Security and fire alarm systems Books

54 products


  • Locksmithing, Lock Picking & Lock Opening: Professional Training Manual

    15 in stock

    £17.99

  • Reliability and Six Sigma

    Springer Reliability and Six Sigma

    15 in stock

    Book SynopsisReliability and Six Sigma - Introduction.- Reliability and Six Sigma Probabilitic Models.- Reliability and Six Sigma Measures.- System Reliability.- Design for Reliability and Six Sigma.- Inservice Reliability.- Reliability and Six Sigma Estimation.- Software Reliability.- Availability and Six Sigma.- Reliability and Six Sigma Management.Trade ReviewFrom the reviews: "Six Sigma is essentially a method of assessing and improving quality … . This text basically describes a large number of reliability measures, and shows how they can be translated into Six Sigma measures. … the book does a fine job of introducing reliability engineers or reliability theorists into the basics of the Six Sigma methodology." (Moshe Shaked, Zentrablatt MATH, Vol. 1096 (22), 2006) "Six Sigma is essentially a measure of process capability and allows less than 3.4 defects per million opportunities. … The book is interspersed with several useful case studies from live examples, which make a good reading for a beginner in the subject. The book is recommended to all those who would like to see symbiosis between improved reliability design of a product and Six Sigma strategy for performance improvement." (Krishna B. Misra, International Journal of Performability Engineering, Vol. 4 (3), 2008)Table of ContentsReliability and Six Sigma - Introduction.- Reliability and Six Sigma — Probabilitic Models.- Reliability and Six Sigma Measures.- System Reliability.- Design for Reliability and Six Sigma.- Inservice Reliability.- Reliability and Six Sigma Estimation.- Software Reliability.- Availability and Six Sigma.- Reliability and Six Sigma Management.

    15 in stock

    £123.49

  • HighSecurity Mechanical Locks

    Elsevier Science HighSecurity Mechanical Locks

    Out of stock

    Book SynopsisSurveys and explains the technical area of high security locks. This book presents over 100 different locks, organized into 6 basic types. Each chapter introduces the necessary concepts in a historical perspective and further categorizes the locks.Trade Review"In scope and clarity this book transcends anything that I have ever seen on locks and keys." --Jon Millington"It's not often that a book lands on your desk that you feel should be an essential companion for all locksmiths. High Security Mechanical Locks is just such a book... I was very impressed by both the breadth and depth of locks covered, where else do the Bode-Panzer Tangential lock from the '30s and the Hobbs Parautoptic from the Victorian era rub shoulders with the New Generation BiLock and the Mercedes & Volvo Four-Track Locks? In short, if you're serious about your profession as a locksmith you have to have this book!" --from Keyways, the Journal of the Master Locksmiths Association, UK, Feb. 2008"Since I received the book I can’t believe how many times I have grabbed it to try and help explain to a friend how a specific lock works...The book is so packed with information and pictures it is a real joy to have on the shelf." --Mitch Capper"This is a really fantastic work, and one that I just wouldn't want to be missing from my collection." --Josh Nekrep"I thoroughly recommend this book to both lock collectors and working locksmiths. After some 40 years of active collecting, I have learned of the existence of high security locks that I was totally unaware of. It is quite obvious that many years of intensive research and study have gone into the preparation of this book. It is no exaggeration to describe Graham Pulford as the 'George Price' of our era. He has documented the high security mechanical locks of our age in the detailed way that George Price did in the Victorian period. This book is a 'Must Have'." --J. Michael Fincher, Collector and writer on the subject of high security safe and vault locks for over 40 years"A very coherent and riveting book which will be found valuable to anyone interested in learning more about mechanical locks. This book triumphs over all encyclopedic references I have read from modern day times, and is worthy to stand alongside George Price's book of 1856."--Tommy Watson, UK safe expert"As a professional involved in reviewing and testing mechanical locks for several manufacturers, I have over time gained considerable knowledge about locking techniques and systems and was initially skeptical about this book. As soon as I started reading my perceptions changed. There were several locking techniques I had not seen or read about before. In addition, not only were many locks covered in great detail, but many uncommon locks too. There are certainly many ways one can talk about a lock, from patents to operating principles, or even how to manipulate the. In my opinion, the author has done a remarkable job at covering the subject of mechanical locks in an understandable and comprehensive manner. I would recommend this book to every lock enthusiast or industry person who would like to dive deeper into locking techniques."--Han Fey, Han Fey Lock Technologies, The NetherlandsTable of Contents1 Introduction; 2 Pin-Tumbler Locks; 3 Wafer Locks; 4 Side-Bar Locks; 5 Lever Locks; 6 Magnetic Locks; 7 Car Locks; 8 Conclusion; References; Figure Credits; Appendix A1: Permutations and Combinations; Appendix A2: Lock Permutations and Fractals; Appendix B: Translations of Lock Vocabulary; Appendix C: Terminology and Abbreviations; Appendix D: Lock Patents; Appendix E: Brief History of the Bramah Lock; Appendix F: Key Code Computations; Appendix G: Security Gradings for Cylinder Locks

    Out of stock

    £71.99

  • Illustrierte Einfuhrung in Die Schlossoffnung

    15 in stock

    £16.10

  • Security by Design

    Taylor & Francis Ltd Security by Design

    1 in stock

    Book SynopsisThis is a book about the intersection of architecture and security, about effective crime prevention and counterterror using the built form. While security professionals continue their strive towards alleviating our fear of crimes, and whilst methodologies like CPTED (Crime Prevention Through Environmental Design) have demonstrated the impact of design on prevention of crime over the last five decades, too many built environment professionals are not aware of these strategies. This book starts with the premise that there is a huge role for the design fraternity (namely architects and planners) in achieving realistic, efficient and permanent results, and ultimately in creating a safer world. It seeks to present such strategies in a palatable way and encourage professionals to incorporate security thinking into their design process as second nature. Combining international case studies including One World Trade Centre, New York; WHO Headquarters Extension Building, GenevTable of ContentsPrefaceAcknowledgements1 Prologue2 Fundamentals of 'Security by Design'3 CPTED Explained4 Security Engineering5 Planning for Security6 Case Studies7 Epilogue

    1 in stock

    £43.69

  • Intelligent Network Video

    Taylor & Francis Ltd Intelligent Network Video

    15 in stock

    Book SynopsisThe third edition traces the trajectory of video surveillance technology from its roots to its current state and into its potential future role in security and beyond. For the reader, it is an opportunity to explore what the latest technology has to offer, as well as to gain some insight into the direction that surveillance will take us in the years ahead.The revised edition of Intelligent Network Video is more comprehensive in every area than the first and second editions, printed in over 25,000 copies. There is also a new chapter on cybersecurity, as well as thoroughly revised chapters on cloud and analytics. The book takes the reader on a tour through the building blocks of intelligent network video from imaging to network cameras and video encoders, through the IT technologies of network and storage and into video management, analytics, and system design.Table of Contents Evolution of video surveillance systems Components of network video Network cameras Camera technologies Thermal cameras Video compression technologies Audio technologies Video encoders Networking technologies Wired networks Wireless networks Cybersecurity Servers and storage Video management Cloud-based video solutions Video analytics Video analytics applications System design considerations

    15 in stock

    £56.04

  • Crime Prevention Security and Community Safety

    Palgrave Macmillan Crime Prevention Security and Community Safety

    1 in stock

    Book SynopsisThe potential of crime prevention, security and community safety is constrained by implementation failure. This book presents a carefully-designed system of good practice, the 5Is, which handles the complexities of real world prevention, this aims to improve the performance of prevention, and advance process evaluation.Trade Review"Ekblom can be your guide." - Professional Security blog, Feb 2011 'The clarity of the style makes the book enjoyable and allows the author's reasoning to be easily followed...Ekblom identifies ground-level practitioners, delivery managers, and policy makers as his principal audience. Given the extensive use of examples from past crime-prevention projects, his book is actually a valid support for each of these three groups in their work. The book may also be attractive to researchers and students in applied criminology, as the 5Is framework is not only a practical, but also a research, tool.' - European Journal on Criminal Policy and ResearchTable of ContentsSeries Editor's Preface Acknowledgements Introduction Implementation Failure: The Dismal Story Implicated Ignorance and Culpable Confusion: The Contribution to Implementation Failure of Deficient Knowledge and Articulacy The Gift to be Simple? How Avoiding the Issue of Complexity Contributes to Implementation Failure Appropriate Complexity Specification for a Knowledge Framework Introducing the 5Is Framework Conceptual Companions to 5Is: Defining Crime Prevention Activities, Institutional Contexts and Values A Companion Framework for Causes of Crime and Preventive Interventions: The Conjunction of Criminal Opportunity Presenting the Is in Detail Intelligence Intervention Implementation Involvement Impact – and Process Evaluation Conclusion End notes References Index

    1 in stock

    £85.49

  • Engineering Design

    Springer Engineering Design

    15 in stock

    Book SynopsisFundamentals.- Product Planning, Solution Finding and Evaluation.- Product Development Process.- Task Clarification.- Conceptual Design.- Embodiment Design.- Mechanical Connections, Mechatronics and Adaptronics.- Size Ranges and Modular Products.- Design for Quality.- Design for Minimum Cost.- Summary.Trade Review"Engineering Design is widely acknowledged to be the most complete available treatise on systematic design methods. In it, each step of the engineering design process and associated best practices are documented. The book has particularly strong sections on design from the functional perspective and on the phase of the process between conceptual and detail design in which most key design decisions are made. The 3rd edition includes new material on project planning and scheduling. Anyone committed to understanding the design process should be familiar with the contents of this book." Warren Seering, Weber-Shaughness Professor of Mechanical Engineering, Massachusetts Institute of Technology On the second edition of this title: "With a renewed interest in the critical role product design plays in maintaining economic competitiveness, American designers would be well advised to become thoroughly acquainted with this wealth of information." American ScientistTable of ContentsFundamentals.- Product Planning, Solution Finding and Evaluation.- Product Development Process.- Task Clarification.- Conceptual Design.- Embodiment Design.- Mechanical Connections, Mechatronics and Adaptronics.- Size Ranges and Modular Products.- Design for Quality.- Design for Minimum Cost.- Summary.

    15 in stock

    £52.24

  • Risk Analysis in the Private Sector

    Springer Risk Analysis in the Private Sector

    1 in stock

    Book SynopsisSection 1: Chemical Risk Management.- Chemical Risk Management: Introduction.- A Generic Environmental Health Risk Model for Ranking the Toxic By-Products of Energy Systems.- Private Sector Response Patterns to Risks from Chemicals.- The Control of the Use Pattern and the Life of Metals for Risk Management: The Case of Lead.- Acceptable Levels of Risk in Setting Chemical Standards.- Integrated Risk Index System.- Section 2: Occupational Risk Analysis.- Occupational Risk Analysis: Introduction.- Occupational Health and Safety Risk Analysis for Oil Shale.- Quantitative Risk Assessment for Inorganic Arsenic: Determining a Significant Risk.- Analysis of Agency Estimates of Risk for Carcinogenic Agents.- A Training Program on Hazardous Materials for Non-Scientists.- Inorganic Arsenic: Importance of Accurate Exposure Characterization for Risk Assessment.- Lower-Bound Benefits of Air Pollution Reductions in the Munich Metropolitan Area (MMA).- Environmental Risk Assessment in the Energy FieldTable of ContentsSection 1: Chemical Risk Management.- Chemical Risk Management: Introduction.- A Generic Environmental Health Risk Model for Ranking the Toxic By-Products of Energy Systems.- Private Sector Response Patterns to Risks from Chemicals.- The Control of the Use Pattern and the Life of Metals for Risk Management: The Case of Lead.- Acceptable Levels of Risk in Setting Chemical Standards.- Integrated Risk Index System.- Section 2: Occupational Risk Analysis.- Occupational Risk Analysis: Introduction.- Occupational Health and Safety Risk Analysis for Oil Shale.- Quantitative Risk Assessment for Inorganic Arsenic: Determining a Significant Risk.- Analysis of Agency Estimates of Risk for Carcinogenic Agents.- A Training Program on Hazardous Materials for Non-Scientists.- Inorganic Arsenic: Importance of Accurate Exposure Characterization for Risk Assessment.- Lower-Bound Benefits of Air Pollution Reductions in the Munich Metropolitan Area (MMA).- Environmental Risk Assessment in the Energy Field: Issues and Application to Policy.- Risk Management in Household Detergent Control.- Section 3: Ethics and Values in Risk Analysis.- Ethics and Values in Risk Analysis: Introduction.- Product Liability: When Does the Individual Assume the Risk?.- Three Types of Risk Assessment A Methodological Analysis.- Legitimating Private Sector Risk Analysis: A U.S.-European Comparison.- Are Regulations Needed to Hold Experts Accountable for Contributing “Biased” Briefs of Reports That Affect Public Policies.- Protecting Workers, Protecting Publics: The Ethics of Differential Protection.- The Chemical Industry’s View of Risk Assessment.- Section 4: Risk Analysis and Risk Management: Issues, Methods, and Case Studies.- Risk Analysis and Risk Management.- Dietary Carcinogens and Anticarcinogens: Oxygen Radicals and Degenerative Diseases.- Institutional Initiatives for Risk Management.- Risk Assessment: The Reality of Uncertainty.- The Statistical Correlation Model for Common Cause Failures.- Turbine Rotor Reliability: A Probability Model for Brittle Fracture.- A Guide for Reliability and Maintainability Data Acquisition.- The Application of Risk-Based Cost-Benefit Analysis in the Assessment of Acceptable Public Safety for Nuclear Power Plants.- Insurance Market Assessment of Technological Risks.- The “Third Made”: Technology Regulation by Insurance.- Environmental Impairment Liability (EIL) Insurance Risk Assessment Surveys.- Risk Compensation, Behavior Choice, and the Enforcement of Drunk Driving Statutes.- Cognitive Maps of Risk and Benefit Perceptions.- Warning Systems and Risk Reduction.- On Determining Public Acceptability of Risk.

