Handbook of Security Science [[electronic resource] /] / edited by Anthony J. Masys |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Disciplina | 621.389 |
Soggetto topico |
System safety
Terrorism Computer crimes Politics and war Sustainable development Security, International Security Science and Technology Cybercrime Military and Defence Studies Sustainable Development International Security Studies |
ISBN | 3-319-51761-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A: Concepts in Security Studies -- B: National Defence (Military) -- C: Transnational Crime and Terrorism -- D: Physical Security and Critical Infrastructure. |
Record Nr. | UNINA-9910337877103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Handbook of Space Security [[electronic resource] ] : Policies, Applications and Programs / / edited by Kai-Uwe Schrogl, Peter L. Hays, Jana Robinson, Denis Moura, Christina Giannopapa |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | New York, NY : , : Springer New York : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (178 illus., 143 illus. in color. eReference.) |
Disciplina | 358.8 HAN |
Soggetto topico |
Aerospace engineering
Astronautics System safety Computer communication systems Law of the sea International law Aerospace Technology and Astronautics Security Science and Technology Computer Communication Networks Law of the Sea, Air and Outer Space |
ISBN | 1-4614-2029-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part 1: International Space Security Setting -- Introduction -- Chapter 1: Defining Space Security -- Chapter 2: Key Space Security Policy Issues -- Chapter 3: Space and Cyber Security -- Chapter 4: Space Safety -- Chapter 5: Space Sustainability -- Chapter 6: Spacepower Theory -- Chapter 7: Discussion on Space Weaponization -- Chapter 8: The Role of Space in Deterrence -- Chapter 9: Obstacles to International Space Governance -- Chapter 10: International Code of Conduct for Outer Space Activities -- Chapter 11: Space Transparency and Confidence-Building Measures -- Chapter 12: Space Traffic Management -- Chapter 13: The Laws of War in Outer Space -- Chapter 14: Active Debris Removal and On-Orbit Servicing -- Chapter 15: Space Technology Export Controls -- Chapter 16: Responsive Space -- Chapter 17: Space as a Critical Infrastructure -- Part 2: Space Security Policies and Strategies of States and International Organizations -- Introduction -- Chapter 1: U.S. Space Security Priorities:War, Policy, and Spacepower -- Chapter 2: Space Security in Russia -- Chapter 3: Chinese Space Policy: Current Status and Road Ahead -- Chapter 4: Chinese Concepts of Space Security.-Chapter 5: Space and Security in Europe.-Chapter 6: Space Security in Japan -- Chapter 7: U.S. – Japan Space Security Cooperation -- Chapter 8: Space Security in India -- Chapter 9: Israeli Perspectiv on Space Security -- Chapter 10: Brazilian Perspective on Space Security.-Chapter11: Space Security-Relevant International Organizations: UN, ITU, ISO -- Chapter 12: Space Security Through the Transatlantic Partnership -- Chapter 13: External View of Space Security in Europe.