Technology Development for Security Practitioners - Bookswagon
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Science, Technology & Agriculture > Other technologies and applied sciences > Other vocational technologies and trades > Security, safety and protection skills / professions > Technology Development for Security Practitioners: (Security Informatics and Law Enforcement)
Technology Development for Security Practitioners: (Security Informatics and Law Enforcement)

Technology Development for Security Practitioners: (Security Informatics and Law Enforcement)


     0     
5
4
3
2
1



International Edition


X
About the Book

This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain. The latter includes protection of critical infrastructures (CI), counter-terrorism, application of dark web, and analysis of a large volume of artificial intelligence data, cybercrime, serious and organised crime, border surveillance, and management of disasters and crises. This title explores various application scenarios of advanced ICT in the context of cybercrime, border security and crisis management, serious and organised crime, and protection of critical infrastructures. Readers will benefit from lessons learned from more than 30 large R&D projects within a security context. The book addresses not only theoretical narratives pertinent to the subject but also identifies current challenges and emergingsecurity threats, provides analysis of operational capability gaps, and includes real-world applied solutions. Chapter 11 is available open access under a Creative Commons Attribution 3.0 IGO License via link.springer.com and Chapter 16 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com

Table of Contents:
Introduction.- Part 1: Cyber Crime, Cyber Terrorism and Cyber Security Cybercrime .- Cyber Terrorism.- Cyber Security .- AI and Cyber .- Part 2: Border Security .- Border Security Technologies.- Methodological approaches to border security.- Integrated platforms for border security management.- Part 3 Serious and Organized Crime (SOC).- Data Integration for combating SOC.- Big Data Analytics in context of SOC.- Data Visualisation and pattern matching .- AI and SOC.- Part 4: Protection of Critical Infrastructures (CI).- Cyber and System security for protection of CI.- Physical security of CI.- Role of UAVs in protection of CI.- Case studies in protection of CI.- Part 5: Disaster and Crisis management.- First responders technology.- Crisis management .- Disaster management and Resilience strengthening technologies.- Conclusion.

