Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Understanding Surveillance Technologies: Spy Devices, Their Origins & Applications

Buy
This is the first comprehensive text to cover this fascinating field from origins to present-day practices. Secret agents are no longer the only people using spycams, radio beacons, and tiny audio listening devices called 'bugs.' Spy devices are now an important part of almost every investigation, office environment, phone system, traffic advisory, and newscast, and are being incorporated into consumer devices in almost every home in the developed world. Never before has it been so important to learn about these technologiges and understand how they can affect your life, your government, your children, and your work.

This book is designed to be modular so you can read it in any order. Select the chapters that interest you, and follow the corss-references to find out more about related topics. Learn how one-meter-resolution satellites can see into your back yard, or the industrial yard down the street; find out how search and rescue professionals find lost hikers and victims of natural disasters. Learn how forensic experts solve cases using chemicals, microscopes, and minute traces of fibers and blood. Discover the history and progress of DNA research and how a simple cheek swab can identify an adoptee's biological relatives or establish a deadbeat parent's financial responsibilities.

This text is an excellent introduction for beginning surveillance professionals, including surveillance consultants, forensic investigators, law enforcement agents, and military recruits. It can also serve as a text for political science, sociology, and graduate business courses, laying a foundation for further study and professional development.

The text is extensively illustrated with more than seven hundred photos, diagrams, and charts to clarify the concepts, illustrate how the technologies are used, and provide examples of actual surveillance devices. Coverage includes over 900 pages organized into 18 chapters that include

- Acoustic Surveillance
Audio, Infrasound, Ultrasound, and Sonar Surveillance
- Electomagnetic Surveillance
Radio, Radar, Infrared, Visual, Aerial, Ultraviolet, and X-Ray Surveillance
- Chemical/Biological Surveillance
- Biometrics, Animal, and Genetic (DNA) Surveillance
- Magnetic Surveillance
- Cryptologic Surveillance
- Computer Surveillance

In addition to practical information on products and applications, this book provides extensive histories and information on legal debates and political decisions related to surveillance, privacy, and the protection of individual freedoms.

Understanding Surveillance Technologies includes references for further study in each chapter, including carefully annotated lists of books, articles, journals, Web sites, and films. Each chapter has a glossary of common terms related to that specific subject area. For the emerging field of surveillance, professionals are predicting this reference will be the industry standard introductory text.

(HTML tags aren't allowed.)

The Accretion and Obscured Growth of Supermassive Black Holes: First Constraints on the Local Heavily Obscured AGN Fraction with NuSTAR (Springer Theses)
The Accretion and Obscured Growth of Supermassive Black Holes: First Constraints on the Local Heavily Obscured AGN Fraction with NuSTAR (Springer Theses)
This thesis describes the application of state-of-the-art high-energy X-ray studies to the astronomical quest for understanding obscured active galactic nuclei (AGN). These AGN are supermassive black holes growing by accretion of matter located in the nuclei of galaxies. The material that feeds these black holes also obscures them from...
Magill's Encyclopedia of Science: Animal Life
Magill's Encyclopedia of Science: Animal Life
This four-volume set of encyclopaedias offers accessible information on the animal kingdom. Entries focus on non-humans from the animal kingdom, from insects to reptiles to mammals. Early humans are addressed in an evolutionary context, and modern humans are included only for interspecies comparison or for their efforts to coexist with other...
Wireless A to Z
Wireless A to Z
THE MOST PRECISE, CONCISE, AND AUTHORITATIVE WIRELESS REFERENCE AVAILABLE!

In today’s information-rich environment, a business operating without a cogent wireless communications strategy is destined for failure. That’s why, if designing, maintaining, or upgrading wireless and mobile communications systems...


Understanding Your Dog For Dummies (Pets)
Understanding Your Dog For Dummies (Pets)

Find out about canine communication and motivation

The fun and easy way® to get into your dog's head and be the leader of your pack

What makes Spot go? What makes Cujo psycho? This friendly guide helps you understand the emotional makeup and drives of your dog. All kinds of...

Seven Deadliest USB Attacks
Seven Deadliest USB Attacks

Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend...

Handbook of Machine and Computer Vision: The Guide for Developers and Users
Handbook of Machine and Computer Vision: The Guide for Developers and Users

The second edition of this accepted reference work has been updated to reflect the rapid developments in the field and now covers both 2D and 3D imaging.
Written by expert practitioners from leading companies operating in machine vision, this one-stop handbook guides readers through all aspects of image acquisition and image
...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy