LEADER 05410nam a2200349Ii 4500 001 991003235649707536 008 070806s2004 maua sb 001 0 eng d 020 $a9780126022506 020 $a012602250X 035 $ab13653064-39ule_inst 040 $aBibl. Dip.le Aggr. Ingegneria Innovazione - Sez. Ingegneria Innovazione$beng 082 04$a620.00420285$222 100 1 $aHorváth, László$0627421 245 10$aModeling and problem solving techniques for engineers$h[e-book] /$cby László Horváth and Imre J. Rudas 260 $aBurlington, Mass. :$bElsevier Academic Press,$c2004 300 $axvii, 330 p. :$bill. ;$c24 cm 504 $aIncludes bibliographical references (p. 319-325) and index 505 0 $a1. The magic world of virtual engineering -- 2. Activities in virtual engineering -- 3. Computer representations of shapes -- 4. Representation of elementary shapes -- 5. Models of shape-centered products -- 6. Finite element and manufacturing process models -- 7. Creating curve and surface models in CAD/CAM systems -- 8. Construction and relating solid part models in CAD/CAM systems -- 9. Creating kinematic models in CAD/CAM systems 520 $aThis book offers a comprehensive survey of computer methods for engineers that know the importance of the future applications of these techniques but can not understand them. Typically, design and production engineers can find books for specialists but they need one that helps them to understand the mystic world of advanced computer aided engineering activitites. This book is intended to fill this gap. Mechanical engineers will find basic theory and the value of competitive computer-aided engineering methods in the proposed book. The book will be written in a style free of computer specialists' jargon. The topic of the book is computer methodology for engineers, including conceptual design, detailed design, styling, modeling, analysis, simulation, manufacturing planning, 3D graphic visualization. The aspect is of the engineer who is in dialog connection with computer procedures and is working in a human-computer system where a group of engineers collaborates using an advanced concurrent engineering environment. The book will include chapters on: computing for engineering; computer representation; computing methods: creating computer representations; application of computer representations; engineering activities in the global computer environment; and opinions of some potentials. The audience for this book consists of engineers, who must be familiar with computer methods and should be able to apply them in their work, as well as students who are not involved in computer-related courses but need an understanding of the world of computer-aided engineering to solve engineering tasks. Potential readers may be any individuals who need to understand computer-aided engineering methods, especially engineering modeling. *Written by engineering professors who are also IT professionals, this book marries two points-of-view to provide a unique perspective *Covers the full spectrum of computer-aided engineering, from mathematics to graphics *Written purposefully in languge that is IT jargon-free, so that engineers will not get lost in tangled acronyms 520 $a"Today, the majority of engineers in many varied fields must utilize CAD/CAM systems in their work, but due to the increasing number and sophistication of programs and methods available, no one engineer can possibly be an expert in all of them. This book will help, by offering a detailed and comprehensive survey of all the leading computer-aided engineering methods, effectively providing a map to this sometimes confusing world. It is especially written for design and production engineers practicing in the modern industrial environment, where design, analysis, manufacturing planning, production planning and computer controlled equipment programming are all governed by CAD/CAM systems. The authors, who are engineering professors as well as IT professionals, clearly explain concepts, approaches, principles, and practical methods in purposefully IT-jargon free language, so that engineers will not get lost in a tangle of acronyms. It profides basic theoretical background and examines the relative value of various competitive computer-aided engineering methods, so that engineers will feel confident in making design tool choices, without having to become specialists in the development issues surrounding each system"--P. [4] of cover. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on Aug. 2, 2007).$nAccess may be restricted to users at subscribing institutions 650 0$aComputer-aided engineering 650 0$aEngineering design$xData processing 655 7$aElectronic books.$2local 700 1 $aRudas, I. J. 776 1 $cOriginal$z012602250X$z9780126022506$w(OCoLC)56628708 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9780126022506$zAn electronic book accessible through the World Wide Web; click for information 907 $a.b13653064$b03-03-22$c24-01-08 912 $a991003235649707536 996 $aModeling and problem solving techniques for engineers$91212873 997 $aUNISALENTO 998 $ale026$b24-01-08$cm$d@ $e-$feng$gmau$h0$i0 LEADER 06405nam 2200637 450 001 9910787048803321 005 20210705051905.0 010 $a1-84928-572-1 035 $a(CKB)3710000000238075 035 $a(EBL)1778762 035 $a(OCoLC)890529932 035 $a(SSID)ssj0001452982 035 $a(PQKBManifestationID)12614274 035 $a(PQKBTitleCode)TC0001452982 035 $a(PQKBWorkID)11490780 035 $a(PQKB)10093846 035 $a(Au-PeEL)EBL1778762 035 $a(CaONFJC)MIL768701 035 $a(OCoLC)888035950 035 $a(CaSebORM)9781849285728 035 $a(MiAaPQ)EBC1778762 035 $a(EXLCZ)993710000000238075 100 $a20151013h20142014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCyberWar, CyberTerror, CyberCrime and CyberActivism $ean in-depth guide to the role of standards in cybersecurity environment /$fDr. Julie E. Mehan 205 $a2nd ed. 210 1$a[Cambridge, England] :$cIT Governance Publishing,$d2014. 