-Chapter 14: U.S. Space Security and Allied Outreach -- Part 3: Space Applications for Security and Defense -- Introduction -- Chapter 1: Earth Observation for Security & Dual Use -- Chapter 2: Earth Observation for Defense -- Chapter 3: Telecommunications for Security & Dual Use -- Chapter 4: Telecommunications for Defense -- Chapter 5: Positioning, Navigation & Timing for Security and Defense -- Chapter 6: Eavesdropping -- Chapter 7: Integrated Space Related Applications for Security and Defence -- Chapter 8: Space Situational Awareness and Recognized Picture -- Chapter 9: Various Threats of Space Systems -- Chapter 10: Issues of Space Debris -- Part 4: Space Security Programs Worldwide -- Introduction -- Chapter 1: United States Space Launch Programs -- Chapter 2: European Space Launch Capabilities and Prospects -- Chapter 3 -- Russian Space Launch Program -- Chapter 4: Japanese Space Launch Program -- Chapter 5: Chinese Space Launch Program -- Chapter 6: Indian Space Launch Program -- Chapter 7: Space Launch Programs in Emerging Countries: Brazil -- Chapter 8: Satellite Programs in the United States -- Chapter 9: European Institutional Satellite Programs -- Chapter 10: European Member States Satellite Programs -- Chapter 11: European Multinational Satellite Programs -- Chapter 12: Russian Satellite Programs -- Chapter 13: Japanese Satellite Programs -- Chapter 14: Chinese Satellite Programs: An Internal View -- Chapter 15: Chinese Satellite Programs: An External View -- Chapter 16: Indian Satellite Programs -- Chapter 17: Satellite Programs in Emerging Countries: The Pacific Region -- Chapter 18: Satellite Programs in Emerging Countries: South America Region -- Chapter 19: The Proliferation of Space Capabilities: Implications for Space Security -- Chapter 20: Space Weapons’ Concepts and their International Security Implications -- Chapter 21: SSA Concepts Worldwide. |
Record Nr. | UNINA-9910299857603321 |
New York, NY : , : Springer New York : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The Hash Function BLAKE [[electronic resource] /] / by Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan, Luca Henzen |
Autore | Aumasson Jean-Philippe |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (237 p.) |
Disciplina | 005.82 |
Collana | Information Security and Cryptography |
Soggetto topico |
Data encryption (Computer science)
Computer security Algorithms System safety Cryptology Systems and Data Security Algorithm Analysis and Problem Complexity Security Science and Technology |
ISBN | 3-662-44757-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Preliminaries -- Specification of BLAKE -- Using BLAKE -- BLAKE in Software -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App. A, Test Vectors -- App. B, Reference C Code -- App. C, Third-Party Software -- Index. |
Record Nr. | UNINA-9910298969303321 |
Aumasson Jean-Philippe | ||
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Hazard analysis techniques for system safety / / Clifton A. Ericson, II |
Autore | Ericson Clifton A., II |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , 2016 |
Descrizione fisica | 1 online resource (643 p.) |
Disciplina | 363.11 |
Soggetto topico |
Industrial safety - Data processing
System safety |
Soggetto genere / forma | Electronic books. |
ISBN |
1-119-10170-0
1-119-10168-9 1-119-10172-7 |
Classificazione | TEC017000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Hazard Analysis Techniques for System Safety; Contents; Preface; Acknowledgments; Chapter 1: System Safety and Hazard Analysis; 1.1 Introduction; 1.2 The Need for Hazard Analysis; 1.3 System Safety Background; 1.4 System Safety Overview; 1.5 System Safety Process; 1.6 System Safety Standards; 1.7 System Safety Principles; 1.8 Key Terms; 1.9 Summary; Chapter 2: Systems; 2.1 System Concept; 2.2 System Attributes; 2.3 System Types; 2.4 System Life Cycle; 2.5 System Development; 2.6 System Development Process; 2.7 System Hierarchy; 2.8 System Views; 2.9 System Development Artifacts
