Vous en avez un à vendre?

Démystifier les systèmes de sécurité multimode intelligents : une cybersécurité de la périphérie vers le cloud

État :
Entièrement neuf
3 disponibles
Prix :
50,47 $US
Environ68,99 $C
Ayez l'esprit tranquille. Renvois acceptés.
Expédition :
Sans frais Economy Shipping. En savoir plussur l'expédition
Lieu : Fairfield, Ohio, États-Unis
Livraison :
Livraison prévue entre le sam. 15 juin et le jeu. 27 juin à 43230
Les dates de livraison approximatives – s'ouvre dans une nouvelle fenêtre ou un nouvel onglet tiennent compte du délai de manutention du vendeur, du code postal de l'expéditeur, du code postal du destinataire et de l'heure de l'acceptation et dépendent du service d'expédition sélectionné et de la réception du paiementréception du paiement - s'ouvre dans une nouvelle fenêtre ou un nouvel onglet. Les délais de livraison peuvent varier, particulièrement lors de périodes achalandées.
Renvois :
Renvoi sous 30jours. L'acheteur paie les frais de port du renvoi. En savoir plus- pour en savoir plus sur les renvois
Paiements :
     

Magasinez en toute confiance

Garantie de remboursement eBay
Recevez l'objet commandé ou obtenez un remboursement. 

Informations sur le vendeur

Inscrit comme vendeur professionnel
Le vendeur assume l'entière responsabilité de cette annonce.
Numéro de l'objet eBay :395344303800
Dernière mise à jour : mai 20, 2024 07:15:23 HAEAfficher toutes les modificationsAfficher toutes les modifications

Caractéristiques de l'objet

État
Entièrement neuf: Un livre neuf, non lu, non utilisé et en parfait état, sans aucune page manquante ...
ISBN-13
9781484282960
Book Title
Demystifying Intelligent Multimode Security Systems
ISBN
9781484282960
Publication Year
2023
Type
Textbook
Format
Trade Paperback
Language
English
Publication Name
Demystifying Intelligent Multimode Security Systems : an Edge-To-Cloud Cybersecurity Solutions Guide
Author
Anahit Tarkhanyan, Sunil Cheruvu, Werner Metz, Jody Booth
Item Length
10in
Publisher
Apress L. P.
Item Width
7in
Item Weight
20.5 Oz
Number of Pages
Xix, 280 Pages

À propos de ce produit

Product Information

This open access book. Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution. There are nearly half a million active IMSS cameras globally, with over 100 million added annually. These cameras are used across enterprises (companies, traffic monitoring, driver enforcement, etc.), in peoples' homes, on mobile devices (drones, on-vehicle, etc.), and are worn on the body. IMSS systems with a camera and network video recorder for storage are becoming the normal infrastructure for capturing, storing, and transmitting video content (sometimes up to 100 streams) in a secure manner and while protecting privacy. Military, aerospace, and government entities are also embracing digital security and surveillance. IMSS content serves as evidence in courts of law. Security within all of these types of IMSS systems needs to be bolstered by leveraging Intel hardware and software as the last line of defense, and this book provides you with best practices and solutions for maximizing security in your system implementation. What You Will Learn Review the relevant technologies in a surveillance system Define and dissect the data pipeline with a focus on key criteria and understand the mapping of this pipeline to Intel hardware blocks Optimize the partition and future-proof it with security and manageability Understand threat modeling terminology, the assets pertinent to DSS, and emerging threats, and learn how to mitigate these threats using Intel hardware and software Understand the unique risks and threats to the intelligence in IMSS (machine learning training and inferencing, regulations, and standards) and explore the solution space for mitigations to these threats Sample applications illustrate how to design in security for several types of IMSS.-- Explore ways to keep both yourself and your systems up to date in a rapidly changing technology and threat environment Who This Book Is For Surveillance system designers, integrators, and consultants; professional systems, hardware, and software designers who design, recommend, or integrate surveillance systems; security system integrators; video analytics engineers; agencies that write RFPs and/or RFIs; government, police, and security agencies; and corporate security divisions This is an open access book.