About the Author :
Babak Akhgar is Professor of Informatics, co-founder and Director of CENTRIC (Centre of excellence in terrorism, resilience, intelligence and organized crime research) at Sheffield Hallam University and Fellow of the British Computer Society. Prof Akhgar graduated from Sheffield Hallam University in Software Engineering.  Afterwards he gained considerable commercial experience as a Strategy Analyst and Methodology Director for several companies.   He consolidated this experience by obtaining a Masters degree (with distinction) in Information Systems in Management and a PhD in Strategic Information Systems from Sheffield Hallam University. He has more than 140 publications in international journals and conferences on SIS with specific focus on knowledge management (KM) within security domain. He has successfully supervised 12 PhD students.  He is member of editorial boards of a number of international Journals, Chair and programme committee member of several international conferences. He has extensive and hands on experience in development, management and execution of Intelligence Management projects in large international security initiatives (e.g. Application of social media in crisis management , intelligence based combating of terrorism and organised crime, Gun crime, cyber security, Big Data and cross cultural ideology polarisation) with multi-million Euros budgets. In addition to this he is currently the technical lead of 3 EU Security projects; "Courage" on Cyber Crime and Cyber Terrorism and "Athena project" on Application of social media and mobile devices in crisis management and "Tensor" on identification of terrorist generated content. Prof Akhgar is founder of CENTRIC OSINT Hub, which provides law enforcement agencies with state of art capabilities to conduct wide range of open source based investigation from Organised Crime network to Counter Terrorism. CENTRIC OSINT HUB is used by wide range of LEAs in UK. He has co-editeda book on Intelligence management (Knowledge Driven frameworks for combating Terrorism and Organised crime). His recent books are titled Strategic Intelligence Management (National Security Imperatives and Information and Communications Technologies) Emerging Trends in ICT Security, Application of Big Data for National Security and Application of OSINT for investigation. Prof Akhgar was Trustee of Police National Legal Database (PNLD) for 2 years. In 2016 Prof Akhgar was chairman of Police Strategy forum. Prof Akhgar is member of academic advisory board of SAS UK, member of UN Safer cities technology task force, Board member of European Organisation for Security (EOS) and member of Europol external advisory board on data protection.   Dimitrios Kavallieros is a researcher – project manager at the Center for Security Studies - KEMEA of the Hellenic Ministry of Citizen Protection. He holds an MSc in Ethical Hacking and Computer Security from the University of Abertay. He is currently PhD candidate at University of Peloponnese. He has also published more than 15 articles in conference proceedings, journals and book chapters with specific focus in cybersecurity, cyberterrorism and digital forensics. He has participated in several European and National funded research projects, mainly focused on Cybersecurity, Cybercrime and Cyberterrorism, IoT & Cloud Security/Forensics, Digital Forensics and Blockchain technology.  Currently he is the coordinator of the EU H2020-project Cyber-Trust on IoT cybersecurity and of the EU H2020-project FORESIGHT on cybersecurity preparedness, cyber range and simulation and the innovation manager of the EU H2020-project PROPHETS on human factors and new methods to prevent, investigate and mitigate cybercriminal behaviours. In addition, he acts as the project manager of several H2020 projects in KEMEA, including but not limited to AIDA, LOCARD and SPARTA. Most recently he co-authored the chapter books paper Privacy Issues in Voice Assistant Ecosystems, Blockchain Solutions for Forensic Evidence Preservation in IoT Environments (IEEE) and A Review of Cyber-Ranges and Test-Beds: Current and Future Trends (Sensors)   Mr. Evangelos Sdongos is a Researcher and Scientific Project Manager at the I-SENSE Group of Institute of Communication and Computer Systems (ICCS). He holds a MEng. in Telecommunications and Information Technology from the Electrical & Computer Engineering Department of Patras University and a MBA from Hellenic Open University. He is currently PhD candidate at National Technical University of Athens. He has also published several articles in book chapters, journals and conference proceedings.  Evangelos has extensive experience in the Telecommunications domain, with regards to design, planning, implementation and integration phases of Mobile/Wireless Communication Networks (Radio Access, Transport and Core tiers for 3G/4G/5G) for either Mission Critical or Public Communications and related services. Moreover, he has significant knowledge of embedded systems and sensors in particular within the Security field. He has worked in several industrial projects involving national wide roll-out of telecommunication infrastructure (RAN and IP-Core) by major operators and vendors in Europe and Middle East as well as in research projects funded under the 7th FP. Since September 2013, he is working in ICCS as Project and Technical Manager at a wide range of EU funded (FP7 and H2020) projects including but not limited to PPDR-TC, eVACUATE, INTE-TRANSIT, PASSME, NEXES and RECONASS. Since September 2017 he is leading the Crisis Management & Security Unit under the Smart Integrated Systems Team of the I-SENSE Group. His research interests include mobile/wireless telecommunication technologies, sensors and sensor networks, IoT and M2M, embedded systems and unmanned platforms (UxVs) with emphasis to security and crisis management applications such as next generation emergency services, disaster risk reduction, critical communications, border surveillance, asset-resources-infrastructure monitoring and situational awareness in crisis environments. He is mostly active in the field of Security under several domains (Civil Protection, Crisis management, Transport, Smart Cities, Critical Infrastructure, ICT) focusing on uptake of novel technologies for improving operational procedures and decision making.


Best Sellers


Product Details
  • ISBN-13: 9783030694593
  • Publisher: Springer Nature Switzerland AG
  • Publisher Imprint: Springer Nature Switzerland AG
  • Height: 210 mm
  • No of Pages: 564
  • Returnable: Y
  • Width: 148 mm
  • ISBN-10: 3030694593
  • Publisher Date: 25 Jun 2021
  • Binding: Hardback
  • Language: English
  • Returnable: Y
  • Series Title: Security Informatics and Law Enforcement


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Technology Development for Security Practitioners: (Security Informatics and Law Enforcement)
Springer Nature Switzerland AG -
Technology Development for Security Practitioners: (Security Informatics and Law Enforcement)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Technology Development for Security Practitioners: (Security Informatics and Law Enforcement)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!