    1 in stock

    £46.74

  • HACCP A Practical Approach Author S Mortimore

    Springer-Verlag New York Inc. HACCP A Practical Approach Author S Mortimore

    1 in stock

    Book SynopsisForeword.- Acknowledgements.- About the Authors.- Disclaimer.- About this Book.- Prologue.- 1. An Introduction to HACCP and its role in food safety control.- 2. Preparation and planning to achieve effective food safety management.- 3. Hazards, their significance and control.- 4. Prerequisites for food safety PRPs and Operational PRPs.- 5. Designing food safety.- 6. How to do a HACCP Study.- 7. Implementation, Verification and Maintenance for Ongoing Risk Management.- 8. Considerations for HACCP application in different supply chain sectors.- Epilogue.- References, further reading and resource materials.- Appendices.- Index.Trade ReviewMortimore and Wallace point out that since they last updated the book there have continued to be many failures in the food supply chain. Some of these are world renowned, many were significant national failures, and many, many more were small, isolated, and sometimes tragic events occurring in local communities all around the world. So what has gone wrong? Is HACCP not working? Sadly, the answer to this question is that it hasn’t had a chance to work. Far from being “done,” HACCP has been poorly implemented and under-utilized in probably the majority of food companies. Twenty years ago developments in HACCP were fairly major, and some governments saw its implementation as a remedy for all of their country’s food safety issues. In reality, use of the HACCP approach does offer a practical and major contribution to the way forward, but only if the people charged with its implementation have the proper knowledge and expertise to apply it effectively. Whilst a new book isn’t by itself going to solve that problem, the authors hope that it may help some companies to do better.- Land O'Lakes, Inc., Arden Hills, MNTable of ContentsForeword.- Acknowledgements.- About the Authors.- Disclaimer.- About this Book.- Prologue.- 1. An Introduction to HACCP and its role in food safety control.- 2. Preparation and planning to achieve effective food safety management.- 3. Hazards, their significance and control.- 4. Prerequisites for food safety – PRPs and Operational PRPs.- 5. Designing food safety.- 6. How to do a HACCP Study.- 7. Implementation, Verification and Maintenance for Ongoing Risk Management.- 8. Considerations for HACCP application in different supply chain sectors.- Epilogue.- References, further reading and resource materials.- Appendices.- Index.

    1 in stock

    £71.99

  • Stochastic Models in Reliability 41 Stochastic Modelling and Applied Probability

    Springer New York Stochastic Models in Reliability 41 Stochastic Modelling and Applied Probability

    15 in stock

    Book SynopsisThis book provides a comprehensive up-to-date presentation of some of the classical areas of reliability, based on a more advanced probabilistic framework using the modern theory of stochastic processes.Trade Review This is an excellent book on mathematical, statistical and stochastic models in reliability. The authors have done an excellent job of unifying some of the stochastic models in reliability. The book is a good reference book but may not be suitable as a textbook for students in professional fields such as engineering. This book may be used for graduate level seminar courses for students who have had at least the first course in stochastic processes and some knowledge of reliability mathematics. It should be a good reference book for researchers in reliability mathematics.--Mathematical ReviewsTable of ContentsIntroduction.- Basic Reliability Theory.- Stochastic Failure Models.- Availability Analysis of Complex Systems.- Maintenance Optimization.

    15 in stock

    £85.49

  • Data Assessment for Electrical Surge Protective Devices

    Springer Data Assessment for Electrical Surge Protective Devices

    15 in stock

    Book SynopsisIntroduction.- Surge Protection Fundamentals.- Industry Standards.- Data Acquisition Plan.Table of ContentsIntroduction.- Surge Protection Fundamentals.- Industry Standards.- Data Acquisition Plan.

    15 in stock

    £42.74

  • The Power of Awareness: And Other Secrets from

    Grand Central Publishing The Power of Awareness: And Other Secrets from

    10 in stock

    Book Synopsis A spy is suddenly aware she's being stalked through the streets of an overseas city. A special ops soldier intuitively recognizes something's 'off' during a high-risk mission. In these life-threatening situations experts know exactly how to use their senses and what actions to take. At the intersection of The Gift of Fear and Make Your Bed, The Power of Awareness will make sure you will, too.   In his empowering book, Dan Schilling shares how to identify and avoid threats using situational awareness and intuition just like the pros. Told with wit and wisdom, this compelling guide uses harrowing stories from Dan's special operations career and those of other experts to outline six easily implemented rules you can apply anywhere to improve your personal safety.   It incorporates exercises to understand how situational awareness works in real life, how to better listen to your intuition, and when confronted by a criminal how to make a plan and take action with confidence—so you can escape the threat before it's too late.   He also includes tools on how to secure your home or hotel room, use public transportation, plan international travel, and reduce your criminal target appeal and exposure, in addition to how to escape an active shooter situation. As a bonus, you'll even learn how to survive a date without getting murdered.   By the last page you'll know that your own Power of Awareness can save your life.

    10 in stock

    £21.00

  • Electrician's Guide to Fire Detection and Fire Alarm Systems

    Institution of Engineering and Technology Electrician's Guide to Fire Detection and Fire Alarm Systems

    15 in stock

    The Electrician's Guide to Fire Detection and Fire Alarm Systems, 3rd Edition is ideal for individuals involved in the design and installation of fire detection systems as part of electrical installations. It offers information, advice, and guidance on managing BS 7671 and BS 5839 requirements. This Guide is an essential publication for all fire alarm designers, installers, specifiers, electricians, electrical contractors, installation designers and students in further education and/or professional training. Key Features include: Ideal for individuals involved in the design and installation of fire detection systems as part of electrical installations Includes essential advice on special fire risk, systems design and integration, and installation competency Provides information, advice and guidance on managing BS 7671:2018 and BS 5839 requirements Updated to accommodate the changes, revisions and new information made to IET's 18th Edition, BS 7671:2018 regulations Updated to include changes, revision and new information added to the BS 5839-1 and BS 5839-6 requirements An essential publication for all fire alarm designers, installers, specifiers, electricians, electrical contractors, installation designers and students in further education and/or professional training

    15 in stock

    £30.30

  • Engineering Design: A Systematic Approach

    Springer London Ltd Engineering Design: A Systematic Approach

    15 in stock

    Book SynopsisThis proven and internationally recognized text teaches the methods of engineering design as a condition of successful product development. It breaks down the design process into phases and then into distinct steps, each with its own working methods. The book provides more examples of product development; it also tightens the scientific bases of its design ideas with new solution fields in composite components, building methods, mechatronics and adaptronics. The economics of design and development are covered and electronic design process technology integrated into its methods. The book is sharply written and well-illustrated.Trade Review"Engineering Design is widely acknowledged to be the most complete available treatise on systematic design methods. In it, each step of the engineering design process and associated best practices are documented. The book has particularly strong sections on design from the functional perspective and on the phase of the process between conceptual and detail design in which most key design decisions are made. The 3rd edition includes new material on project planning and scheduling. Anyone committed to understanding the design process should be familiar with the contents of this book." Warren Seering, Weber-Shaughness Professor of Mechanical Engineering, Massachusetts Institute of Technology On the second edition of this title: "With a renewed interest in the critical role product design plays in maintaining economic competitiveness, American designers would be well advised to become thoroughly acquainted with this wealth of information." American ScientistTable of ContentsFundamentals.- Product Planning, Solution Finding and Evaluation.- Product Development Process.- Task Clarification.- Conceptual Design.- Embodiment Design.- Mechanical Connections, Mechatronics and Adaptronics.- Size Ranges and Modular Products.- Design for Quality.- Design for Minimum Cost.- Summary.

    15 in stock

    £75.99

  • Handbook of Reliability, Availability, Maintainability and Safety in Engineering Design

    Springer London Ltd Handbook of Reliability, Availability, Maintainability and Safety in Engineering Design

    15 in stock

    Book SynopsisThis handbook studies the combination of various methods of designing for reliability, availability, maintainability and safety, as well as the latest techniques in probability and possibility modeling, mathematical algorithmic modeling, evolutionary algorithmic modeling, symbolic logic modeling, artificial intelligence modeling and object-oriented computer modeling.Trade ReviewFrom the reviews: "[I] would like to recommend this for all design engineers as it provides the most comprehensive coverage of the engineering design problems and analytical tools for achieving the design." K.B. Misra, Editor-in-Chief, International Journal of Performability Engineering (2009) “Stapelberg (Griffith Univ. and engineering consultant, Australia) brings his extensive background and experience to this comprehensive, well-organized handbook, which addresses the different facets of evaluating integrity in engineering design. … All in all, this handbook provides a thorough treatment of the methodology for assessing integrity in engineering design of systems and equipment. Summing Up: Recommended. Academic audiences, undergraduate seniors and above, professional engineering designers and analysts, general readers.” (R. Kolar, Choice, Vol. 47 (6), February, 2010)Table of ContentsDesign Integrity Methodology Designing for Integrity Artificial Intelligence in Design Design Integrity and Automation Industry Perception and Related Research Intelligent Design Systems Reliability and Performance in Engineering Design Introduction Theoretical Overview of Reliability and Performance in Engineering Design Analytic Development of Reliability and Performance in Engineering Design Application Modelling of Reliability and Performance in Engineering Design Review Exercises and References Availability and Maintainability in Engineering Design Introduction Theoretical Overview of Availability-Maintainability in Engineering Design Analytic Development of Availability-Maintainability in Engineering Design Application Modelling of Availability-Maintainability in Engineering Design Review Exercises and References Safety and Risk in Engineering Design Introduction Theoretical Overview of Safety and Risk in Engineering Design Analytic Development of Safety and Risk in Engineering Design Application Modelling of Safety and Risk in Engineering Design Review Exercises and References

    15 in stock

    £313.49

  • Product Reliability: Specification and

    Springer London Ltd Product Reliability: Specification and

    Out of stock

    Book SynopsisAs an overview of reliability performance and specification in new product development, Product Reliability is suitable for managers responsible for new product development. The methodology for making decisions relating to reliability performance and specification will be of use to engineers involved in product design and development. This book can be used as a text for graduate courses on design, manufacturing, new product development and operations management and in various engineering disciplines.Table of ContentsAn Overview New Product Development Product Performance and Specification An Introduction to Reliability Theory Performance and Specification in the Front-end Phase Performance and Specification during Design Performance during Development Product Performance and Production Post-sale Performance Product Safety Requirements Reliability Management System

