Surveillance in Action

Technologies for Civilian, Military and Cyber Surveillance

Nonfiction, Social & Cultural Studies, Political Science, International, International Security, Social Science, Crimes & Criminals, Criminology, History
Cover of the book Surveillance in Action by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319685335
Publisher: Springer International Publishing Publication: November 14, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319685335
Publisher: Springer International Publishing
Publication: November 14, 2017
Imprint: Springer
Language: English

This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including gait recognition, face-based physiology-assisted recognition, face recognition in the visible and infrared bands, and cross-spectral iris recognition.

The second part of the book, Surveillance for Security and Defense, discusses the ethical issues raised by the use of surveillance systems in the name of combatting terrorism and ensuring security. It presents different generations of satellite surveillance systems and discusses the requirements for real-time satellite surveillance in military contexts. In addition, it explores the new standards of surveillance using unmanned air vehicles and drones, proposes surveillance techniques for detecting stealth aircrafts and drones, and highlights key techniques for maritime border surveillance, bio-warfare and bio-terrorism detection.

The last part of the book, Cyber Surveillance, provides a review of data hiding techniques that are used to hinder electronic surveillance. It subsequently presents methods for collecting and analyzing information from social media sites and discusses techniques for detecting internal and external threats posed by various individuals (such as spammers, cyber-criminals, suspicious users or extremists in general). The book concludes by examining how high-performance computing environments can be exploited by malicious users, and what surveillance methods need to be put in place to protect these valuable infrastructures. 

The book is primarily intended for military and law enforcement personnel who use surveillance-related technologies, as well as researchers, Master’s and Ph.D. students who are interested in learning about the latest advances in military, civilian and cyber surveillance.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including gait recognition, face-based physiology-assisted recognition, face recognition in the visible and infrared bands, and cross-spectral iris recognition.

The second part of the book, Surveillance for Security and Defense, discusses the ethical issues raised by the use of surveillance systems in the name of combatting terrorism and ensuring security. It presents different generations of satellite surveillance systems and discusses the requirements for real-time satellite surveillance in military contexts. In addition, it explores the new standards of surveillance using unmanned air vehicles and drones, proposes surveillance techniques for detecting stealth aircrafts and drones, and highlights key techniques for maritime border surveillance, bio-warfare and bio-terrorism detection.

The last part of the book, Cyber Surveillance, provides a review of data hiding techniques that are used to hinder electronic surveillance. It subsequently presents methods for collecting and analyzing information from social media sites and discusses techniques for detecting internal and external threats posed by various individuals (such as spammers, cyber-criminals, suspicious users or extremists in general). The book concludes by examining how high-performance computing environments can be exploited by malicious users, and what surveillance methods need to be put in place to protect these valuable infrastructures. 

The book is primarily intended for military and law enforcement personnel who use surveillance-related technologies, as well as researchers, Master’s and Ph.D. students who are interested in learning about the latest advances in military, civilian and cyber surveillance.

More books from Springer International Publishing

Cover of the book Hydrodynamics and Stellar Winds by
Cover of the book Complications of CSF Shunting in Hydrocephalus by
Cover of the book Raman Spectroscopy of Conformational Rearrangements at Low Temperatures by
Cover of the book Organic Transistor Devices for In Vitro Electrophysiological Applications by
Cover of the book Janus-Faced Probability by
Cover of the book Fundamentals of Optimization by
Cover of the book Managing Employee Well-being and Resilience for Innovation by
Cover of the book Regional Energy Demand and Energy Efficiency in Japan by
Cover of the book Design, Modeling and Evaluation of Protective Relays for Power Systems by
Cover of the book New Political Economy of Energy in Europe by
Cover of the book Meta-metaphysics by
Cover of the book An Accidental Brexit by
Cover of the book Patricia Highsmith on Screen by
Cover of the book Arthropod Borne Diseases by
Cover of the book Controllability and Stabilization of Parabolic Equations by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy