Buy brei.eu ?

Products related to Security:


  • Innovation in Energy Security and Long-Term Energy Efficiency
    Innovation in Energy Security and Long-Term Energy Efficiency

    The sustainable development of our planet depends on the use of energy. The growing population of the world inevitably causes an increase in the demand for energy, which, on the one hand, threatens the potential for shortages of energy supply, and, on the other hand, causes the deterioration of the environment.Therefore, our task is to reduce this demand through different innovative solutions (i.e., both technological and social). Social marketing and economic policies can also play a role in affecting the behavior of households and companies, by causing behavioral change oriented to energy stewardship, and an overall switch to renewable energy resources. This book provides a platform for the exchange of a wide range of ideas, which, ultimately, would facilitate the driving of societies to long-term energy efficiency.

    Price: 36.30 £ | Shipping*: 0.00 £
  • Paradigms on Technology Development for Security Practitioners
    Paradigms on Technology Development for Security Practitioners

    ?This open access book is authored by a rich mix of contributors from across the landscape of research, academia, LEAs, civil protection, and other first responders, practitioners, public and private organizations and industry to address some of the most contemporary challenges within global security domain.The authors cover topics such as protection of critical infrastructures (CI), serious and organized crime, counter (cyber) terrorism, border management, cybercrime, cybersecurity, management of disasters and crises, big data analytics, the application of AI and the legal and ethical dimensions of the implementation of cutting-edge technologies.The book benefits from research actions and lessons learned from more than 35 EU R&D projects within the security domain.The book not only addresses theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, real world applied solutions, methodologies, and case studies within security domain. This is an open access book.

    Price: 44.99 £ | Shipping*: 0.00 £
  • Innovation in Music: Technology and Creativity
    Innovation in Music: Technology and Creativity

    Innovation in Music: Technology and Creativity is a groundbreaking collection bringing together contributions from instructors, researchers, and professionals.Split into two sections, covering composition and performance, and technology and innovation, this volume offers truly international perspectives on ever-evolving practices. Including chapters on audience interaction, dynamic music methods, AI, and live electronic performances, this is recommended reading for professionals, students, and researchers looking for global insights into the fields of music production, music business, and music technology.

    Price: 53.99 £ | Shipping*: 0.00 £
  • Fashion and Environmental Sustainability : Entrepreneurship, Innovation and Technology
    Fashion and Environmental Sustainability : Entrepreneurship, Innovation and Technology

    The wide range of topics that the book covers are organised into sections reflecting a cradle to grave view of how entrepreneurial, innovative, and tech-savvy approaches can advance environmental sustainability in the fashion sector.These sections include: sustainable materials; innovation in design, range planning and product development; sustainable innovations in fashion supply chains; sustainable innovations in fashion retail and marketing; sustainable alternatives for end-of-life and circular economy initiatives; and more sustainable alternative fashion business models.

    Price: 90.50 £ | Shipping*: 0.00 £
  • How does the security barrier in the store with alarm and security technology work?

    The security barrier in a store with alarm and security technology typically consists of sensors placed at entry and exit points. These sensors detect when an item with a security tag passes through them without being deactivated at the checkout. When this happens, the sensors trigger an alarm to alert store staff of a potential theft. Additionally, the security tags on items are usually deactivated at the checkout counter using a special device, allowing customers to leave the store without setting off the alarm.

  • On which security technology has your own company specialized?

    My company has specialized in developing and implementing advanced encryption technologies for data security. We focus on creating robust encryption algorithms and secure communication protocols to protect sensitive information from unauthorized access and cyber threats. Our solutions are designed to provide end-to-end encryption for data at rest and in transit, ensuring that our clients' data remains secure and private.

  • Which education is suitable for IT security or software development?

    For a career in IT security or software development, a formal education in computer science, information technology, or a related field is typically recommended. A bachelor's degree in computer science can provide a strong foundation in programming, algorithms, and computer systems, which are essential skills for both IT security and software development roles. Additionally, pursuing certifications in cybersecurity or software development can also help enhance your skills and credibility in the field. Ultimately, the most suitable education will depend on your specific career goals and interests within the IT industry.

  • Should public places be monitored by cameras and security technology?

    Public places should be monitored by cameras and security technology to ensure the safety and security of the people using those spaces. These measures can help deter criminal activity, provide evidence in the event of a crime, and help law enforcement respond more effectively to incidents. However, it is important to balance the use of surveillance technology with privacy concerns and ensure that it is used responsibly and ethically. Additionally, there should be transparency and oversight in the use of surveillance technology to prevent abuse and protect civil liberties.

