1.

Record Nr.

UNINA9910154352603321

Autore

McDonough Yona Zeldis

Titolo

Who Was Sojourner Truth? / / Yona Zeldis McDonough ; illustrated by Jim Eldridge

Pubbl/distr/stampa

New York, New York : , : Grosset & Dunlap, , [2015]

©2015

Edizione

[First edition.]

Descrizione fisica

1 online resource (38 pages)

Collana

Who Was? Series

Classificazione

JNF007110JNF007120JNF007020

Disciplina

305.567092

Soggetti

African American abolitionists

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Sommario/riassunto

"Almost 100 years before Rosa Parks refused to give up her bus seat, Sojourner Truth was mistreated by a streetcar conductor. She took him to court--and won! Before she was Sojourner Truth, she was known simply as Belle. Born a slave in New York sometime around 1797, she was later sold and separated from her family. Even after she escaped from slavery, she knew her work was not yet done. She changed her name and traveled, inspiring everyone she met and sharing her story until her death in 1883 at age eighty-six. In this easy-to-read biography, Yona Zeldis McDonough continues to share that remarkable story"--



2.

Record Nr.

UNINA9910890900103321

Titolo

Paradigms on Technology Development for Security Practitioners / / edited by Ilias Gkotsis, Dimitrios Kavallieros, Nikolai Stoianov, Stefanos Vrochidis, Dimitrios Diagourtas, Babak Akhgar

Pubbl/distr/stampa

Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025

ISBN

3-031-62083-6

Edizione

[1st ed. 2025.]

Descrizione fisica

1 online resource (XVII, 535 p. 125 illus., 122 illus. in color.)

Collana

Security Informatics and Law Enforcement, , 2523-8515

Disciplina

621

Soggetti

Security systems

Data protection

Computational intelligence

Security Science and Technology

Data and Information Security

Computational Intelligence

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Introduction -- Part 1: Cyber Crime, Cyber Terrorism and Cyber Security -- Cybercrime and terrorism -- Cyber Security -- AI and Cyber -- Part 2: Effective management and security of EU external borders -- Border Security Technologies -- Methodological approaches to border security -- Integrated platforms for border security management -- Part 3 Serious and Organized Crime (SOC) -- Multimodal Data Fusion for combating SOC -- Big Data Processing and Analytics in context of SOC -- Data Visualisation and Decision Support -- Artificial Intelligence for combating SOC -- Part 4: Critical Infrastructures (CI) Resilience and Public Space Protection -- Cyber and System security for protection of CI -- Physical security of CI -- Case studies in protection of CI -- Protection of Public Spaces -- Part 5: Civil Protection and Disaster-Resilient Societies -- Crisis management -- Disaster management and Resilience strengthening technologies -- First responders technology -- Part 6: Strengthened Security Research and Innovation -- Part 7: Enhancing the defense capabilities of the EU -- Conclusion.

Sommario/riassunto

This open access book is authored by a rich mix of contributors from



across the landscape of research, academia, LEAs, civil protection, and other first responders, practitioners, public and private organizations and industry to address some of the most contemporary challenges within global security domain. The authors cover topics such as protection of critical infrastructures (CI), serious and organized crime, counter (cyber) terrorism, border management, cybercrime, cybersecurity, management of disasters and crises, big data analytics, the application of AI and the legal and ethical dimensions of the implementation of cutting-edge technologies. The book benefits from research actions and lessons learned from more than 35 EU R&D projects within the security domain. The book not only addresses theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, real world applied solutions, methodologies, and case studies within security domain. This is an open access book. Presents security practitioner driven technologies from practical, theoretical and legal/ethical point of view Offers R&D perspectives on strengthening security potential based on input from multidisciplinary stakeholders Addresses security topics from LEAs, Civil Protection authorities, first responders, cyber-security organizations, Critical Infrastructure operators and other stakeholders involved in societal resilience This book is open access, which means that you have free and unlimited access.