Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
182
result(s) for
"Sécurité des systèmes."
Sort by:
Risk Assessment - Tools, Techniques, and Their Applications (2nd Edition)
by
Ostrom Lee T
,
Wilhelmsen Cheryl A
in
Documentation, Procedures & QA
,
General Engineering & Project Administration
,
Probabilities
2019
Since the first edition of the book was published there have been several changes in the types of risk individuals, businesses, and governments are being exposed to. Cyber-attacks are more frequent and costly and lone-wolf style terrorist attacks are more common; events not addressed in the first edition. The book continues to provide a resource that leads the reader through a risk assessment and shows them the proper tools to be used at the various steps in the process. This book also provides students studying safety and risk assessment a resource that assists them in understanding the various risk assessment tools and presents readers with a toolbox of techniques that can be used to aid them in analyzing conceptual designs, completed designs, procedures and operational risk. On top of the ten new chapters the new edition also includes expanded case studies and real-life examples; coverage on risk assessment software like SAPPHIRE and RAVEN; and end-of-chapter questions for students with a solutions manual for academic adopters.
Unmanned aerial vehicles for Internet of Things (IoT) : concepts, techniques, and applications
\"The 15 chapters in this book explore the theoretical as well as a number of technical research outcomes on all aspects of UAVs. UAVs has widely differing applications such as disaster management, structural inspection, goods delivery, transportation, localization, mapping, pollution and radiation monitoring, search and rescue, farming, etc. The advantages of using UAVs are countless and have led the way for the full integration of UAVs, as intelligent objects into the IoT system. The book covers such subjects as: efficient energy management systems in UAV based IoT networks, IoE enabled UAVs, mind-controlled UAV using Brain-Computer Interface (BCI), the importance of AI in realizing autonomous and intelligent flying IoT, blockchain-based solutions for various security issues in UAV-enabled IoT, the challenges and threats of UAVs such as hijacking, privacy, cyber-security, and physical safety\"-- Provided by publisher.
Delivering Safety Excellence
2021
Delivering Safety Excellence
Discover how to overcome a culture of inadequately addressing risk and thereby achieve safe working practices from a leader in the field
Delivering Safety Excellence: Engagement Culture At Every Level provides an in-depth and practical overview of how to energize frontline employees, supervisors, managers, and leaders to overcome and solve regularly occurring safety concerns. The book teaches readers how to resolve dysfunctional safety cultures by engaging employees at all levels. This cross functional engagement culture regularly builds safe and effective working practices that eliminate regulatory, financial, and personal risk shortfalls while encouraging profitability and efficiency.
The distinguished author shows how culture improvement processes and models can be utilized to improve the performance all across an organization. The material is presented in dialogue format using case studies to highlight the relationship between the concepts discussed and their application in the real world.
You'll discover how to implement real solutions in industries of all types and in organizations of all sizes using practical and concrete strategies tested by the author in regions and varying cultures around the world. Readers will also benefit from the inclusion of:
* A thorough introduction to rapidly resolving the many common deficiencies insafety culture, including scarce regulatory and cultural materials and a lack ofsupport, trust, and credibility for safety officers
* Practical discussions of how urgency can obstruct a consistent culture of safety, performance, and prudence
* Explorations of behavior-based safety, the injury plateau, the Occupational Health and Safety Act, and a dynamic model of safety weaknesses that lead to injuries
Perfect for safety officers at all levels of organizations of any size, Delivering Safety Excellence: Engagement Culture At Every Level will also earn a place in the libraries of executives, managers, leaders, supervisors, and employees who seek a one-stop reference for how to build a safe and profitable company.
Implementing Safety Management Systems in Aviation
by
John J. Goglia
,
Carl Halford
,
Alan J. Stolzer
in
Aeronautics
,
Civil engineering
,
Ergonomics & Human Factors
2016,2011,2012
In their first book, Safety Management Systems in Aviation, Stolzer, Halford, and Goglia provided a strong theoretical framework for SMS, along with a brief discourse on SMS implementation. This follow-up book provides a very brief overview of SMS and offers significant guidance and best practices on implementing SMS programs. Very specific guidance is provided by industry experts from government, industry, academia, and consulting, who share their invaluable insights from first-hand experience of all aspects of effective SMS programs.