    Out of stock

    £134.99

  • Intelligent Video Surveillance Systems

    ISTE Ltd and John Wiley & Sons Inc Intelligent Video Surveillance Systems

    10 in stock

    Book SynopsisBelonging to the wider academic field of computer vision, video analytics has aroused a phenomenal surge of interest since the current millennium. Video analytics is intended to solve the problem of the incapability of exploiting video streams in real time for the purpose of detection or anticipation. It involves analyzing the videos using algorithms that detect and track objects of interest over time and that indicate the presence of events or suspect behavior involving these objects. The aims of this book are to highlight the operational attempts of video analytics, to identify possible driving forces behind potential evolutions in years to come, and above all to present the state of the art and the technological hurdles which have yet to be overcome. The need for video surveillance is introduced through two major applications (the security of rail transportation systems and a posteriori investigation). The characteristics of the videos considered are presented through the cameras which enable capture and the compression methods which allow us to transport and store them. Technical topics are then discussed – the analysis of objects of interest (detection, tracking and recognition), “high-level” video analysis, which aims to give a semantic interpretation of the observed scene (events, behaviors, types of content). The book concludes with the problem of performance evaluation.Table of ContentsIntroduction xiii Jean-Yves DUFOUR and Phlippe MOUTTOU Chapter 1. Image Processing: Overview and Perspectives 1 Henri MAÎTRE 1.1. Half a century ago 1 1.2. The use of images 3 1.3. Strengths and weaknesses of image processing 4 1.3.1. What are these theoretical problems that image processing has been unable to overcome? 5 1.3.2. What are the problems that image processing has overcome? 5 1.4. What is left for the future? 6 1.5. Bibliography 9 Chapter 2. Focus on Railway Transport 13 Sébastien AMBELLOUIS and Jean-Luc BRUYELLE 2.1. Introduction. 13 2.2. Surveillance of railway infrastructures 15 2.2.1. Needs analysis 15 2.2.2. Which architectures? 16 2.2.3. Detection and analysis of complex events 17 2.2.4. Surveillance of outside infrastructures 20 2.3. Onboard surveillance 21 2.3.1. Surveillance of buses 22 2.3.2. Applications to railway transport 23 2.4. Conclusion 28 2.5. Bibliography 30 Chapter 3. A Posteriori Analysis for Investigative Purposes 33 Denis MARRAUD, Benjamin CÉPAS, Jean-François SULZER, Christianne MULAT and Florence SÈDES 3.1. Introduction 33 3.2. Requirements in tools for assisted investigation 34 3.2.1. Prevention and security 34 3.2.2. Information gathering 35 3.2.3. Inquiry 36 3.3. Collection and storage of data 36 3.3.1. Requirements in terms of standardization 37 3.3.2. Attempts at standardization (AFNOR and ISO) 37 3.4. Exploitation of the data 39 3.4.1. Content-based indexing 39 3.4.2. Assisted investigation tools 43 3.5. Conclusion 44 3.6. Bibliography 45 Chapter 4. Video Surveillance Cameras 47 Cédric LE BARZ and Thierry LAMARQUE 4.1. Introduction 47 4.2. Constraints 48 4.2.1. Financial constraints 48 4.2.2. Environmental constraints 49 4.3. Nature of the information captured 49 4.3.1. Spectral bands 50 4.3.2. 3D or “2D + Z” imaging 51 4.4. Video formats 53 4.5. Technologies 55 4.6. Interfaces: from analog to IP 57 4.6.1. From analog to digital 57 4.6.2. The advent of IP 59 4.6.3. Standards. 60 4.7. Smart cameras 61 4.8. Conclusion 62 4.9. Bibliography 63 Chapter 5. Video Compression Formats 65 Marc LENY and Didier NICHOLSON 5.1. Introduction 65 5.2. Video formats 66 5.2.1. Analog video signals 66 5.2.2. Digital video: standard definition 67 5.2.3. High definition 68 5.2.4. The CIF group of formats 69 5.3. Principles of video compression 70 5.3.1. Spatial redundancy 70 5.3.2. Temporal redundancy 73 5.4. Compression standards 74 5.4.1. MPEG-2 74 5.4.2. MPEG-4 Part 2 75 5.4.3. MPEG-4 Part 10/H.264 AVC 77 5.4.4. MPEG-4 Part 10/H.264 SVC 79 5.4.5. Motion JPEG 2000 80 5.4.6. Summary of the formats used in video surveillance 82 5.5. Conclusion 83 5.6. Bibliography 84 Chapter 6. Compressed Domain Analysis for Fast Activity Detection 87 Marc LENY 6.1. Introduction 87 6.2. Processing methods 88 6.2.1. Use of transformed coefficients in the frequency domain 88 6.2.2. Use of motion estimation 90 6.2.3. Hybrid approaches 91 6.3. Uses of analysis of the compressed domain 93 6.3.1. General architecture 94 6.3.2. Functions for which compressed domain analysis is reliable 96 6.3.3. Limitations. 97 6.4. Conclusion 100 6.5. Acronyms 101 6.6. Bibliography 101 Chapter 7. Detection of Objects of Interest 103 Yoann DHOME, Bertrand LUVISON, Thierry CHESNAIS, Rachid BELAROUSSI, Laurent LUCAT, Mohamed CHAOUCH and Patrick SAYD 7.1. Introduction. 103 7.2. Moving object detection 104 7.2.1. Object detection using background modeling 104 7.2.2. Motion-based detection of objects of interest 107 7.3. Detection by modeling of the objects of interest 109 7.3.1. Detection by geometric modeling 109 7.3.2. Detection by visual modeling. 111 7.4. Conclusion 117 7.5. Bibliography 118 Chapter 8. Tracking of Objects of Interest in a Sequence of Images 123 Simona MAGGIO, Jean-Emmanuel HAUGEARD, Boris MEDEN, Bertrand LUVISON, Romaric AUDIGIER, Brice BURGER and Quoc Cuong PHAM 8.1. Introduction 123 8.2. Representation of objects of interest and their associated visual features 124 8.2.1. Geometry 124 8.2.2. Characteristics of appearance 125 8.3. Geometric workspaces 127 8.4. Object-tracking algorithms 127 8.4.1. Deterministic approaches 127 8.4.2. Probabilistic approaches 128 8.5. Updating of the appearance models 132 8.6. Multi-target tracking 135 8.6.1. MHT and JPDAF 135 8.6.2. MCMC and RJMCMC sampling techniques 136 8.6.3. Interactive filters, track graph 138 8.7. Object tracking using a PTZ camera 138 8.7.1. Object tracking using a single PTZ camera only 139 8.7.2. Object tracking using a PTZ camera coupled with a static camera 139 8.8. Conclusion 141 8.9. Bibliography 142 Chapter 9. Tracking Objects of Interest Through a Camera Network 147 Catherine ACHARD, Sébastien AMBELLOUIS, Boris MEDEN,Sébastien LEFEBVRE and Dung Nghi TRUONG CONG 9.1. Introduction 147 9.2. Tracking in a network of cameras whose fields of view overlap 148 9.2.1. Introduction and applications 148 9.2.2. Calibration and synchronization of a camera network 150 9.2.3. Description of the scene by multi-camera aggregation 153 9.3. Tracking through a network of cameras with non-overlapping fields of view 155 9.3.1. Issues and applications 155 9.3.2. Geometric and/or photometric calibration of a camera network 156 9.3.3. Reidentification of objects of interest in a camera network 157 9.3.4. Activity recognition/event detection in a camera network 160 9.4. Conclusion 161 9.5. Bibliography 161 Chapter 10. Biometric Techniques Applied to Video Surveillance 165 Bernadette DORIZZI and Samuel VINSON 10.1. Introduction 165 10.2. The databases used for evaluation166 10.2.1. NIST-Multiple Biometrics Grand Challenge (NIST-MBGC) 167 10.2.2. Databases of faces 167 10.3. Facial recognition 168 10.3.1. Face detection 168 10.3.2. Face recognition in biometrics 169 10.3.3. Application to video surveillance 170 10.4. Iris recognition 173 10.4.1. Methods developed for biometrics 173 10.4.2. Application to video surveillance 174 10.4.3. Systems for iris capture in videos 176 10.4.4. Summary and perspectives 177 10.5. Research projects 177 10.6. Conclusion 178 10.7. Bibliography 179 Chapter 11. Vehicle Recognition in Video Surveillance 183 Stéphane HERBIN 11.1. Introduction 183 11.2. Specificity of the context 184 11.2.1. Particular objects 184 11.2.2. Complex integrated chains 185 11.3. Vehicle modeling 185 11.3.1. Wire models 186 11.3.2. Global textured models 187 11.3.3. Structured models 188 11.4. Exploitation of object models 189 11.4.1. A conventional sequential chain with limited performance 189 11.4.2. Improving shape extraction 190 11.4.3. Inferring 3D information. 191 11.4.4. Recognition without form extraction 192 11.4.5. Toward a finer description of vehicles 193 11.5. Increasing observability 194 11.5.1. Moving observer 194 11.5.2. Multiple observers 195 11.6. Performances 196 11.7. Conclusion 196 11.8. Bibliography 197 Chapter 12. Activity Recognition 201 Bernard BOULAY and François BRÉMOND 12.1. Introduction 201 12.2. State of the art 202 12.2.1. Levels of abstraction 202 12.2.2. Modeling and recognition of activities 203 12.2.3. Overview of the state of the art 206 12.3. Ontology 206 12.3.1. Objects of interest 207 12.3.2. Scenario models 208 12.3.3. Operators 209 12.3.4. Summary 210 12.4. Suggested approach: the ScReK system 210 12.5. Illustrations 212 12.5.1. Application at an airport 213 12.5.2. Modeling the behavior of elderly people 213 12.6. Conclusion 215 12.7. Bibliography 215 Chapter 13. Unsupervised Methods for Activity Analysis and Detection of Abnormal Events 219 Rémi EMONET and Jean-Marc ODOBEZ 13.1. Introduction 219 13.2. An example of a topic model: PLSA 221 13.2.1. Introduction 221 13.2.2. The PLSA model 221 13.2.3. PLSA applied to videos 223 13.3. PLSM and temporal models 226 13.3.1. PLSM model 226 13.3.2. Motifs extracted by PLSM 228 13.4. Applications: counting, anomaly detection 230 13.4.1. Counting 230 13.4.2. Anomaly detection 230 13.4.3. Sensor selection 231 13.4.4. Prediction and statistics 233 13.5. Conclusion 233 13.6. Bibliography 233 Chapter 14. Data Mining in a Video Database 235 Luis PATINO, Hamid BENHADDA and François BRÉMOND 14.1. Introduction 235 14.2. State of the art 236 Table of Contents xi 14.3. Pre-processing of the data 237 14.4. Activity analysis and automatic classification 238 14.4.1. Unsupervised learning of zones of activity 239 14.4.2. Definition of behaviors 242 14.4.3. Relational analysis 243 14.5. Results and evaluations 245 14.6. Conclusion 248 14.7. Bibliography 249 Chapter 15. Analysis of Crowded Scenes in Video 251 Mikel RODRIGUEZ, Josef SIVIC and Ivan LAPTEV 15.1. Introduction 251 15.2. Literature review 253 15.2.1. Crowd motion modeling and segmentation 253 15.2.2. Estimating density of people in a crowded scene 254 15.2.3. Crowd event modeling and recognition 255 15.2.4. Detecting and tracking in a crowded scene 256 15.3. Data-driven crowd analysis in videos 257 15.3.1. Off-line analysis of crowd video database 258 15.3.2. Matching 258 15.3.3. Transferring learned crowd behaviors 260 15.3.4. Experiments and results 260 15.4. Density-aware person detection and tracking in crowds 262 15.4.1. Crowd model 263 15.4.2. Tracking detections 264 15.4.3. Evaluation 265 15.5. Conclusions and directions for future research 268 15.6. Acknowledgments 268 15.7. Bibliography 269 Chapter 16. Detection of Visual Context 273 Hervé LE BORGNE and Aymen SHABOU 16.1. Introduction 273 16.2. State of the art of visual context detection 275 16.2.1. Overview 275 16.2.2. Visual description 276 16.2.3. Multiclass learning 278 16.3. Fast shared boosting 279 16.4. Experiments. 281 16.4.1. Detection of boats in the Panama Canal 281 16.4.2. Detection of the visual context in video surveillance 283 16.5. Conclusion 285 16.6. Bibliography 286 Chapter 17. Example of an Operational Evaluation Platform: PPSL 289 Stéphane BRAUDEL 17.1. Introduction 289 17.2. Use of video surveillance: approach and findings 290 17.3. Current use contexts and new operational concepts 292 17.4. Requirements in smart video processing 293 17.5. Conclusion 294 Chapter 18. Qualification and Evaluation of Performances 297 Bernard BOULAY, Jean-François GOUDOU and François BRÉMOND 18.1. Introduction 297 18.2. State of the art 298 18.2.1. Applications 298 18.2.2. Process 299 18.3. An evaluation program: ETISEO 303 18.3.1. Methodology 303 18.3.2. Metrics 305 18.3.3. Summary 307 18.4. Toward a more generic evaluation 309 18.4.1. Contrast 310 18.4.2. Shadows 312 18.5. The Quasper project 312 18.6. Conclusion 313 18.7. Bibliography 314 List of Authors 315 Index 321

