The handbook aims to provide a comprehensive resource for understanding ionizing radiation dosimetry, catering to experts, policymakers, and interested readers.
This book presents the 16th ICGS3-24 conference which aims to understand the full impact of cyber-security, AI, deepfake, and quantum computing on humanity.
This book highlights the maritime applications of Global Navigation Satellite Systems (GNSSs) with emphasis on BeiDou Navigation Satellite System (BDS).
This book highlights the maritime applications of Global Navigation Satellite Systems (GNSSs) with emphasis on BeiDou Navigation Satellite System (BDS).
This book provides a comprehensive guide to the Inventory of Hazardous Materials (IHM), a critical document for ensuring the safe and environmentally sound recycling of ships.
This book provides a comprehensive guide to the Inventory of Hazardous Materials (IHM), a critical document for ensuring the safe and environmentally sound recycling of ships.
This book presents a paradigm for designing new generation resilient and evolving computer systems, including their key concepts, elements of supportive theory, methods of analysis and synthesis of ICT with new properties of evolving functioning, as well as implementation schemes and their prototyping.
This book addresses a potential radiation incident caused by the war in Ukraine, from an interdisciplinary approach of medical, nuclear safety and security, nuclear research, geostrategic and population's resilience perspectives.
This book provides an outline of the Ship-to-Ship transfer process, and how ship's masters and officers can conduct this inherently dangerous activity safely.
This book provides an outline of the Ship-to-Ship transfer process, and how ship's masters and officers can conduct this inherently dangerous activity safely.
This book presents Proceedings of the International Conference on Intelligent Systems and Networks, Hanoi, Vietnam, a collection of peer-reviewed articles accepted by ICISN 2024.
This book presents Proceedings of the International Conference on Intelligent Systems and Networks, Hanoi, Vietnam, a collection of peer-reviewed articles accepted by ICISN 2024.
Dieses Buch stellt ein Kompendium ausgewählter spiel- und entscheidungstheoretischer Modelle zur Erreichung und Bewertung der Sicherheit kritischer Infrastrukturen vor.
This book digs into the important confluence of cybersecurity and big data, providing insights into the ever-changing environment of cyber threats and solutions to protect these enormous databases.
This book provides a comprehensive exploration of health and safety in the workplace, focusing on critical safety design, functional safety, and applying risk analysis.
This book provides a comprehensive exploration of health and safety in the workplace, focusing on critical safety design, functional safety, and applying risk analysis.
In the field of equipment/product operation and maintenance (O&M) services, the new generation of information technologies such as the internet, big data, and artificial intelligence are deeply integrated with O&M services to form an internet-based Maintenance Repair & Operation (MRO) service network and an intelligent service environment.
In the field of equipment/product operation and maintenance (O&M) services, the new generation of information technologies such as the internet, big data, and artificial intelligence are deeply integrated with O&M services to form an internet-based Maintenance Repair & Operation (MRO) service network and an intelligent service environment.
A catastrophic phenomenon should not be considered a sudden and causeless event, but as a process whose characteristics are continuously changing throughout the entire previous period.
A catastrophic phenomenon should not be considered a sudden and causeless event, but as a process whose characteristics are continuously changing throughout the entire previous period.
17th WCEAM Proceedings provides a record of some of the intellectual discussions (including keynote addresses, research paper presentations, panel debates and practical workshops) that took place among the attendees and participants of the 17th World Congress on Engineering Asset Management (WCEAM), held from 18 - 20 October 2023 at the Sheraton Saigon Hotel and Towers, Ho Chi Minh City, Vietnam.
This updated, second edition unveils the mystery of the tunnel fires, covering most of the issues in fire safety engineering in tunnels, clearly describes the phenomena related to tunnel fire safety, presents state-of-the-art research, and gives detailed solutions to these major issues.
This updated, second edition unveils the mystery of the tunnel fires, covering most of the issues in fire safety engineering in tunnels, clearly describes the phenomena related to tunnel fire safety, presents state-of-the-art research, and gives detailed solutions to these major issues.
This book gathers recent research in security and privacy to discuss, evaluate, and improve the novel approaches of data protection in IoT and edge and fog computing.
This book gathers recent research in security and privacy to discuss, evaluate, and improve the novel approaches of data protection in IoT and edge and fog computing.
This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth, Zigbee, LoRA, GSM/GPRS/EDGE/LTE, etc.
This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth, Zigbee, LoRA, GSM/GPRS/EDGE/LTE, etc.
This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security.
This book first discusses cyber security fundamentals then delves into security threats and vulnerabilities, security vigilance, and security engineering for Internet of Everything (IoE) networks.
This book first discusses cyber security fundamentals then delves into security threats and vulnerabilities, security vigilance, and security engineering for Internet of Everything (IoE) networks.