Important Component in Critical Infrastructure Protection.- 25. Hackathon Based Learning in Education of Software Engineers.- 26. Critical Infrastructure Protection in the Production and use of Explosives Industry Products.- 27. Tasks of the Implementation of Physical Security System of the CBRN Laboratories.- 28. Industry 4.0 and Rami Model Based Art in Microindustry for Polishing Applycation.- 29. Principles of Physical Protection of Strategic Assets Against Blast Effects.- 30. The Impact of Cloud Systems on Manufacturing.- 31. Robots in the Industry 4.0.- 32. Analysis of New Types of Security Challenges Affecting Catholic Christian Sacred Sites to Identify Those as Critical Infrastructures.- 33. Can trust be a factor of organisational safety and security? 34. Identification and Authentication Potentials Based on LimitedBiometric Data.- 35. Language as a Medium of Security.- 36. Use of Airbridges in Support of Encircled Forces and the Role of Airfields.- 37. The Purpose of Internet use Among Pupils During the Covid-19 Pandemic.- 38.Family Patterns’ Role in IT Security Aware Behavior.- 39. Advanced Tools for the Explosive Materials Identification.

    Több
    Mostanában megtekintett
    previous
    20% %kedvezmény
    Security-Related Advanced Technologies in Critical Infrastructure Protection: Theoretical and Practical Approach

    Handbook of Research Methods for Marketing Management

    Nunkoo, Robin; Teeroovengadum, Viraiyan; Ringle, Christian M.; (ed.)

    83 606 Ft

    66 885 Ft

    20% %kedvezmény
    Security-Related Advanced Technologies in Critical Infrastructure Protection: Theoretical and Practical Approach

    The Paleobiology of Australopithecus

    Reed, Kaye E.; Fleagle, John G; Leakey, Richard E

    44 374 Ft

    35 499 Ft

    Security-Related Advanced Technologies in Critical Infrastructure Protection: Theoretical and Practical Approach

    Macroeconomics at the Service of Public Policy

    Sargent, Thomas J.; Vilmunen, Jouko; (ed.)

    16 477 Ft

    14 829 Ft

    Security-Related Advanced Technologies in Critical Infrastructure Protection: Theoretical and Practical Approach

    Hbr's 10 Must Reads on Ai, Analytics, and the New Machine Age

    Davenport, Thomas H.;Harvard Business Review

    6 802 Ft

    6 258 Ft

    next