2.10 Systems Complexity and Safety2.11 System Requirements; 2.12 System Laws; 2.13 Summary; References; Chapter 3: Hazards, Mishap, and Risk; 3.1 Introduction; 3.2 Hazard, Mishap, and Risk Definitions; 3.3 Accident (Mishap) Theory; 3.4 The Hazard-Mishap Relationship; 3.5 Hazard Risk; 3.6 The Components of a Hazard; 3.7 Hazard Triangle; 3.8 Hazard Actuation; 3.9 Hazard Causal Factors; 3.10 Hazard-Mishap Probability Example; 3.11 Recognizing Hazards; 3.12 Hazard Description; 3.13 Hazard Theory Summary; Further Readings; Chapter 4: Hazard Analysis Features; 4.1 Introduction 4.2 Types Versus Technique4.3 Description of Hazard Analysis Types; 4.3.1 Conceptual Design Hazard Analysis Type; 4.3.2 Preliminary Design Hazard Analysis Type; 4.3.3 Detailed Design Hazard Analysis Type; 4.3.4 System Design Hazard Analysis Type; 4.3.5 Operations Design Hazard Analysis Type; 4.3.6 Human Health Design Hazard Analysis Type (HD-HAT); 4.3.7 Requirements Design Hazard Analysis Type (RD-HAT); 4.4 The Timing of Hazard Analysis Types; 4.5 The Interrelationship of Hazard Analysis Types; 4.6 Hazard Analysis Techniques; 4.7 Hazard Analysis Technique Attributes 4.8 Primary and Secondary Techniques4.9 Inductive and Deductive Techniques; 4.10 Qualitative and Quantitative Techniques; 4.11 Summary; Further Readings; Chapter 5: Hazard Recognition and Management; 5.1 Introduction; 5.2 Hazard Analysis Tasks; 5.2.1 Plan the Hazard Analysis; 5.2.2 Understand the System Design; 5.2.3 Acquire Hazard Analysis Tools; 5.2.4 Identify Hazards; 5.2.5 Validate Hazards; 5.2.6 Assess Risk; 5.2.7 Mitigate Risk; 5.2.8 Verify Mitigation; 5.2.9 Accept Risk; 5.2.10 Track Hazards; 5.3 Hazard Recognition; 5.3.1 Hazard Recognition Introduction 5.3.2 Hazard Recognition: System Perspectives5.3.3 Hazard Recognition: Failure Perspectives; 5.3.4 Key Hazard Recognition Factors; 5.3.5 Hazard Recognition Basics; 5.3.6 Hazard Recognition Sources; 5.4 Describing the Identified Hazard; 5.5 Hazard Types By General Circumstances; 5.6 Hazard Types By Analysis Category; 5.7 Modelling Hazard Space; 5.7.1 System Mishap Model; 5.7.2 System Mishap Model Examples; 5.8 Summary; References; Chapter 6: Functional Hazard Analysis; 6.1 FHAIntroduction; 6.2 FHABackground; 6.3 FHAHistory; 6.4 FHATheory; 6.5 FHAMethodology; 6.6 FHAWorksheets 6.7 FHAExample 1: Aircraft Flight Functions |
Record Nr. | UNINA-9910461001103321 |
Ericson Clifton A., II | ||
Hoboken, New Jersey : , : Wiley, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Hazard analysis techniques for system safety / / Clifton A. Ericson, II |
Autore | Ericson Clifton A., II |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , 2016 |
Descrizione fisica | 1 online resource (643 pages) : illustrations |
Disciplina | 363.11 |
Soggetto topico |
Industrial safety - Data processing
System safety |
ISBN |
9781119101727
1119101727 |
Classificazione |
509.8
620.8/6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910795939703321 |
Ericson Clifton A., II | ||
Hoboken, New Jersey : , : Wiley, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Hazard analysis techniques for system safety / / Clifton A. Ericson, II |
Autore | Ericson Clifton A., II |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , 2016 |
Descrizione fisica | 1 online resource (643 pages) : illustrations |
Disciplina | 363.11 |
Soggetto topico |
Industrial safety - Data processing
System safety |
ISBN |
9781119101727
1119101727 |
