001437741 000__ 04644cam\a2200661\i\4500 001437741 001__ 1437741 001437741 003__ OCoLC 001437741 005__ 20230309004230.0 001437741 006__ m\\\\\o\\d\\\\\\\\ 001437741 007__ cr\un\nnnunnun 001437741 008__ 210702s2021\\\\sz\a\\\\o\\\\\001\0\eng\d 001437741 019__ $$a1260345608$$a1266809543 001437741 020__ $$a9783030694609$$q(electronic bk.) 001437741 020__ $$a3030694607$$q(electronic bk.) 001437741 020__ $$z9783030694593 001437741 020__ $$z3030694593 001437741 0247_ $$a10.1007/978-3-030-69460-9$$2doi 001437741 035__ $$aSP(OCoLC)1258651215 001437741 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dNOC$$dOCLCO$$dGW5XE$$dEBLCP$$dOCLCO$$dOCLCF$$dDCT$$dN$T$$dUKAHL$$dOCLCO$$dOCLCQ$$dCOM$$dOCLCQ 001437741 049__ $$aISEA 001437741 050_4 $$aUA10.5$$b.T43 2021 001437741 08204 $$a355/.03$$223 001437741 24500 $$aTechnology development for security practitioners /$$cBabak Akhgar, Dimitrios Kavallieros, Evangelos Sdongos, editors. 001437741 264_1 $$aCham :$$bSpringer,$$c[2021] 001437741 264_4 $$c©2021 001437741 300__ $$a1 online resource :$$billustrations (chiefly color) 001437741 336__ $$atext$$btxt$$2rdacontent 001437741 337__ $$acomputer$$bc$$2rdamedia 001437741 338__ $$aonline resource$$bcr$$2rdacarrier 001437741 347__ $$atext file 001437741 347__ $$bPDF 001437741 4901_ $$aSecurity informatics and law enforcement,$$x2523-8507 001437741 500__ $$aIncludes index. 001437741 5050_ $$aIntroduction -- Part 1: Cyber Crime, Cyber Terrorism and Cyber Security Cybercrime -- Cyber Terrorism -- Cyber Security -- AI and Cyber -- Part 2: Border Security -- Border Security Technologies -- Methodological approaches to border security -- Integrated platforms for border security management -- Part 3 Serious and Organized Crime (SOC) -- Data Integration for combating SOC -- Big Data Analytics in context of SOC -- Data Visualisation and pattern matching -- AI and SOC -- Part 4: Protection of Critical Infrastructures (CI) -- Cyber and System security for protection of CI -- Physical security of CI -- Role of UAVs in protection of CI -- Case studies in protection of CI -- Part 5: Disaster and Crisis management -- First responders technology -- Crisis management -- Disaster management and Resilience strengthening technologies -- Conclusion. 001437741 506__ $$aAccess limited to authorized users. 001437741 520__ $$aThis volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain. The latter includes protection of critical infrastructures (CI), counter-terrorism, application of dark web, and analysis of a large volume of artificial intelligence data, cybercrime, serious and organised crime, border surveillance, and management of disasters and crises. This title explores various application scenarios of advanced ICT in the context of cybercrime, border security and crisis management, serious and organised crime, and protection of critical infrastructures. Readers will benefit from lessons learned from more than 30 large R & D projects within a security context. The book addresses not only theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, and includes real-world applied solutions. Offers perspectives of R & D contributions to strengthening security potential from a multidisciplinary group of stakeholders from several domains; Addresses a range of security topics seen from the viewpoint of practitioners; Provides an extended collection of results delivered by advanced security research projects. 001437741 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed July 22, 2021). 001437741 650_0 $$aSecurity sector$$xTechnological innovations. 001437741 650_0 $$aSecurity, International. 001437741 650_0 $$aBorder security. 001437741 650_0 $$aComputer security. 001437741 650_0 $$aCrisis management. 001437741 650_6 $$aSecteur de la sécurité$$xInnovations. 001437741 650_6 $$aSécurité frontalière. 001437741 650_6 $$aSécurité informatique. 001437741 650_6 $$aGestion de crise. 001437741 655_0 $$aElectronic books. 001437741 7001_ $$aAkhgar, Babak,$$eeditor. 001437741 7001_ $$aKavallieros, Dimitrios,$$eeditor. 001437741 7001_ $$aSdongos, Evangelos,$$eeditor. 001437741 77608 $$iPrint version:$$z3030694593$$z9783030694593$$w(OCoLC)1231956993 001437741 830_0 $$aSecurity informatics and law enforcement.$$x2523-8507 001437741 852__ $$bebk 001437741 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-69460-9$$zOnline Access$$91397441.1 001437741 909CO $$ooai:library.usi.edu:1437741$$pGLOBAL_SET 001437741 980__ $$aBIB 001437741 980__ $$aEBOOK 001437741 982__ $$aEbook 001437741 983__ $$aOnline 001437741 994__ $$a92$$bISE