    10 in stock

    £132.00

  • Handbook of Checked Baggage Screening: Advanced

    John Wiley & Sons Inc Handbook of Checked Baggage Screening: Advanced

    10 in stock

    Book SynopsisHandbook of Checked Baggage Screening – Advanced Airport Security Operation is a practical guide for project managers and designers embarking on hold-baggage screening developments within the airport environment for the first time. The book clearly explains away any uncertainty about the processes and procedures to be used by the various parties involved within the industry and sets out ‘best practice’ with respect to checked baggage screening design. Valuable lessons can be learned from actual case studies contributed by leading equipment manufacturers on recent 100% hold baggage screening projects. In addition to the all-important security screening of baggage and passengers the book also looks at the following areas associated with airport security, through the use of a detailed structured security check-list evaluation questionnaire. The questionnaire allows airports to assess the state of readiness of their airports and then, using the other chapters, gain an insight regarding which technology will best solve any security gaps. The authors offer a unique perspective through their background and experience. Many of the checked baggage screening procedures and equipment discussed in the book have already been implemented in the UK, with the authors responsible for leading this effort. The combined experience they can offer to the industry world wide is invaluable.Table of ContentsForeword. Acknowledgements. Glossary and Definition of Terms. Chapter 1. Where to Start. Chapter 2. Hold Baggage Screening. Chapter 3. Project Processes. Chapter 4. Dealing with Governments. Chapter 5. The Client and Users. Chapter 6. Interested Parties. Chapter 7. General Airport Processes. Chapter 8. General Airport Development Models. Chapter 9. Retail Development. Chapter 10. Planning/Environmental/Terminology. Chapter 11. Cost Management. Chapter 12. The HBS Project Programme. Chapter 13. Airport Systems Maintenance. Chapter 14. Airport Security. Chapter 15. Terminal Buildings. Chapter 16. Apron Areas. Chapter 17. Support Infrastructure. Chapter 18. Project Handover. Manufacturer Case Studies. Index.

    10 in stock

    £155.75

  • Reading Fire: A Complete Scene Assessment Guide

    Pavilion Publishing and Media Ltd Reading Fire: A Complete Scene Assessment Guide

    1 in stock

    Book SynopsisCompleting a full scene assessment upon arrival at an incident can significantly lower the overall risks, as well allow for a more effective response. Reading Fire supports frontline practitioners in gathering information upon arrival at an incident, using the 'BE-SAHF' model of assessment. Using a step-by-step approach, it considers each critical area of the model, from building, construction and environmental factors, to understanding and reading smoke, airflow, heat and flames. It explores each of these areas in depth and considers the evidence that needs to be analysed in order to formulate an effective tactical plan.Trade ReviewReview for Fire Dynamics for Firefighters, Book 1 in the Compartment Firefighting Series: "This original and practical book challenges some of the thinking from the last decade and covers the imperative topics that all firefighters need to be fluent in, including the importance of flow rates and the impact of building construction on fire behaviour. Benjamin's thought provoking use of case studies really brings the reality of the consequences home. This book will add to the tools available to firefighters as they deal with these situations on a daily basis." Neil Gibbins QFSM FIFireETable of ContentsIntroducing the BE SAHF modelReading fire step 1: Building and constructionReading fire step 2: Environmental factorsReading fire step 3: Smoke factorsReading fire step 4: Air factorsReading fire step 5: Heat factorsReading fire step 6: Flame factorsBe safe, not too late - A visual case study

    1 in stock

    £23.95

  • Fighting Fire

    Pavilion Publishing and Media Ltd Fighting Fire

    1 in stock

    Reading Fire examines the selection of appropriate tactics for the stages of fire development and burning profiles and includes a detailed comparison of techniques, including Tactical Ventilation, Transitional Attack, Water Application and Nozzle Techniques. It also concludes with consideration of the STAR Model of Decision Making and an evaluation of Basic Incident Command Principles. It is simple and easy-to-use, making it an ideal companion for all frontline practitioners, to both improve firefighter safety and to support professional development.

    1 in stock

    £23.95

  • Fronts: Military Urbanisms and the Developing

    Oro Editions Fronts: Military Urbanisms and the Developing

    Out of stock

    Book SynopsisFronts uncovers a growing geography of codependence between the global security complex and the urban morphologies of the developing world which it increasingly incriminates. Military training sites, and the real-world informal environments they replicate, provide a lens through which we can better understand the shape of the city to come. While the world continues to urbanise, military doctrine has recently and dramatically shifted to view the world's cities as suspect sites of potential aggression. As the majority of new urban life will manifest as informal development, the world is now more than ever explicitly divided in two camps: those who view the informal city as an opportunity, and those who view the informal city as a threat. This paradigmatic shift has set the stage for impending conflict between security and development interests, which take the informal city as their site.Trade Review"As security regimes expand into either the remainders of the nation state or territories outside of law, spatial evidence gains new authority within the usual legal or economic assessments. FRONTS tracks and graphically measures those heavy precipitates of global capital and military conflict as they mix in toxic spatial cocktails of logistics, humanitarianism, militarism, training, and incarceration." Keller Easterling--Architect; Professor & Director of the Master of Environmental Design Program, Yale University; Author, Extrastatecraft: The Power of Infrastructure Space--Keller Easterling "Keller Easterling " "Kripa and Mueller peel back the curtain on the spreading geography of urban simulation. This astonishing original research illuminates the future of military urbanism by interrogating it at its source." Trevor Paglen--Artist; Geographer; Author, Invisible: Covert Operations and Invisible Landscapes--Trevor Paglen "Trevor Paglen "

    Out of stock

    £19.97

  • Crown Hall Dean's Dialogues 2012-2017

    Actar Publishers Crown Hall Dean's Dialogues 2012-2017

    7 in stock

    Book Synopsis

    7 in stock

    £24.70

  • Blue: Architecture of UN Peacekeeping Missions

    Actar Publishers Blue: Architecture of UN Peacekeeping Missions

    1 in stock

    Book Synopsis

    1 in stock

    £36.00

  • The Bug Out Book: Bags, Tools, and Survival

    Out of stock

    £25.64

  • Exploring Resilience: A Scientific Journey from Practice to Theory

    Springer Nature Switzerland AG Exploring Resilience: A Scientific Journey from Practice to Theory

    1 in stock

    Book SynopsisResilience has become an important topic on the safety research agenda and in organizational practice. Most empirical work on resilience has been descriptive, identifying characteristics of work and organizing activity which allow organizations to cope with unexpected situations. Fewer studies have developed testable models and theories that can be used to support interventions aiming to increase resilience and improve safety. In addition, the absent integration of different system levels from individuals, teams, organizations, regulatory bodies, and policy level in theory and practice imply that mechanisms through which resilience is linked across complex systems are not yet well understood. Scientific efforts have been made to develop constructs and models that present relationships; however, these cannot be characterized as sufficient for theory building. There is a need for taking a broader look at resilience practices as a foundation for developing a theoretical framework that can help improve safety in complex systems. This book does not advocate for one definition or one field of research when talking about resilience; it does not assume that the use of resilience concepts is necessarily positive for safety. We encourage a broad approach, seeking inspiration across different scientific and practical domains for the purpose of further developing resilience at a theoretical and an operational level of relevance for different high-risk industries. The aim of the book is twofold: 1. To explore different approaches for operationalization of resilience across scientific disciplines and system levels. 2. To create a theoretical foundation for a resilience framework across scientific disciplines and system levels. By presenting chapters from leading international authors representing different research disciplines and practical fields we develop suggestions and inspiration for the research community and practitioners in high-risk industries.This book is Open Access under a CC-BY licence. Table of ContentsExploring resilience – an introduction, by Siri Wiig and Babette Fahlbruch.- Resilience, reliability, safety: multilevel research challenges, by Jean-Christophe Le Coze.- Moments of resilience: time, space and the organisation of safety in complex sociotechnical systems, by Carl Macrae.- Resilience engineering as a quality improvement method in Healthcare, by Janet E. Anderson, A. J. Ross, J. Back, M. Duncan and P. Jaye.- Resilience and Essential Public Infrastructure, by Michael Baram.- Human performance, levels of service and system resilience, by Miltos Kyriakidis and Vinh N. Dang.- Precursor resilience in practice – an organizational response to weak signals, by Kenneth Pettersen Gould.- Leadership in resilient organizations, by Gudela Grote.- Modelling the influence of safety management tools on resilience, by Teemu Reiman and Kaupo Viitanen.- Resilient characteristics as described in empirical studies on health Care, by Siv Hilde Berg and Karina Aase.- Resilience from the United Nations Standpoint: The Challenges of “Vagueness”, by Leah R. Kimber.- Building resilience in humanitarian hospital programs during protracted conflicts: opportunities and limitations, by Ingrid Tjoflåt and Britt Sætre Hansen.- Exploring Resilience at Interconnected System Levels in Air Traffic Management, by Rogier Woltjer.- Resilience in healthcare: a modified stakeholder analysis, by Mary Chambers and Marianne Storm.- Resilience: From Practice to Theory and Back Again, by Carl Macrae and Siri Wiig.

    1 in stock

    £40.49

  • Counter-Terrorism Technologies: A Critical

    Springer Nature Switzerland AG Counter-Terrorism Technologies: A Critical

    1 in stock

    Book SynopsisThis book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future. The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies – weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that promise an increase in safety and security when it comes to the dangers posed by these terrorists. This part also includes a critical discussion of advantages and disadvantages of such technologies that are, quite often, sold as a ‘silver bullet’ approach in the fight against terrorism. Controversies such as those triggered by the abuse of millimeter wave scanners deployed at several Western European airports will demonstrate that there are costs involved with regard to human rights. The third, analytical part takes the critical discussion further by arguing that the uncritical fielding of new surveillance and control technologies in parallel with the on-going outsourcing and privatization of key services of the state could well lead to dystopias as envisaged in a rather prescient way by the so-called cyperpunk novels of the 1980s. The book concludes with the question that any liberal democracy should ask itself: how far can we go with regard to hardening our societies against terrorist threats?Trade Review“Lehr’s book is a very useful tool for both academics and practitioners to get an overview of how our social world has been changing by the complex coexistence of (still) open societies, the threat of terror, surveillance/security mechanisms, and the many aspects of digitalisation. Counter-Terrorism Technologies captures an intriguing age of transition that one day might make more sense for posterity than it does now for us. … thanks to the critical-analytical approach.” (Zsófia Hacsek, Behavioral Sciences of Terrorism and Political Aggression, December 22, 2020)Table of ContentsIntroduction: Terrorism as a Threat to Open Societies.- Part 1: Barbarians at the Gates: ‘Sinful’ Cities.- Actions: The Return of Urban Guerillas.- Reactions: The New (Para-) Military Urbanism.- Consequences: The Urban Space as a (Limited) Battlespace. Part 2: ‘Our Silicon Will Win’: The Role of Technology in Urban Counter-Terrorism.- Identification: Biometrics, or a Real-Time 'Who is Who'.- Prediction and Postdiction: Real-Time Data Mining and Data Analytics.- Detection: Scanning and 'Sniffing' Technologies.- Surveillance and Observation: The All-Seeing Eye of Big Brother.- Protection: Defensible Spaces.- Threat Displacement Instead of Threat Eradication: Come Concluding Caveats.- Part 3: Brave New Cities: The Law of Unintended Consequences.- The Quest for Silver Bullets: Implications for our Construction of Citizenship.- Archipelagos of Fear: CT Technology and the Securitization of Everyday Life.- Undemocratic Means: The Rise of the Surveillance State.- Democracy Transfigured: The Dawn of the 'Umpire State'.- Outlook: The Need for 'Critical' Critical Infrastructure Studies.