210 4$d©2014 215 $a1 online resource (352 p.) 300 $aIncludes index. 311 $a1-84928-574-8 311 $a1-84928-571-3 327 $aCover; Title; Copyright; Preface; About the Author; Contents; Introduction; Chapter 1: Technology Is a Double-Edged Sword; From the printing press to the information age; The 'dark side of high tech'; Chapter 2: Cyber Attack: It's A Dangerous World for Information Systems; Cyberwar; Cyberterror; Cybercrime; CyberEspionage (and Information Exfiltration) - It's midnight; do you know where your data is?; Social Media - an opportunity and a challenge; Supply Chain (In-) security; The blended threat; The asymmetric effects of cyber attacks; Porous perimeters, compromisable software - or both? 327 $aIf we know about the vulnerabilities, why are exploits still successful?Chapter 3: The Human Factor: The Underrated Threat; Are people the problem?; Who are the attackers?; Most likely forms of attack; Sometimes it's just human error; People can also be the solution!; Chapter 4: Transition from an Environment of 'FUD' to a Standards-Based Environment; Chapter 5: Establishing a Culture of Cybersecurity; Chapter 6: Increasing Internationalism: Governance, Laws, and Ethics; Information globalism equals increased exposure; Following the lead of good governance; The proliferation of laws 327 $aEthics in an information society and a minimum standard of due care in cybersecurityCybersecurity and privacy; Chapter 7: Standards: What Are They and Why Should We Care?; What are standards?; How and by whom are standards developed?; The importance of terminology; Standards-based process improvement; Focus on consensus-based cybersecurity; Standards provide a level playing-field for co-ordination and co-operation; If standards are so good, then why is it so hard?; Chapter 8: From Reaction to Proaction: Applying Standards in an Environment of Change and Danger 327 $aMoving beyond compliance and reactionA quick look at relevant standards; Take four steps forward; The future is 'ROSI'; Making the case for cybersecurity assurance; Chapter 9: Conclusion: Where Do We Go From Here?; Cybersecurity program roadmap; Appendix 1: Gap Analysis Areas of Interest; Appendix 2: Standards Crosswalk; Definitions; Acronyms; Index; A; B; C; D; E; F; G; H; I; J; K; L; M; N; O; P; Q; R; S; T; U; V; W; X; Y; ITG Resources 330 $aSuccessful cyberattacks can damage your organisation, no matter who is behind them The goals of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker may not be the same ? but the outcomes can be equally devastating. Each can cause serious challenges for your organisation, ranging from information theft and disruption of normal operations to loss of reputation or credibility. Cyber security is much more than technology Many books on cybersecurity focus on technical responses to these threats. As important as this is, human fallibility and other known vulnerabilities will still allow hackers to easily break into a system that has not taken account of these factors. CyberWar, CyberTerror, CyberCrime and CyberActivism encourages cybersecurity professionals to take a wider view of what cybersecurity means, and to make the most of international standards and best practices to create a culture of cybersecurity awareness within their organizations that complements their technology-based defences. A cyber aware workforce equals better security This second edition takes a deep look at the changing threats in the cyber landscape, and includes an updated body of knowledge that describes how to acquire, develop, and sustain a secure information environment that goes beyond technology. This enables you to move towards a cyber aware organisational culture that is more robust and better able to deal with a wider range of threats. Related references, as well as recommendations for additional reading, are included at the end of each chapter making this a valuable resource for trainers, researchers and cybersecurity practitioners. Order this book today and see how international standards can boost your cyber defences About the author Dr Julie Mehan is the Founder and President of JEMStone Strategies and a Principal in a strategic consulting firm in the State of Virginia. She has delivered cybersecurity and related privacy services to senior commercial, department of defence and federal government clients working in Italy, Australia, Canada, Belgium, and the United States. Dr Mehan is also an Associate Professor at the University of Maryland University College, specializing in courses in Cybersecurity, Cyberterror, IT in Organizations and Ethics in an Internet Society. 606 $aComputer crimes$xPrevention 606 $aCyberterrorism$xPrevention 606 $aComputer networks$xSecurity measures$xStandards 615 0$aComputer crimes$xPrevention. 615 0$aCyberterrorism$xPrevention. 615 0$aComputer networks$xSecurity measures$xStandards. 676 $a658.478 700 $aMehan$b Julie E.$0891538 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910787048803321 996 $aCyberWar, CyberTerror, CyberCrime and CyberActivism$93733430 997 $aUNINA