This book shares essential insights into how the social sciences and technology could foster new advances in managing the complexity inherent to the criminal and digital policing landscape.
The conflict in Ukraine has thrust the Black Sea into the center of the largest European dispute since 1945, leading to significant consequences for both the Alliance and the countries neighboring the Black Sea.
This book investigates the susceptibility of intrinsic physically unclonable function (PUF) implementations on reconfigurable hardware to optical semi-invasive attacks from the chip backside.
This book features selected papers presented at The International Science and Technology Conference "e;FarEastCon"e;, which took place on October 2-4, 2018 in Vladivostok, Russian Federation.
Flash floods typically develop in a period a few hours or less and can arise from heavy rainfall and other causes, such as dam or flood defence breaches, and ice jam breaks.
Focusing on the theory and applications of point processes, Point Processes for Reliability Analysis naturally combines classical results on the basic and advanced properties of point processes with recent theoretical findings of the authors.
This book reviews existing operational software failure analysis techniques and proposes near-miss analysis as a novel, and new technique for investigating and preventing software failures.
This updated textbook is for courses in cyber security education that follow the National Initiative for Cybersecurity Education (NICE) framework which adopts the Competency- Based Education (CBE) method.
This book comprehensively discusses essential aspects of terminal ballistics, combining experimental data, numerical simulations and analytical modeling.
This contributed volume presents the research results of the program "e;Small machine tools for small work pieces"e; (SPP 1476), funded by the German Research Society (DFG).
This book gathers selected, extended and revised papers presented at the 5th Iberian-Latin American Congress on Fire Safety, CILASCI 5, held on 15-17 July 2019, in Porto, Portugal.
This book presents the proceedings of the 8th International Conference on Engineering, Project, and Product Management (EPPM 2017), highlighting the importance of engineering, project and product management in a region of the world that is in need of transformation and rebuilding.
This book highlights the design, use and structure of blockchain systems and decentralized ledger technologies (B/DLT) for use in the construction industry.
This book addresses the hazard of gas explosions in sealed underground coal mines, and how the risk of explosion can be assessed, modeled, and mitigated.
For operators of nuclear research facilities, it is of particular importance to investigate minor incidents: indeed, as safety demonstrations are generally based on the presence of several independent "e;lines of defence"e;, only through attentive investigation of every occurrence, usually minor and of no consequence, can the level of trust placed in each of these defensive lines be confirmed, or the potential risks arising out of a possible weakness in the system be anticipated.
This book addresses Integrated Design Engineering (IDE), which represents a further development of Integrated Product Development (IPD) into an interdisciplinary model for both a human-centred and holistic product development.
This book covers a variety of topics in manufacturing, with a special emphasis on product design, production planning, and implementation of both resources and production processes.
This book contains an inclusive compilation of perspectives about the Arctic Ocean with contributions that extend from Indigenous residents and early career scientists to Foreign Ministers, involving perspectives across the spectrum of subnational-national-international jurisdictions.
This book addresses a modern topic in reliability: multi-state and continuous-state system reliability, which has been intensively developed in recent years.
This book focuses on numerical simulations of manufacturing processes, discussing the use of numerical simulation techniques for design and analysis of the components and the manufacturing systems.
This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students.
This book offers an in-depth and systematic introduction to improved failure mode and effects analysis (FMEA) methods for proactive healthcare risk analysis.
This book addresses the question of how system software should be designed to account for faults, and which fault tolerance features it should provide for highest reliability.
Nuclear Safeguards, Security and Nonproliferation: Achieving Security with Technology and Policy, Second Edition is a comprehensive reference covering the cutting-edge technologies used to trace, track and safeguard nuclear material.