    1 in stock

    £98.99

  • Data Analytics for Engineering and Construction

    Springer Nature Switzerland AG Data Analytics for Engineering and Construction

    15 in stock

    Book SynopsisThis book provides a step-by-step guidance on how to implement analytical methods in project risk management. The text focuses on engineering design and construction projects and as such is suitable for graduate students in engineering, construction, or project management, as well as practitioners aiming to develop, improve, and/or simplify corporate project management processes.The book places emphasis on building data-driven models for additive-incremental risks, where data can be collected on project sites, assembled from queries of corporate databases, and/or generated using procedures for eliciting experts’ judgments. While the presented models are mathematically inspired, they are nothing beyond what an engineering graduate is expected to know: some algebra, a little calculus, a little statistics, and, especially, undergraduate-level understanding of the probability theory.The book is organized in three parts and fourteen chapters. In Part I the authors provide the general introduction to risk and uncertainty analysis applied to engineering construction projects. The basic formulations and the methods for risk assessment used during project planning phase are discussed in Part II, while in Part III the authors present the methods for monitoring and (re)assessment of risks during project execution.Table of ContentsChapter 1: Introduction to Risk and Uncertainty. This chapter provides: a) general discussion on the types of uncertainties in projects including the examples; we cover theoretical, frequentist, belief-based epistemic, as well as agnostic viewpoints on the uncertainty; we show these viewpoints in context of typical project uncertainties and contrast them against representations of uncertainty in other engineering disciplines; b) summary on the role of knowledge and assumptions in characterizing the uncertainty; we link the discussion on uncertainty to knowledge about the underlying phenomena, the embedded assumptions, and their validity over the course of the project; c) overview on the approaches that relate the risk to the underlying uncertainty; we discuss approaches to the risk-uncertainty relationship in different disciplines, and finally d) discussion on the organizational attitude and viewpoints toward the risk and uncertainty; we cover topics such as value of uncertainty (is it always bad?), organizational responsibility towards risk (who should be taking risk, when, and how much?), and the contrast between the decision-theoretic vs. managerial viewpoint on the uncertainty showing the differences that govern the choice of analysis and the methods. Chapter 2. Project Risk Management Framework. This chapter provides: a) overview of the project systems, their complexity, life-cycle and risk-based decision-making; we define project as a complex system, and its life-cycle in the context of phase-gate process where decisions are evaluated under different objectives and criteria; we emphasize the points where the uncertainty is introduced and when it is reflected in project outcomes; we particularly stress the design and construction/installation i.e. execution phases of a project as this is the key focus of this text; b) outline of the high-level guidelines in conducting risk assessment and management (such as ISO and PMI approach), the use of “risk language” and common terms in communicating risk (such as SRA glossary of terms), and more detailed description of each step; we particularly emphasize risk identification and assessment as they are the key focus of this text; c) formal definition of risk in projects distinguishing between variability of operations, event driven risk factors, and the combination of the two; also, we discuss risks in context of low probability – high impact and low impact – high probability; we emphasize the role of assumptions and knowledge in formally developing risk statement; and finally d) classifications methods for project risks as they relate to project objectives, their inception and resolution period, relationship to project structure i.e. internal-external, technical-no technical, and other key project parameters. The chapter includes homework examples. Chapter 3: Project Data. This chapter provides a comprehensive summary on the type and sources of project data, and the methods for data acquisition. The key underpinning of this text is that risk analysis should be driven by data in a mathematically rigorous way; so where can one find such data? This chapter covers project data as they relate to planning and execution phase of the project; more specifically, we discuss data in terms of: a) project phase and system of interest; we contrast available data during planning and estimation vs. data during monitoring and control phase of the project, as well as whether data relates to internal project system (logistics, operations, etc.) or environmental systems (weather, market trends, etc), we define data collection objectives for each of the phase and the system type; b) observed vs. judgement/simulated data, or in other words, whether data is generated by the system and recorded by the participants, or assessed by individuals using their experience, judgements, models, or just gut feeling; we provide a summary of typical sources of observed data such as accounting systems, and other corporate databases on project productivity, cost, schedule, etc., as well as less structured data in terms of archived project documents such as weekly progress reports, audio-visual recordings, project team members communication records, and other types of traceable observations; we also provide an overview of the methods used for eliciting experts’ opinion and judgement data: we cover both explicit methods such as workshops, surveys, and Delphi process, including how to aggregate group opinion, and implicit methods such as prediction markets and other simulation games. The chapter includes workout examples and homework problems. Chapter 4: Probability Theory Background. This chapter is designed to provide enough background so that more advanced theoretical concepts could be introduced. The reader is assumed to have a basic understanding of calculus. However, note that the objective here is not to provide a formal and mathematically rigor description of the concepts as expected for the students in mathematics and statistics departments, rather it is to provide the introduction using enough rigor that would not alienate the target readers and remain focus on the application. We provide basic introduction to: a) probability types, covering classic, frequentist, belief-based approaches, b) formal definition of independence, conditional probability and Bayes theorem including causal belief networks, c) types and distributions of random variables, d) central moments and its meaning given different types of data – ratio, interval, ranked, categorical; e) central moments of functions of random variables, f) covariance and correlations, g) autocorrelation and time-series, and h) random samples and Monte Carlo methods. The chapter includes workout examples and homework problems. Chapter 5: Project Planning and Estimating. This chapter is structured in three parts. In the first part we cover the key objectives of risk analysis in context of project planning and estimating (e.g. contingency planning, mitigation plans, and monitoring and control strategies) independent of the stakeholders’ perspective and the type of contracting and delivery methods. We identify typically available documents and data as the point of departure, as well as the required outputs for further analysis. In the second part we focus on risk identification and assessment methods distinguishing between three general representations: a) hazard, vulnerability, and consequence; b) probability and consequence, and c) aggregate variability. We further classify those into low-probability high-impact event-driven and high-probability low-impact variability representations. We cover a wide spectrum of identification and assessment models including chain-of-events models such as FMEA, FTA, ET, HAZID, and CCF, and more system-focus models such as AFD/TRIZ, STPA. Further, we discuss the differences between the model outputs and the output requirements for further analysis highlighting the deficiency of some of the most commonly used outputs such as risk matrix and risk registrar. In the third section we focus on the analysis. We provide detailed description of: a) cost analysis which includes linear cost models based on the method of moments, the effect of correlations, mixed variability and event-driven models, network representation, and Monte Carlo implementations; b) schedule analysis which includes Pert approximation, extensions of Pert model to include the effect of correlation, mixed variability and event-driven risks, multiple critical paths, common resources, as well as Monte Carlo implementation, and finally c) joint cost-schedule analysis which includes correlation methods and resource-loaded schedule-cost networks, The chapter includes workout examples and homework problems. Chapter 6: Project Monitoring and Control. This chapter is structured in two parts. In the first part we discuss the objectives of the risk analysis as it relates to project execution and the process of monitoring and controlling projects (assess the status, detect deviations, and respond). We provide detailed discussion on the available documents and data, including typical indicators as well as their leading vs. lagging nature and the capacity to provide early warning signs. We extensively focus on Earned Value methods and their interpretations in context of cost and time to complete. In the second part we present: a) variability focused methods such as SPC, b) Bayesian learning and update methods, and c) expert judgment methods including prediction markets. Finally, we discuss early warning signs in context on non-probabilistic methods such as knowledge dynamics (assumption validation) and critical slowing down of dynamic systems. The chapter includes workout examples and homework problems. Chapter 7: Case Studies and Implementation Framework. In this chapter we provide a series of case studies that cover typical situations in which project engineers and managers are faced when dealing with project risk identification and assessment. We distinguish between and cover two types of case studies: the case studies designed to be given as assignments to the students, and the case studies in addition cover implementation framework that is making references to the materials covered in the previous chapters. Listed next are few example situations upon which case studies are developed: a) project manager was given a task to evaluate the requirement for cost/time contingency for a common project for which corporate productivity data is available. How does he/she go about this task? b) project manager needs to work on identifying and assessing technical risks for a complex engineering project, how does he/she go about this given that data is not available for the considered technology? and c) project engineer is asked to provide update to VP on the status of risk for a major project, how does he/she go about this?

    15 in stock

    £85.49

  • Mathematical Foundations of System Safety Engineering: A Road Map for the Future

    Springer Nature Switzerland AG Mathematical Foundations of System Safety Engineering: A Road Map for the Future

    1 in stock

    Book SynopsisThis graduate-level textbook elucidates low-risk and fail-safe systems in mathematical detail. It addresses, in particular, problems where mission-critical performance is paramount, such as in aircraft, missiles, nuclear reactors and weapons, submarines, and many other types of systems where “failure” can result in overwhelming loss of life and property. The book is divided into four parts: Fundamentals, Electronics, Software, and Dangerous Goods. The first part on Fundamentals addresses general concepts of system safety engineering that are applicable to any type of system. The second part, Electronics, addresses the detection and correction of electronic hazards. In particular, the Bent Pin Problem, Sneak Circuit Problem, and related electrical problems are discussed with mathematical precision. The third part on Software addresses predicting software failure rates as well as detecting and correcting deep software logical flaws (called defects). The fourth part on Dangerous Goods presents solutions to three typical industrial chemical problems faced by the system safety engineer during the design, storage, and disposal phases of a dangerous goods’ life cycle. Table of ContentsIntroduction.- Decomposition of the Failure Histogram.- Bounding the “Black Swan” Probability.- The Risk Surface.- The Bent Pin Problem-I: Computer Search Methods.- The Bent Pin Problem-II: Matrix Methods.- The Bent Pin Problem-III: Number Theory Methods.- The Bent Pin Problem-IV: Limit Methods.- The Bent Pin Problem-V: Experimental Methods .- “Sneak Circuits” and Related System Safety Electrical Problems-I: Matrix Methods .- “Sneak Circuits” and Related System Safety Electrical Problems-II: Computer Search.- Methods.- Predicting Software Performance.- Alternative Flowcharts for a Mathematical Analysis of Logic.- Fail-Safe Control Software.- Design Phase Elimination of Beryllium.- Accelerated Age Testing of Explosives and Propellants.- The Movement of Inorganic Cadmium Through the Environment.- Epilogue .- GLOSSARY.- APPENDIX A “Long Tailed” Distribution.- APPENDIX B.- APPENDIX C.- APPENDIX D.- APPENDIX E.- APPENDIX F.- APPENDIX G.- APPENDIX H.- INDEX.

    1 in stock

    £42.74

  • Concise Guide to Software Testing

    Springer Nature Switzerland AG Concise Guide to Software Testing

    1 in stock

    Book SynopsisThis practically-focused textbook provides a concise and accessible introduction to the field of software testing, explaining the fundamental principles and offering guidance on applying the theory in an industrial environment.Topics and features: presents a brief history of software quality and its influential pioneers, as well as a discussion of the various software lifecycles used in software development; describes the fundamentals of testing in traditional software engineering, and the role that static testing plays in building quality into a product; explains the process of software test planning, test analysis and design, and test management; discusses test outsourcing, and test metrics and problem solving; reviews the tools available to support software testing activities, and the benefits of a software process improvement initiative; examines testing in the Agile world, and the verification of safety critical systems; considers the legal and ethical aspects of software testing, and the importance of software configuration management; provides key learning topics and review questions in every chapter, and supplies a helpful glossary at the end of the book.This easy-to-follow guide is an essential resource for undergraduate students of computer science seeking to learn about software testing, and how to build high quality and reliable software on time and on budget. The work will also be of interest to industrialists including software engineers, software testers, quality professionals and software managers, as well as the motivated general reader.Table of ContentsFundamentals of Software Quality Fundamentals of Software Engineering Fundamentals of Software Testing Static Testing Software Test Planning Test Case Analysis and Design Test Execution and Management Test Outsourcing Test Metrics and Problem Solving Software Testing Tools Test Process Improvement Testing in the Agile World Verification of Safety Critical Systems Legal, Ethical and Professional Aspects of Testing Configuration Management Epilogue

    1 in stock

    £37.99

  • The NICE Cyber Security Framework: Cyber Security

    Springer Nature Switzerland AG The NICE Cyber Security Framework: Cyber Security

    1 in stock

    Book SynopsisThis textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and sbilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management.Table of ContentsIntroduction.- Information Assurance / Encryption.- Information Systems Security Management.- IT Risk and Security Management.- Criminal Law.- Network Management.- Risk Management.- Software Management.- System Administration.- System Architecture.- Threat Analysis.- Training, Education, and Awareness.- Conclusion.

    1 in stock

    £47.49

  • Techlash: The Future of the Socially Responsible

    Springer Nature Switzerland AG Techlash: The Future of the Socially Responsible

    1 in stock

    Book SynopsisTechnology has made human lives incomparably better. Civilization as we know it would utterly collapse without it. However, if not properly managed, technology can and will be systematically abused and misuse and thereby become one of the biggest threats to humankind. This open access book applies proactive crisis management to the management of technology organizations to make them more sustainable and socially responsible for the betterment of humankind. It forecasts the unintended consequences of technology and offers methods to counteract it.Table of ContentsCh 1: Threats of Imaginable and Unimaginable Proportions.- Ch 2: Beyond the Hype.- Ch 3: Pluses and Minuses.- Ch 4: Technological Messes.- Ch 5: Managing Tech.- Ch 6: The Socially Responsible Tech Company.- Ch 7: The Moral Underpinnings of Technology.- Epilogue: The Future of Technology.

