Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Nous utilisons des cookies dans le but suivant :
Assurer le bon fonctionnement du site web, améliorer la sécurité et prévenir la fraude
Avoir un aperçu de l'utilisation du site web, afin d'améliorer son contenu et ses fonctionnalités
Pouvoir vous montrer les publicités les plus pertinentes sur des plateformes externes
Gestion des cookies
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Cookies techniques et fonctionnels
Ces cookies sont indispensables au bon fonctionnement du site internet et vous permettent par exemple de vous connecter. Vous ne pouvez pas désactiver ces cookies.
Cookies analytiques
Ces cookies collectent des informations anonymes sur l'utilisation de notre site web. De cette façon, nous pouvons mieux adapter le site web aux besoins des utilisateurs.
Cookies marketing
Ces cookies partagent votre comportement sur notre site web avec des parties externes, afin que vous puissiez voir des publicités plus pertinentes de Club sur des plateformes externes.
Une erreur est survenue, veuillez réessayer plus tard.
Il y a trop d’articles dans votre panier
Vous pouvez encoder maximum 250 articles dans votre panier en une fois. Supprimez certains articles de votre panier ou divisez votre commande en plusieurs commandes.
Nigeria has become one of the hotbeds of cybercrime since the liberalization of the telecommunication industry began in 1996. The scale and magnitude ...Savoir plus
The current policing landscape has seen the rise in serious and organized crime across the globe. Criminals are innovating in real-time leveraging cyb...Savoir plus
In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobi...Savoir plus
This book provides a line of communication between academia and end users/practitioners to advance forensic science and boost its contribution to crim...Savoir plus
Since the end of bipolarism, the concept of asymmetric warfare, and of asymmetric conflict in general, has been increasingly applied with regard to ar...Savoir plus
1. About the Book.- 2. Cybercrime, Public-Private Partnership and Europol.- 3. The Sharing Economy for a Public-Private Partnership.- 4. Mitigating Ra...Savoir plus
What does it take to disrupt security? How does one disrupt the invisibility of insecurity? How does one make the invisible factors that define and im...Savoir plus
This book explores and analyzes the rapid pace of technological evolution in diplomatic, information, military, and economic sectors, which has contri...Savoir plus
This book is intended to be used as a textbook and research reference for the field of nuclear nonproliferation. The book is primarily technical and f...Savoir plus
This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terror...Savoir plus
The COVID-19 pandemic is not only a threat to our health and economy, but also has strong implications for defence and security. Indeed, defence leade...Savoir plus
This book aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst performing bu...Savoir plus
Deals with collaborative security, a newly developing and promising field. Describes generic techniques as well as their applications in several domai...Savoir plus
This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first t...Savoir plus
The book presents novel research in the areas of social identity and security when using mobile platforms. The topics cover a broad range of applicati...Savoir plus
This book offers comprehensive coverage of biomarker/biosensor interactions for the rapid detection of weapons of bioterrorism, as well as current res...Savoir plus
This edited book examines the contemporary regional security concerns in the Asia-Pacific recognizing the 'Butterfly effect', the concept that small c...Savoir plus
This book shares essential insights into how the social sciences and technology could foster new advances in managing the complexity inherent to the c...Savoir plus
From pirates to smugglers, migrants to hackers, from stolen fish to smuggled drugs, the sea is becoming a place of increasing importance on the global...Savoir plus
This book provides information on data-driven infrastructure design, analytical approaches, and technological solutions with case studies for smart ci...Savoir plus
This book examines the roles of sensors, physics-based attributes, classification methods, and performance evaluation in automatic target recognition....Savoir plus
There are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspec...Savoir plus
This book intersects the distributed ledger technology (DLT) community with the international security community. Given the increasing application of ...Savoir plus
This book addresses the key security challenges in the big data centric computing and network systems, and discusses how to tackle them using a mix of...Savoir plus