Narrow your search

Library

Odisee (7)

Thomas More Kempen (7)

Thomas More Mechelen (7)

UCLL (7)

VIVES (7)

LUCA School of Arts (6)

VUB (4)

KU Leuven (2)

ULB (2)

UGent (1)

More...

Resource type

book (7)


Language

English (7)


Year
From To Submit

2018 (1)

2016 (1)

2015 (1)

2014 (1)

2012 (1)

More...
Listing 1 - 7 of 7
Sort by

Book
Foreign intelligence surveillance courts : background, issues, and proposals
Author:
ISBN: 9781631176388 1631176382 Year: 2014 Publisher: New York : Novinka,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Spy satellites
Authors: ---
ISBN: 0295801565 9780295801568 9780295986869 0295986867 0295803096 9780295803098 Year: 2007 Publisher: Seattle University of Washington Press


Book
Capability planning and analysis to optimize Air Force intelligence, surveillance, and reconnaissance investments
Author:
ISBN: 9780309258159 0309258154 0309258146 9780309258142 0309259177 9780309259170 Year: 2012 Publisher: Washington, D.C. National Academies Press

Spies in the sky : surveillance satellites in war and peace
Author:
ISBN: 1281133531 9786611133535 0387716734 0387716726 Year: 2008 Publisher: Berlin ; New York : Chichester, UK : Springer ; In association with Praxis Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In Spies in the Sky Patrick Norris responds to the occasion of the 50th Anniversary of the dawn of the Space Age – the launch of Sputnik 1 – with a review of the most important historical applications of space science for the benefit of the human race during that half century, focusing particularly on the prevention of nuclear war. The author addresses the oft quoted conclusion that the Moon landings and the ‘race to the Moon’ between the two superpowers were a side effect of the Cold War, by describing what he believes was the more important event – the use of satellites by military to prevent the Cold War becoming a ‘hot war’. In developing the story the author casts a spotlight on a little-known aspect of the Space Age, namely the military dimension. Today military satellites represent 25 percent of all satellites in orbit, and they are just as important now in preventing regional nuclear war as they were in preventing global Armageddon more than 30 years ago.


Book
Surveillance in Action : Technologies for Civilian, Military and Cyber Surveillance
Authors: ---
ISBN: 3319685333 3319685325 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including gait recognition, face-based physiology-assisted recognition, face recognition in the visible and infrared bands, and cross-spectral iris recognition. The second part of the book, Surveillance for Security and Defense, discusses the ethical issues raised by the use of surveillance systems in the name of combatting terrorism and ensuring security. It presents different generations of satellite surveillance systems and discusses the requirements for real-time satellite surveillance in military contexts. In addition, it explores the new standards of surveillance using unmanned air vehicles and drones, proposes surveillance techniques for detecting stealth aircrafts and drones, and highlights key techniques for maritime border surveillance, bio-warfare and bio-terrorism detection. The last part of the book, Cyber Surveillance, provides a review of data hiding techniques that are used to hinder electronic surveillance. It subsequently presents methods for collecting and analyzing information from social media sites and discusses techniques for detecting internal and external threats posed by various individuals (such as spammers, cyber-criminals, suspicious users or extremists in general). The book concludes by examining how high-performance computing environments can be exploited by malicious users, and what surveillance methods need to be put in place to protect these valuable infrastructures.  The book is primarily intended for military and law enforcement personnel who use surveillance-related technologies, as well as researchers, Master’s and Ph.D. students who are interested in learning about the latest advances in military, civilian and cyber surveillance.

Keywords

Political science. --- Politics and war. --- Pattern recognition. --- Biometrics (Biology). --- System safety. --- Computer crimes. --- Political Science and International Relations. --- Military and Defence Studies. --- Cybercrime. --- Pattern Recognition. --- Biometrics. --- Security Science and Technology. --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- War --- War and politics --- Administration --- Civil government --- Commonwealth, The --- Government --- Political theory --- Political thought --- Politics --- Science, Political --- Social sciences --- State, The --- Prevention --- Statistical methods --- Political aspects --- Electronic surveillance. --- Video surveillance. --- Military surveillance. --- Surveillance, Military --- Detectors --- Military intelligence --- Electronic surveillance --- Video recording --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Remote sensing --- Optical pattern recognition. --- Optical data processing --- Pattern perception --- Perceptrons --- Visual discrimination


Book
Great power security cooperation
Author:
ISBN: 0739189441 9780739189443 9780739189436 0739189433 Year: 2015 Publisher: Lanham, Maryland

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Focusing on the expected military impact of technological change and the capacity of states to confidently monitor the innovations of its neighbors, this book explains the conditions under which states may be able to successfully forge cooperative agreements that improve their security"--Provided by publisher.

Listing 1 - 7 of 7
Sort by