If It's Smart, It's Vulnerable
Reimagine the future of the internet All our devices and gadgets-from our refrigerators to our home security systems, vacuum cleaners, and stereos-are going online, just like our computers did. But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? In If It's Smart, It's Vulnerable, veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best-and worst-things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing. In this book, the author explores the transformative potential of the future of the internet, as well as those things that threaten its continued existence: government surveillance, censorship, organized crime, and more. Readers will also find: Insightful discussions of how law enforcement and intelligence agencies operate on the internet Fulsome treatments of how money became data and the impact of the widespread use of mobile supercomputing technology Explorations of how the internet has changed the world, for better and for worse Engaging stories from Mikko's 30-year career in infosecPerfect for anyone seeking a thought-provoking presentation of some of the most pressing issues in cybersecurity and technology, If It's Smart, It's Vulnerable will also earn a place in the libraries of anyone interested in the future of the internet.
Periodic Safety Review for Research Reactors
by
IAEA
2020
This publication provides information and guidance on the establishment of a process for periodic safety review for research reactors, including preparation, conduct of the review and reporting of results. In addition, it covers the regulatory assessment of these results. The publication also provides information on the experience of Member States in establishing and implementing periodic safety reviews of research reactors, including implementation of reasonable and practical improvements based on these reviews.
Design for Safety
2018,2017
A one-stop reference guide to design for safety principles and applications Design for Safety (DfSa) provides design engineers and engineering managers with a range of tools and techniques for incorporating safety into the design process for complex systems. It explains how to design for maximum safe conditions and minimum risk of accidents. The book covers safety design practices, which will result in improved safety, fewer accidents, and substantial savings in life cycle costs for producers and users. Readers who apply DfSa principles can expect to have a dramatic improvement in the ability to compete in global markets. They will also find a wealth of design practices not covered in typical engineering books-allowing them to think outside the box when developing safety requirements. Design Safety is already a high demand field due to its importance to system design and will be even more vital for engineers in multiple design disciplines as more systems become increasingly complex and liabilities increase. Therefore, risk mitigation methods to design systems with safety features are becoming more important. Designing systems for safety has been a high priority for many safety-critical systems-especially in the aerospace and military industries. However, with the expansion of technological innovations into other market places, industries that had not previously considered safety design requirements are now using the technology in applications. Design for Safety: Covers trending topics and the latest technologies Provides ten paradigms for managing and designing systems for safety and uses them as guiding themes throughout the book Logically defines the parameters and concepts, sets the safety program and requirements, covers basic methodologies, investigates lessons from history, and addresses specialty topics within the topic of Design for Safety (DfSa) Supplements other books in the series on Quality and Reliability Engineering Design for Safety is an ideal book for new and experienced engineers and managers who are involved with design, testing, and maintenance of safety critical applications. It is also helpful for advanced undergraduate and postgraduate students in engineering. Design for Safety is the second in a series of \"Design for\" books. Design for Reliability was the first in the series with more planned for the future.
Cyber insecurity
2016
Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future. As internet connectivity continues to spread, this book will offer readers greater awareness of the threats of tomorrow—and serve to inform public debate into the next information age. Contributions by Adrienne Allen, Aaron Brantly, Lauren Boas Hayes, Jane Chong, Joshua Corman, Honorable Richard J. Danzig, Kat Dransfield, Ryan Ellis, Mailyn Fidler, Allan Friedman, Taylor Grossman, Richard M. Harrison, Trey Herr, Drew Herrick, Jonah F. Hill, Robert M. Lee, Herbert S. Lin, Anastasia Mark, Robert Morgus, Paul Ohm, Eric Ormes, Jason Rivera, Sasha Romanosky, Paul Rosenzweig, Matthew Russell, Nathaniel Tisa, Abraham Wagner, Rand Waltzman, David Weinstein, Heather West, and Beau Woods.