    1 in stock

    £33.74

  • Probabilistic Reliability Analysis of Power Systems: A Student’s Introduction

    Springer Nature Switzerland AG Probabilistic Reliability Analysis of Power Systems: A Student’s Introduction

    1 in stock

    Book SynopsisThis textbook provides an introduction to probabilistic reliability analysis of power systems. It discusses a range of probabilistic methods used in reliability modelling of power system components, small systems and large systems. It also presents the benefits of probabilistic methods for modelling renewable energy sources. The textbook describes real-life studies, discussing practical examples and providing interesting problems, teaching students the methods in a thorough and hands-on way.The textbook has chapters dedicated to reliability models for components (reliability functions, component life cycle, two-state Markov model, stress-strength model), small systems (reliability networks, Markov models, fault/event tree analysis) and large systems (generation adequacy, state enumeration, Monte-Carlo simulation). Moreover, it contains chapters about probabilistic optimal power flow, the reliability of underground cables and cyber-physical power systems.After reading this book, engineering students will be able to apply various methods to model the reliability of power system components, smaller and larger systems. The textbook will be accessible to power engineering students, as well as students from mathematics, computer science, physics, mechanical engineering, policy & management, and will allow them to apply reliability analysis methods to their own areas of expertise.Table of ContentsIntroduction.- Power System Failures.- Reliability Models of Components.- Reliability Models of Small Systems.- Reliability Models of Large Systems.- Probabilistic Optimal Power Flow.- Conclusion.

    1 in stock

    £49.49

  • Cannabis Laboratory Fundamentals

    Springer Nature Switzerland AG Cannabis Laboratory Fundamentals

    15 in stock

    Book SynopsisThe legislative requirement for cannabis to undergo laboratory testing has followed legalization of medical and recreational use in every U.S. state to date. Cannabis safety testing is a new investment opportunity within the emerging cannabis market that is separate from cultivation, processing, and distribution, allowing individuals and organizations who may have been reluctant to enter previously a new entry route to the cannabis space. However, many of the costs, timelines, operational requirements, and compliance issues are overlooked by people who have not been exposed to regulated laboratory testing. Cannabis Laboratory Fundamentals provides an in-depth review of the key issues that impact cannabis testing laboratories and provides recommendations and solutions to avoid common – but expensive – mistakes. The text goes beyond methodology to include sections on economics, regulation, and operational challenges, making it useful for both new and experienced cannabis laboratory operators, as well as all those who want to understand the opportunities and risks of this industry.Table of Contents1. An Introduction to Cannabis Laboratory Safety and Compliance Testing 2. Cannabis Safety Testing Laboratory Floor Planning & Design 3. Laboratory Safety from Site Selection to Daily Operation 4. Preparing Cannabis Laboratory Business License Applications 5. Quality Assurance and the Cannabis Analytical Laboratory 6. Cannabis Laboratory Management: Staffing, Training and Quality 7. Laboratory Information Management Systems (LIMS) 8. Pesticide and Mycotoxin Detection and Quantitation 9. Cannabinoid Detection and Quantitation 10. Utilizing GC-MS and GC Instrumentation for Residual Solvents in Cannabis and Hemp 11. Elemental Analysis of Cannabis and Hemp – Regulations, Instrumentation, and Best Practices 12. Quantitative Terpene Profiling from Cannabis Samples 13. Laboratory Safety and Compliance Testing for Microorganism Contamination in Marijuana

    15 in stock

    £71.24

  • Nuclear Security: The Nexus Among Science,

    Springer Nature Switzerland AG Nuclear Security: The Nexus Among Science,

    3 in stock

    Book SynopsisThis textbook is the first comprehensive and systematic account of the science, technology and policy issues associated with nuclear energy and nuclear weapons. Throughout their account of the evolution of nuclear policy, from its origin to the early Trump presidency, the authors interweave clear technical expositions of the science and technology that underpin and constrain it. The book begins by tracing the early work in atomic physics, the discovery of fission, and the developments that led to the Manhattan Project and the delivery of atomic bombs against Japan that ended World War II. It follows the initial failed attempts at nuclear disarmament, the onset of the Cold War nuclear arms competition, and the development of light water reactors to harness nuclear energy for electric power generation. The authors thoroughly unpack the problem of nuclear proliferation, examining the strategy and incentives for states that have and have not pursued nuclear weapons, and providing an overview of the nuclear arsenals of the current nuclear weapon states. They trace the technical, political and strategic evolution of deterrence, arms control and disarmament policies from the first attempts for an Outer Space Treaty in 1957 through the new START treaty of 2009. At critical junctures in the narrative, the authors explain the relevant nuclear science and technology including nuclear fission and criticality; nuclear materials and enrichment; nuclear detonation and nuclear weapons effects; nuclear weapons stockpile constraints, stewardship and surveillance; nuclear fusion and thermonuclear weapons; technologies for monitoring, verification and proliferation; and nuclear forensics. They conclude with an assessment of contemporary issues ranging from the Joint Comprehensive Plan of Action reached to halt Iran’s nuclear weapons development program, to the threat of nuclear terrorism, the perceived nuclear weapons policies of Russia and China, and the US efforts to provide disincentives for its allies to acquire their own nuclear weapons by maintaining credible security guarantees.Table of Contents1. Early days1.1. Development of atomic physics1.2. Origins of nuclear fission – Great Britain and continental Europe1.3. Nuclear science I – fission and criticality1.3.1. Fission, criticality and the fission chain1.3.1.1. Decay and half-life1.3.2. Energy scale of nuclear reactions relative to chemical reactions1.3.3. Nuclear reactions and cross sections1.3.4. Neutrons basics1.3.4.1. Neutrons from fission (nu-bar)1.3.4.2. Neutron energy and moderation concepts1.3.5. Critical mass, chain reactions, energy and fission products1.3.6. Enrichment and production1.3.7. Worked example – Chicago Pile1.4. The Manhattan Project1.4.1. Organization1.4.2. Key personnel1.4.3. Technical obstacles1.4.4. The path to success1.5. Nuclear science II- materials and enrichment1.5.1. Uranium enrichment1.5.2. Reactor basics and plutonium production1.5.3. Overview of proliferation-resistant fuel cycles and reactors1.5.4. Worked example – centrifuge versus gaseous diffusion1.6. Truman’s decision to drop two atomic bombs1.6.1. Policy options, alternative targets1.6.2. Threat assessment1.6.3. Strategic and tactical considerations1.6.4. Key players and the decision1.6.5. Alternative explanations1.7. Effects of the detonations1.7.1. Blast 1.7.2. Radiation 1.7.3. Shock waves1.7.4. Electromagnetic pulse1.7.5. Estimates of prompt and delayed fatalities1.8. Nuclear science III – nuclear weapons and their effects1.8.1. Basic design concepts1.8.2. Weapon effects1.8.3. Blast and pressure1.8.4. Thermal Effects1.8.5.   Radiation effects1.8.6. Other (EMP, delayed fatalities, impact on climate change)1.8.7. Radiation effects on biological systems1.8.8. Weapons effects in military planning1.8.9. Comparison to conventional weapons and their uses1.8.10. Accuracy and effectiveness1.8.11. Hardening and survivability1.8.12. Worked example – Hiroshima blast and radiation effects 2. Postwar expansion (1946-1968)2.1. National security act, 19472.1.1. National security council2.1.2. US Air Force2.1.3. Central Intelligence Agency2.1.4. Other consequences2.2. Atomic Energy Commission2.2.1. Thermonuclear weapons debate2.2.2. Concern of Soviet weapons capability2.3. Nuclear science IV– fusion and thermonuclear weapons2.3.1. Basics of nuclear fusion2.3.2. Thermonuclear concepts2.3.3. Worked example – to be determined2.4. Failed arms control and onset of the Cold War2.4.1. Acheson-Lillienthal report2.4.2. Failure of the Baruch plan2.4.3. Soviet resistance2.4.4. Korean War (1950-53)2.4.4.1. Role of nuclear weapons2.4.4.2. Beginnings of extended deterrence2.5. Nuclear proliferation begins2.5.1. Mirror Imaging: USSR program, Kurchatov, espionage from Manhattan project2.5.2. USSR weapons test (1949)2.5.3. The UK program and test (1952)2.6. Nuclear arms competition between the US and the USSR2.6.1. The Hydrogen Bomb 2.6.1.1. Oppenheimer vs. Teller2.6.1.2. Lawrence Livermore National Laboratory2.6.2. Early nuclear weapon strategy development2.6.2.1. Massive retaliation and its critics2.6.2.2. Deterrence and Secure 2nd Strike2.6.2.3. Strategic bombers, missiles, the Navy (SSBNS, SLBNS)2.6.2.4. Intercontinental delivery2.6.3. Soviet responses 2.7. Nuclear Science V– modern weapons and the stockpile2.7.1. Constraints and weapon size and mass 2.7.2. Constraints on weapon efficiency and yield2.7.3. Materials properties and equations of state2.7.4. Stockpile surveillance - assessing reliability2.7.5. Worked example – yield and efficiency3. The problem of nuclear proliferation3.1. The International Atomic Energy Agency3.1.1.   Application of nuclear energy for electric power generation3.1.2. Efforts to forestall proliferation3.1.2.1. Nuclear suppliers group3.1.2.2. Zangger committee3.2. Nuclear proliferation builds3.2.1. France – 19603.2.2. China – 19643.2.3. Israel – 19653.2.4. Sweden – ended in 19683.3. First arms control measures3.3.1. Distinction between disarmament and arms control3.3.2. Outer Space Treaty – 19573.3.3. Impact of Cuban Missile Crisis - 19623.3.4. Limited Test Ban Treaty - 1963 3.4. Nuclear science VI– stockpile safety and security3.4.1. Use control concepts3.4.2. Stockpile aging and reliability3.4.3. One-point safety3.4.4. Worked example - decay and aging of weapons material 4. Technical, political and strategic evolution of deterrence and arms control4.1. Declaratory policies4.2. Deterrence policy4.2.1. Red and blue4.2.2. “No First Use” versus “Use to De-escalate”4.3. Extended deterrence and US nuclear deployments4.4. Flexible response4.5. Soviet and US buildup4.6. The importance of missile defense4.7. Nuclear arms control and restraint4.7.1. Nuclear non-proliferation treaty – 19684.7.2. SALT I– 19724.7.2.1. Importance of MIRVS4.7.3. ABM treaty -19724.7.4. SALT II – 19794.7.5. Carter policy of deterring reprocessing of spent fuel - 19774.7.6. Additional proliferation activities4.7.6.1. Indian test – 19744.7.6.2. Pakistani commitment4.7.6.3. German-Brazilian deal4.7.6.4. Taiwan, South Korea initiatives4.7.7.   INF treaty – 19874.7.8. START – 19914.8. Nuclear science VII– monitoring, verification and proliferation4.8.1. Detonation monitoring and detection4.8.2. Safeguards technologies4.8.3. Other measurement concepts and activities4.8.4. Technologies for treaty verification and monitoring4.8.5. Proliferation resistant reactors and fuel cycle4.8.6. Worked example – signature detection 5. The second nuclear age (1992- present)5.1. End of the Cold War5.1.1. START II (1993)5.1.2. Nunn-Lugar and cooperative threat reduction5.2. Ukraine and Kazhakstan nuclear disarmament5.3. Regional proliferation5.3.1. Iraq5.3.2. North Korea5.3.3. Libya5.3.4. India versus Pakistan5.3.5. Iran5.4. Counter-proliferation 5.4.1. Proliferation security initiative5.4.2. Stuxnet5.5. Nuclear disarmament5.5.1. Disarmament and the legitimacy of the non-proliferation regime5.5.2. Historical examples of nuclear disarmament5.5.2.1. South Africa5.5.2.2. Brazil and Argentina5.5.2.3. Former Soviet Union5.6. Comprehensive Test Ban Treaty5.6.1. Failed US. ratification5.6.2. Efforts at START III and completion of Strategic Offensive Arms Reduction Treaty (2002) 5.6.3. US withdrawal from the ABM treaty and its significance5.6.4. New START (2009)5.7. Nuclear science VIII– stockpile stewardship without nuclear testing5.7.1. Contrast with stockpile surveillance5.7.2. High energy density physics experiments5.7.3. Codes and supercomputers5.7.4. Worked example – stockpile surveillance5.7.5. Worked example – computational demands of physics codes 6. Contemporary issues6.1. The Obama nuclear initiatives and their legacy6.1.1. Failed attempts to develop new nuclear weapons (RNEP and RRW)6.1.2. Beyond life extension programs6.1.3. The nuclear security initiatives6.1.4. Strengthening the NPT6.2. Russian adoption of “escalate to deescalate” doctrine6.3. Nuclear weapons and China’s “anti-access/area denial” strategy6.4. Cyber threats to nuclear command and control systems6.5. Nuclear weapons and cross domain deterrence6.5.1. Issues of proportionality and escalation control6.6. Impact of economic sanctions as a counter-proliferation tool6.7. The Iran Joint Comprehensive Plan of Action (JCPOA)6.7.1. Elements of the agreement6.7.2. Strengths and weaknesses6.7.3. Effects on others6.7.4. Consequences6.8. Threat of nuclear terrorism6.8.1. Loss of control of a nuclear weapon6.8.2. Loss of control of nuclear material6.8.3. Loss of control of radioactive material and risks of radioactive dispersal devices6.9. Challenges of attribution, prosecution and retaliation6.9.1. Pre- and post-detonation attribution and forensics6.9.2. Decision-making complexities of cross discipline assessments6.9.3. Policy alternatives in response to nuclear weapon use6.9.4. Accuracy and timeliness requirements6.10. Nuclear science IX – Illicit material detection and forensic attribution6.10.1. Radiation detection and analysis6.10.1.1. Passive detection and spectroscopy6.10.1.2. Activation6.10.1.3. Radiography6.10.2. Nuclear forensics and attribution6.10.2.1. Decay products and chronometry6.10.3. Worked example – standoff detection of special nuclear material 7. Conclusion – Will the “tradition of non-use” of nuclear weapons be sustained? If not, what are the potential consequences?