Product Identifiers

Publisher
Apress L. P.
ISBN-10
1484282965
ISBN-13
9781484282960
eBay Product ID (ePID)
9057275185

Product Key Features

Author
Anahit Tarkhanyan, Sunil Cheruvu, Werner Metz, Jody Booth
Publication Name
Demystifying Intelligent Multimode Security Systems : an Edge-To-Cloud Cybersecurity Solutions Guide
Format
Trade Paperback
Language
English
Publication Year
2023
Type
Textbook
Number of Pages
Xix, 280 Pages

Dimensions

Item Length
10in
Item Width
7in
Item Weight
20.5 Oz

Additional Product Features

Number of Volumes
1 Vol.
Lc Classification Number
Qa75.5-76.95
Table of Content
Introduction Chapter 1: Introduction Goal: Inform the reader why the security of a security system is important. Set the context and grab the interest of reader. Chapter 2: DSS System Level View Goal: describe the essential components in a video surveillance system · System Topology · Principle Components · End to End Security Chapter 3: Complementary Technologies Goal: Provide an overview of the relevant technologies in a surveillance system. · Basic Image Synthesis and Video Processing · Computer Vision and Machine Learning · Cybersecurity Chapter 4: Dissecting a E2E DSS Data Pipeline Goal: Define and dissect the data pipeline with focus on key criteria and enable the reader to understand the mapping of this pipeline to Intel hardware blocks. With this knowledge, the reader will also be equipped with knowledge to optimize the partition and future-proof with security and manageability. · What does it take? · Defining the data pipeline · Key criteria - Accuracy, Throughput, power, efficiency · Partitioning the data pipeline across and E2E system architecture · Key criteria at each stage of the E2E system architecture · Mapping the data pipeline to real hardware · Optimizing the partition - further criteria - security, maintainability, future proofing Chapter 5: Securing the DSS Assets Goal: Introduce Threat Modeling terminology, outline the assets pertinent to DSS, emerging threats, and explain how to mitigate these threats using Intel HW and SW technologies. · Threat Modeling Terminology · DSS Assets · Emerging Threats · Mitigations with IA technologies Chapter 6: Sample DSS Applications Goal: Enumerate some of the key applications of DSS, while cataloging the security assets from Intel. · Scene detection · Pedestrian/driver identification Chapter 7: Vision--Future Work Goal: Inform the reader about where to go next and to monitor megatrends, align with them and also comply with upcoming standards. · Surveillance system megatrends - sensor fusion, scene understanding, designing for a low trust/no trust environment, · What to look for on the horizon - surviving in a disruptive environment, quantum computing, · Standards impact - metadata exchange, parsing the workload, telemetry, next generation video codecs - AV1 and beyond
Copyright Date
2023
Topic
Security / General
Illustrated
Yes
Genre
Computers

Description de l'objet du vendeur

grandeagleretail

grandeagleretail

98,3% d'évaluations positives
2,7M objets vendus
Visiter la BoutiqueContacter
Répond généralement en 24 heures

Évaluations détaillées du vendeur

Moyenne au cours des 12 derniers mois

Qualité de la description
4.9
Justesse des frais d'expédition
5.0
Rapidité de l'expédition
4.9
Communication
4.9

Évaluations comme vendeur (1 024 010)

t***n (880)- Évaluation laissée par l'acheteur.
Dernier mois
Achat vérifié
Arrived as listed
d***_ (2)- Évaluation laissée par l'acheteur.
Dernier mois
Achat vérifié
Good morning, I have not seen any updates on the status of the book order, could you please ship, and thank you so much, I appreciate it.
t***h (383)- Évaluation laissée par l'acheteur.
Dernier mois
Achat vérifié
Topseller +++++

Évaluations et avis sur le produit

Aucune évaluation ni aucun avis jusqu'à maintenant.
Soyez le premier à rédiger un avis.