Similar search terms for Security:


  • Development and Security
    Development and Security


    Price: 65.57 £ | Shipping*: 0.00 £
  • Creativity and Innovation in the Fashion Business : Contemporary Issues in Fashion Design and Product Development
    Creativity and Innovation in the Fashion Business : Contemporary Issues in Fashion Design and Product Development

    Creativity and Innovation in the Fashion Business explores the ways in which creativity and innovation play a central role across the fashion industry, paying particular attention to design and technical perspectives.This topic is examined through careful theoretical analysis, incorporating the perspectives of multiple contributors who together possess a wealth of combined experience in creative and technical roles in the fashion business. Broad in scope, this textbook first provides a wide overview of creativity and innovative developments across the industry, before considering technical and digital innovation in production and product development, as well as trend forecasting.The final part of the book then consists of an exploration of sustainable innovation in design for fashion brands and retailers.Each chapter includes aims and summaries to structure learning and highlight key points, academic insights from thought leaders and interviews from industry and academia. A vital introductory textbook, Creativity and Innovation in the Fashion Industry is well-suited to undergraduate and postgraduate modules across subjects such as Fashion Business, Fashion Design and Manufacturing, Product Development, Innovation Management, and Buying and Merchandising.Online resources include PowerPoint slides and a test bank.

    Price: 36.99 £ | Shipping*: 0.00 £
  • Art, Design and Technology: Collaboration and Implementation
    Art, Design and Technology: Collaboration and Implementation

    This book examines how digital technology is being used to assist the artists and designers.The computer is able to store data and reproduce designs, thus facilitating the speed-up of the iterative process towards a final design which meets the objectives of the designer and the requirements of the user.Collaborative design enables the sharing of information across digital networks to produce designed objects in virtual spaces.Augmented and virtual reality techniques can be used to preview designs before they are finalized and implemented. Art and design have shaped the values, social structures, communications, and the culture of communities and civilisations.The direct involvement of artists and designers with their creative works has left a legacy enabling subsequent generations to understand more about their skills, their motivations, and their relationship to the wider world, and to see it from a variety of perspectives.This in turn causes the viewers of their works to reflect upon their meaning for today and the lasting value and implications of what has been created. Art installations are harnessing modern technology to process information and to display it.Such environments have also proved useful in engaging users and visitors with real-time images and interactive art.

    Price: 49.99 £ | Shipping*: 0.00 £
  • Technology Ethics : Responsible Innovation and Design Strategies
    Technology Ethics : Responsible Innovation and Design Strategies

    Technologies cannot simply be understood as neutral tools or instruments; they embody the values of their creators and may unconsciously reinforce existing inequalities and biases. Technology Ethics shows how responsible innovation can be achieved.Demonstrating how design and philosophy converge, the book delves into the intricate narratives that shape our understanding of technology – from instrumentalist views to social constructivism.Yet, at its core, it champions interactionalism as the most promising and responsible narrative.Through compelling examples and actionable tools this book unravels the nuances of these philosophical positions, and is tailored to foster responsible innovation and thoughtful design.As our everyday lives further intertwine with technology, understanding and implementing these design principles becomes not just beneficial, but essential. This concise and accessible introduction is essential reading for students and scholars of philosophy of technology, engineering ethics, science and technology studies, and human–machine communication, as well as policymakers.

    Price: 45.00 £ | Shipping*: 0.00 £
  • What are examples of IT security and information security?

    Examples of IT security include implementing firewalls, antivirus software, and intrusion detection systems to protect networks and systems from cyber threats. Information security measures may include encrypting sensitive data, implementing access controls, and conducting regular security audits to ensure the confidentiality, integrity, and availability of information. Both IT security and information security are essential to safeguarding an organization's digital assets and preventing unauthorized access or data breaches.

  • 'Security or Freedom?'

    The balance between security and freedom is a complex and delicate one. While security is essential for protecting individuals and society from harm, excessive security measures can encroach on personal freedoms. Conversely, too much freedom without adequate security measures can lead to chaos and endanger the well-being of individuals and society. Finding the right balance between security and freedom is crucial for maintaining a stable and just society. It requires thoughtful consideration of the potential risks and benefits of security measures, as well as a commitment to upholding fundamental human rights and freedoms.

  • Do security bouncers become security guards at 17 years old?

    In most places, individuals must be at least 18 years old to become licensed security guards. This age requirement is in place to ensure that individuals have the maturity and responsibility needed for the job. While some establishments may hire individuals as security bouncers at 17 years old for specific roles, they would not be considered licensed security guards until they meet the legal age requirement.

  • What is the difference between IT security and information security?

    IT security and information security are often used interchangeably, but there is a subtle difference between the two. IT security primarily focuses on protecting the digital infrastructure, networks, and systems from unauthorized access, cyber threats, and data breaches. On the other hand, information security encompasses a broader scope, including the protection of all forms of sensitive and valuable information, whether it is in digital or physical form. Information security also involves safeguarding data privacy, compliance with regulations, and managing risks associated with the storage and transmission of information. In summary, while IT security is a subset of information security, the latter encompasses a wider range of protective measures for all types of information assets.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.