    3 in stock

    £71.24

  • Computer Security and the Internet: Tools and

    Springer Nature Switzerland AG Computer Security and the Internet: Tools and

    Out of stock

    Book SynopsisThis book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a solid footing in security – including software developers and computing professionals, technical managers and government staff. An overriding focus is on brevity, without sacrificing breadth of core topics or technical detail within them. The aim is to enable a broad understanding in roughly 350 pages. Further prioritization is supported by designating as optional selected content within this. Fundamental academic concepts are reinforced by specifics and examples, and related to applied problems and real-world incidents. The first chapter provides a gentle overview and 20 design principles for security. The ten chapters that follow provide a framework for understanding computer and Internet security. They regularly refer back to the principles, with supporting examples. These principles are the conceptual counterparts of security-related error patterns that have been recurring in software and system designs for over 50 years. The book is “elementary” in that it assumes no background in security, but unlike “soft” high-level texts it does not avoid low-level details, instead it selectively dives into fine points for exemplary topics to concretely illustrate concepts and principles. The book is rigorous in the sense of being technically sound, but avoids both mathematical proofs and lengthy source-code examples that typically make books inaccessible to general audiences. Knowledge of elementary operating system and networking concepts is helpful, but review sections summarize the essential background. For graduate students, inline exercises and supplemental references provided in per-chapter endnotes provide a bridge to further topics and a springboard to the research literature; for those in industry and government, pointers are provided to helpful surveys and relevant standards, e.g., documents from the Internet Engineering Task Force (IETF), and the U.S. National Institute of Standards and Technology.Trade Review“I can vouch to the accuracy and clarity found in Van Oorschot's latest book, and can recommend it to those serious about getting introduced to security. The topic is very broad, as evidenced by the number of important security conferences and the hundreds of papers published every year, not to mention the billions made selling security products and services.” (Rik Farrow, usenix.org, April 8, 2022)“The book is a technical tour de force and is a helpful reference. … the book has its primary audience in students in a one-term or two-term, third- or fourth-year undergraduate course in computer science, those in the corporate world looking for a highly technical reference will find the book to be quite valuable. … As a first-rate computer scientist and writer, van Oorschot has written a book that will make you a much smarter and better information security professional.” (Ben Rothke, rsaconference.com, April 7, 2022)Table of Contents1. Security Concepts and Principles.- 2. Cryptographic Building Blocks.- 3. User Authentication—Passwords, Biometrics and Alternatives.- 4. Authentication Protocols and Key Establishment.-5. Operating System Security and Access Control.- 6. Software Security—Exploits and Privilege Escalation.- 7. Malicious Software.- 8. Public-Key Certificate Management and Use Cases.- 9. Web and Browser Security.- 10. Firewalls and Tunnels.- 11. Intrusion Detection and Network-Based Attacks.- 12. Wireless LAN Security: 802.11 and Wi-Fi.- 13. Bitcoin, Blockchains and Ethereum.- Epilogue.- Index.

    Out of stock

    £49.49

  • The Great Power Competition Volume 2: Contagion

    Springer Nature Switzerland AG The Great Power Competition Volume 2: Contagion

    5 in stock

    Book SynopsisEven before the outbreak of the COVID-19 pandemic, the Central Region faced numerous obstacles to building a stable and prosperous future. The region, which encompasses the Middle East, the Horn of Africa, Central Asia, and South Asia, has been plagued by economic and political uncertainty amidst dramatic shifts in the global power structure. With the pandemic now exacerbating the volatility in this already fragile region, the U.S.'s strategic objectives are rife for re-examination.A complicated stew of factors such as weakening of established governance systems, the emboldening of extremist individuals and groups through advances in digital technology, the humanitarian crises in Afghanistan and Syria, and the intensification of the great power competition with China and Russia are creating a fertile environment for the growth of violent extremist organizations (VEOs). Such organizations take advantage of vulnerable, aggrieved, and traumatized populations to fuel radicalization, recruitment, and unrest, which further undermine stability and the potential for peace and prosperity.While it is still early to fully understand how the ongoing response to the COVID-19 pandemic will impact U.S. policy, this book provides a timely analysis of relevant dynamics such as popular radicalization, digital information ecosystems, networks of influence, and new capabilities to recognize and prepare for other such black swan events in the region.Table of Contents1. Russia’s Energy Ambitions in the Middle East through the Prism of Great Power Competition.- 2. Iran’s Defense Policy.- 3. Prelude to Showdown: China-Russia Alliance and Great Leap Backward for Future Power Competition in the Middle East.- 4. Competition for Influence in the Middle East.- 5. Brothers in Jihad: Pakistan’s Strategic Depth, the Taliban, Afghan Arabs and the Global Jihad.- 6. How America Advances in the Great Power Competition.- 7. The Rise of Malign Actors in the Globalized, Digital Age.- 8. Entrepreneurship and Counter Extremism.- 9. Population Dynamics: Unrest and Violent Extremism.- 10. Conflict Interrupted: Understanding Population Dynamics and Interrupting the Process of Influencing, Mobilizing and Weaponizing People into Violent Extremism.- 11. Population Dynamics: Unrest and Violent Extremism.- 12. Russia views Central Asia/South Asia-the primary threat and longer-term opportunity.- 13. Competition for Influence: Information Environment.

    5 in stock

    £94.99

  • Applied Problems Solved by Information Technology

    Springer International Publishing AG Applied Problems Solved by Information Technology

    Out of stock

    Book SynopsisThis book explores a dynamic landscape where cutting-edge technologies are revolutionizing various domains. This captivating book delves into the advancements in security, communication, and environmental management, highlighting their profound impact on society. The developments bridge the gap between human needs and technological innovation. Readers will uncover the fascinating world of IoT-driven devices that seamlessly integrate into our lives, ensuring enhanced safety and communication efficiency. This book is a must-read for technology enthusiasts, researchers, and anyone curious about the transformative power of technology in shaping our present and future.Table of Contents1. Development of a Motion Activated Security Cam for Monitoring Applications.2. Development of a Sign Language Translator Based on Gestures-To-Words Using IoT. 3. Energy Management System for ICU Wards. 4. Two Factor Authentication: Voice Biometric and Token-Based Authentication. 5. Development of a Forest Fire Prevention System Using Fuzzy Logic Control. 6. Smart Glove: The Sign Language Translator for Mute-Deaf Citizens. 7. The Application of Technology Organization Environment Framework in the Approaches for Smart Warehouse Adoption. 8. Promoting and Preserving Malaysian Folktales Through Augmented Reality Technology. 9. The Development of a Self-Balancing Robot based on Complementary Filter and Arduino. 10. Development of Vertical Indoor Farming Using an Arduino and IoT. 11. Designing an Augmented Reality Application as a Tool for Entomophobia Treatment. 12. The Readiness of Logistics Service Providers (LSPs) to Meet the Rapidly Growing Digital Economy in Malaysia. 13. Review of the Use of Digital Media Products by Small and Medium Enterprises in Malaysia During the Covid-19 Pandemic Crisis. 14. The Influence of Information Communication Technology (ICT) towards the successful of Ro-Ro Ferry service at Penang Port. 15. Pass Matrix Based Graphical Password Authentication on the Android Platform. 16. Development of a Driver Detection System for Somnolence and Alertness Based on Image Processing Techniques

    Out of stock

    £37.99

  • Paradigms on Technology Development for Security

    Springer Paradigms on Technology Development for Security

    1 in stock

    Book SynopsisIntroduction.- Part 1: Cyber Crime, Cyber Terrorism and Cyber Security.- Cybercrime and terrorism.- Cyber Security.- AI and Cyber.- Part 2: Effective management and security of EU external borders.- Border Security Technologies.- Methodological approaches to border security.- Integrated platforms for border security management.- Part 3 Serious and Organized Crime (SOC).- Multimodal Data Fusion for combating SOC.- Big Data Processing and Analytics in context of SOC.- Data Visualisation and Decision Support.- Artificial Intelligence for combating SOC.- Part 4: Critical Infrastructures (CI) Resilience and Public Space Protection.- Cyber and System security for protection of CI.- Physical security of CI.- Case studies in protection of CI.- Protection of Public Spaces.- Part 5: Civil Protection and Disaster-Resilient Societies.- Crisis management.- Disaster management and Resilience strengthening technologies.- First responders technology.- Part 6: Strengthened Security Research and Innovation.- Part 7: Enhancing the defense capabilities of the EU.- Conclusion.

    1 in stock

    £40.49

  • Security Framework and Defense Mechanisms for IoT Reactive Jamming Attacks

    3 in stock

    £103.41

  • Cyber Resilience Applied Perspectives

    Springer Cyber Resilience Applied Perspectives

    15 in stock

    Book SynopsisFundamental Concepts of Cyber Resilience: Introduction and Overview.- Foundations of Cyber Resilience: The Confluence of Game, Control, and Learning Theories.- Analysis of Cyber Dependencies for Assessment of Cyber Resilience.- Quantifying and Reducing System Non-Resilience: Methodology, Metrics, and Case Study.- Navigating Socio-Technical Influences upon Cyber Resilience Adoption.- Resilient Decision Making in Cyber Incident Response.- Rule-Making for Insider Threat Mitigation.- Resilience in the Cloud-to-Things Continuum.- Experimental Measurements of Cyber Resilience.- Cyber-Physical Dimensions of Resilience Planning in National Security and Defense.- Regional Critical Infrastructure: a Cyber-Physical Resilience Assessment Methodology.- Supply Chains of Computer and Electronics Hardware Vulnerable to Climate Change, Counterfeiting, and Other Disruptions.- Active Defense Techniques for Enhancing Cyber Resilience.- Economic Resilience to Cyber Threats.

    15 in stock

    £151.99

  • Integrated Maintenance Planning in Manufacturing

    Springer International Publishing AG Integrated Maintenance Planning in Manufacturing

    1 in stock

    Book SynopsisThis book introduces the concept of integrated planning for maintenance and production taken into account quality and safety for high global socio-economic impact. It provides insight into the planning process at a global level starting from the business level and ending with the operational level where the plan is implemented and controlled.Table of ContentsIntroduction.- Maintenance in Manufacturing Environment: An Overview.- Integrated Maintenance Planning.- Health, Safety and Sustainability in Maintenance.- Ethics in Maintenance.- Recent and Future Trends in Maintenance.

    1 in stock

    £42.74

  • Practical Manual of Quality Function Deployment

    Springer International Publishing AG Practical Manual of Quality Function Deployment

    1 in stock

    Book SynopsisThis book introduces into the practical application of Quality Function Deployment (QFD) beyond the famous House of Quality Matrix by presenting a fully developed example of a clear and comprehensive QFD framework. The QFD workflow is described step by step, encompassing strategic planning, customer surveys, product and service characteristics, mechanisms, parts and cost deployment, technologies, process phases and faults analysis. The model, as presented with practical suggestions, can be used in firms with low resources and/or need for speed. In addition, a chapter is dedicated to the most common “fuzzy” algorithms, explained for professionals and the book closes by describing in detail some QFD case studies. This book will be of interest to all who wish to use QFD to respond to and satisfy customer requirements effectively.Trade Review"Maritan has written one of the best books to date on QFD. [...] With the exception of the 'bibles' by QFD founders Akao and Mizuno, you can now toss the rest of your QFD library." (Glenn Mazur, QFD Institute, Amazon, October 2014)Table of Contents1 Quality Function Deployment (QFD): Definitions, History and Models.- 2 Strategic Matrices and Customer Analysis.- 3 QFD from Product Characteristics to Pre-production.- 4 Fuzzy QFD.- 5 QFD Case Histories.

    1 in stock

    £49.49

  • Nuclear Proliferation and Terrorism in the

    Springer International Publishing AG Nuclear Proliferation and Terrorism in the

    1 in stock

    Book SynopsisThis book fills a clear gap in the literature for a technically-focused book covering nuclear proliferation and related issues post-9/11. Using a concept-led approach which serves a broad readership, it provides detailed overview of nuclear weapons, nuclear proliferation and international nuclear policy. The author addresses topics including offensive and defensive missile systems, command and control, verification, weapon effects, and nuclear testing. A chronology of nuclear arms is presented including detailed discussion of the Cold War, proliferation, and arms control treaties. The book is tailored to courses on nuclear proliferation, and the general reader will also find it a fascinating introduction to the science and strategy behind international nuclear policy in the modern era. Trade Review“Finally, a spritely, accessible overview of the nuclear world in historical context from someone who has both seen it from the U.S. State Department and Congressional policy trenches and taught it for 43 years. A gift to both concerned citizens and interested students.”Frank von Hippel, Prof. Public and International Affairs (emeritus), Princeton University“The threat of nuclear weapons has been with the world community for a long time. Global destruction was narrowly avoided three or four times or more during the Cold War with the use of such weapons remaining an immediate threat in some parts of the world, such as Northeast Asia and South Asia. Since the end of the Cold War the risk of terrorist acts committed with a nuclear weapon in addition has increased significantly. Lastly new militarily useable weapons such as cyber weapons have been added to the dangers that confront us. In order to develop workable policies to deal with this situation the threat must be understood from many perspectives: overall security policy, diplomatic, military, technical and so forth. David Hafmeister's outstanding new book provides the reader this essential review of the threat, taking into account its many manifestations in a careful and thorough way. It should not be missed.”Thomas Graham, Jr., former Special Representative of the President for Arms Controland Non-proliferation“Hafemeister's Nuclear Proliferation and Terrorism contains a wealth of information about nuclear and other weapons of mass destruction. The reader -- whether professionally involved with these weapons or a citizen seeking to become better informed -- will come away with a sober appreciation of the dangers, and with increased insight into how the world seeks to eliminate them.”Pierce Corden, former Admin. Exec. Officer, Comprehensive Nuclear–Test–Ban Treaty Commission“For more than 70 years since August 9, 1945, nuclear weapons have not been detonated in war, and terrorists have yet to acquire these weapons. Will humanity be so fortunate for the next 70 years? To learn what can and should be done to further reduce the risks of these and other dangers, read David Hafemeister’s excellent book.”Charles D. Ferguson, President, Federation of American ScientistsTable of Contents1. History of the Atomic Age. 1.1. Survey of Events. 1.2. Conflict Literature. 1.2. Nuclear Arms Chronology. 2. Nuclear Weapons. 2.1. The Nuclear Age. 2.2. Nuclear Proliferation. 2.3. Fission Energy. 2.4. Critical Mass. 2.5. Neutron Generations, Yield. 2.6. Plutonium Implosion Weapons. 2.7. Boosted Primaries, H–Bombs. 2.8. Neutron Bomb. 2.9. Exotic Weapons. 2.10. Nuclear Weapon Effects. 2.11. EMP Attack on Power Grid. 2.12. Stockpile Stewardship. 3. Nuclear Reactors and Radiation. 3.1. Nuclear Reactors. 3.2. Nuclear Safety. 3.3. New Reactor Designs. 3.4. Low–Dose Radiation. 3.5. Radiation Standards. 3.6. Weapon Accidents and Indoor Radon. 4. Missiles and War Games. 4.1. Rocket Motion. 4.2. ICBM Accuracy. 4.3. Kill Probability. 4.4. Launch on Warning? 4.5. Nuclear Conflict and MAD. 4.6. Conventional Conflict. 5. Ballistic Missile Defense. 5.1. ABM History. 5.2. Target Interactions. 5.3. Nuclear ABMs. 5.4. Particle Beam Weapons. 5.5. Laser Weapons. 5.6. Orbital Chemical Lasers. 5.7. Earth-Based Lasers. 5.8. Nuclear Explosion X-ray Laser. 5.9. Kinetic Kill Vehicles. 5.10. Airborne Laser. 5.11. Anti-Satellite Weapons. 6. Verification and Arms Control Treaties. 6.1. Verification Context. 6.2. Arms Control Treaties. 6.3. Optical Reconnaissance. 6.4. Radar Monitoring. 6.5. How Much Verification is Enough? 7. Winding Down the Cold War. 7.1. Then and Now. 7.2. Controls on Warheads and Fissile Materials. 7.3. Warhead Monitoring in INF and START. 7.4. Post Cold–War Initiatives. 7.5. Initiatives to Limit Fissile Materials. 7.6. Warhead Monitoring after START. 7.7. Quo Vadis after Cold War. 8. Nuclear Proliferation. 8.1. Proliferation History. 8.2. The NPT. 8.3. Non-Proliferation Policy. 9. Proliferation Technologies. 9.1. Special Nuclear Material. 9.2. Uranium Enrichment. 9.3. Uranium Details. 9.4. Plutonium Details. 9.5. Missile Technologies. 9.6. Safeguard Technologies. 10. Proliferated States. 10.1. Technology Transfer. 10.2. Five P–5 NWS. 10.3. Four Defacto NWS. 10.4. Iran, a Work in Progress. 10.5. Nine NNWS Successes. 10.6. Eight more NNWS Successes. 11. Nuclear Testing and the NPT. 11.1. Comprehensive Nuclear–Test–Ban Treaty. 11.2. NPT–CTBT Connection. 11.3. Nuclear Tests in Atmosphere and Space. 11.4. Underground Nuclear Tests. 11.5. National Academy on CTBT Monitoring. 11.6. Covert Cavity Tests. 12. Terrorism. 12.1. Terrorism in 21st Century. 12.2. Attack of 11 September 2001. 12.3. Long–Term Response. 12.4. Vulnerability to Terrorism. 12.5. Insider Threats. 13. Nuclear Terrorism. 13.1. Improvised Devices. 13.2. Improvised Nuclear Devices. 13.3. Dirty Bombs. 13.4. Nuclear Industry. 13.5. Drones. 14. Cyber Terrorism. 14.1. Cyber Introduction. 14.2. Stuxnet. 14.3. Cyber Details. 14.4. Cyber Governance. 14.5. Cyber Diplomacy. 15. Biological and Chemical Weapons.15.1. BW History. 15.2. BW Control with BWC. 15.3. CW History. 15.4. CW Control with CWC. A. Reflections on Nuclear Arms Control. A.1. Soviet–American Back-Channel. A.2. Strategic Arms Reduction Treaty. A.3. Conventional Forces in Europe Treaty. A.4. Cold War Ends. A.5. Soviet Union’s Final Days. A.6. Monitoring Warhead Destruction. A.7. Ratification of START. A.8. Verification Standard for START. A.9. Nuclear Test Ban Treaties. B. Reflections on Nuclear Proliferation. B.1. Selected Proliferation History. B.2. Nuclear Proliferation Policy. B.3. Nuclear Export Legislation. B.4. Sanctions Legislation. B.5. Nuclear Fuel Cycle Issues. B.6. End of US Plutonium Economy. B.7. Response to US Non–Proliferation Policy. C. Glossary. D. Index.

    1 in stock

    £38.94

  • Man-made Catastrophes and Risk Information

    Springer International Publishing AG Man-made Catastrophes and Risk Information

    1 in stock

    Book SynopsisThis book discusses the risks of information concealment in the context of major natural or industrial disasters – offering detailed descriptions and analyses of some 25 historical cases (Three Mile Island nuclear accident, Bhopal disaster, Challenger Space Shuttle explosion, Chernobyl nuclear disaster, Deepwater Horizon oil spill, Fukushima-Daiichi nuclear disaster, Enron’s bankruptcy, Subprime mortgage crisis, Worldwide Spanish flu and SARS outbreaks, etc.) and applying these insights to selected on-going cases where such information concealment is suspected. Some successful examples of preventive anti-concealment practice are also presented.In the book, the term ‘concealment’ is used to represent the two distinct behaviors uncovered in the investigations: (i) facts and information about an organization and its functioning being hidden from those that need them – here the concealment can be due to various factors, such as complexity and miscommunication, to name but two – and (ii) the conscious and deliberate action of keeping important information secret or misrepresenting it. This second meaning makes up a surprisingly important part of the evidence presented. Accordingly, emphasis has been put on this second aspect and the approach is more pragmatic than academic, remaining focused on evidence-based practical and useful factors. It raises awareness and provides valuable lessons for decision- makers, risk specialists and responsible citizens alike. This work is also intended as a fact-based reference work for future academic and scholarly investigations on the roots of the problem, in particular regarding any psychological or sociological modeling of human fallibility. Table of ContentsPreface.- Setting the landscape.- Examples of risk information concealment practice.- Causes of risk information concealment.- Major on-going cases with information concealment practice.- Succesful risk information management.

    1 in stock

    £42.74

  • Reliability in Automotive and Mechanical Engineering: Determination of Component and System Reliability

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Reliability in Automotive and Mechanical Engineering: Determination of Component and System Reliability

    15 in stock

    Book SynopsisDefects generate a great economic problem for suppliers who are faced with increased duties. Customers expect increased efficiency and dependability of technical product of - also growing - complexity. The authors give an introduction to a theory of dependability for engineers. The book may serve as a reference book as well, enhancing the knowledge of the specialists and giving a lot of theoretical background and information, especially on the dependability analysis of whole systems.Table of ContentsMathematical fundamentals. - Lifetime distributions. - Theory of system reliability. - FMEA. - Fault Tree Analysis. - Reliability test planning. - Trial evaluation. - Calculation of repairable systems. - Reliability assurance programs.

    15 in stock

    £170.99

  • Powders and Bulk Solids: Behavior,

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Powders and Bulk Solids: Behavior,

    4 in stock

    Book SynopsisThe book concentrates on powder flow properties, their measurement and applications. These topics are explained starting from the interactions between individual particles up to the design of silos. A wide range of problems are discussed – such as flow obstructions, segregation, and vibrations. The goal is to provide a deeper understanding of the powder flow, and to show practical solutions.Trade ReviewAus den Rezensionen: “... Im ersten Teil, der etwa 250 Seiten umfasst, gelingt es dem Autor durch anschauliche Abbildungen und eine verständliche Darstellung, dem Leser einen tiefen Einblick in die Schüttguttechnik zu geben. ... Trotz dieser Ausführlichkeit ... bleibt das Buch durch seine klare und übersichtliche Struktur gut lesbar. Im zweiten Teil ... fließen die ... praktischen Erfahrungen des Autors ein ... Das ... Ziel, einem breiten Leserkreis eine verständliche Einführung in die Welt der Schüttguttechnik zu geben ... wird voll und ganz erreicht. … Es ist seit langem das beste Buch …“ (R. Schmitt, in: Chemie Ingenieur Technik, April/2010, Vol. 82, Issue 4, S. 553 f.)Table of ContentsFundamentals.- Flow properties of bulk solids.- Practical determination of flow properties.- A more detailed look at properties of bulk solids.- Discussion of testers and test procedures.- Properties exhibited by some bulk solids.- Examples of measured flow properties.- Stresses.- Silo design for flow.- Silo configurations.- Discharge of bulk solids.- Segregation.- Silo quaking and silo honking.- Sample problems and solutions.

    4 in stock

    £134.99

  • Enhancing Citizens Role in Public Safety

    Springer Vieweg Enhancing Citizens Role in Public Safety

    1 in stock

    1 in stock

    £67.49

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account