Classificazione |
509.8
620.8/6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910819739503321 |
Ericson Clifton A., II | ||
Hoboken, New Jersey : , : Wiley, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Hazard analysis techniques for system safety [[electronic resource] /] / Clifton A. Ericson, II |
Autore | Ericson Clifton A., II. |
Pubbl/distr/stampa | Hoboken, NJ, : Wiley-Interscience, c2005 |
Descrizione fisica | 1 online resource (521 p.) |
Disciplina |
620.8/6
620.86 |
Soggetto topico |
Industrial safety - Data processing
System safety |
ISBN |
1-280-27735-1
9786610277353 0-470-49155-8 0-471-73942-1 0-471-73941-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Hazard Analysis Techniques for System Safety; Contents; PREFACE; ACKNOWLEDGMENTS; 1. System Safety; 1.1 Introduction; 1.2 System Safety Background; 1.3 System Safety Characterization; 1.4 System Safety Process; 1.5 System Concept; 1.5.1 General System Model; 1.5.2 System Attributes; 1.5.3 System Types; 1.5.4 System Life Cycle; 1.5.5 System Development; 1.6 Summary; 2. Hazards, Mishap, and Risk; 2.1 Introduction; 2.2 Hazard-Related Definitions; 2.3 Hazard Theory; 2.4 Hazard Actuation; 2.5 Hazard Causal Factors; 2.6 Hazard-Mishap Probability; 2.7 Recognizing Hazards; 2.8 Hazard Description
2.9 Summary3. Hazard Analysis Types and Techniques; 3.1 Types and Techniques; 3.2 Description of Hazard Analysis Types; 3.2.1 Conceptual Design Hazard Analysis Type (CD-HAT); 3.2.2 Preliminary Design Hazard Analysis Type (PD-HAT); 3.2.3 Detailed Design Hazard Analysis Type (DD-HAT); 3.2.4 System Design Hazard Analysis Type (SD-HAT); 3.2.5 Operations Design Hazard Analysis Type (OD-HAT); 3.2.6 Human Design Hazard Analysis Type (HD-HAT); 3.2.7 Requirements Design Hazard Analysis Type (RD-HAT); 3.3 Timing of Hazard Analysis Types; 3.4 Interrelationship of Hazard Analysis Types 3.5 Hazard Analysis Techniques3.5.1 Technique Attributes; 3.5.2 Primary Hazard Analysis Techniques; 3.6 Inductive and Deductive Techniques; 3.7 Qualitative and Quantitative Techniques; 3.8 Summary; 4. Preliminary Hazard List; 4.1 Introduction; 4.2 Background; 4.3 History; 4.4 Theory; 4.5 Methodology; 4.6 Worksheet; 4.7 Hazard Checklists; 4.8 Guidelines; 4.9 Example: Ace Missile System; 4.10 Advantages and Disadvantages; 4.11 Common Mistakes to Avoid; 4.12 Summary; 5. Preliminary Hazard Analysis; 5.1 Introduction; 5.2 Background; 5.3 History; 5.4 Theory; 5.5 Methodology; 5.6 Worksheet 5.7 Guidelines5.8 Example: Ace Missile System; 5.9 Advantages and Disadvantages; 5.10 Common Mistakes to Avoid; 5.11 Summary; 6. Subsystem Hazard Analysis; 6.1 Introduction; 6.2 Background; 6.3 History; 6.4 Theory; 6.5 Methodology; 6.6 Worksheet; 6.7 Guidelines; 6.8 Example: Ace Missile System; 6.9 Advantages and Disadvantages; 6.10 Common Mistakes to Avoid; 6.11 Summary; 7. System Hazard Analysis; 7.1 Introduction; 7.2 Background; 7.3 History; 7.4 Theory; 7.5 Methodology; 7.6 Worksheet; 7.7 Guidelines; 7.8 Example; 7.9 Advantages and Disadvantages; 7.10 Common Mistakes to Avoid; 7.11 Summary 8. Operating and Support Hazard Analysis8.1 Introduction; 8.2 Background; 8.3 History; 8.4 Definitions; 8.5 Theory; 8.6 Methodology; 8.7 Worksheet; 8.8 Hazard Checklists; 8.9 Support Tools; 8.10 Guidelines; 8.11 Examples; 8.11.1 Example 1; 8.11.2 Example 2; 8.12 Advantages and Disadvantages; 8.13 Common Mistakes to Avoid; 8.14 Summary; 9. Health Hazard Assessment; 9.1 Introduction; 9.2 Background; 9.3 History; 9.4 Theory; 9.5 Methodology; 9.6 Worksheet; 9.7 Checklist; 9.8 Example; 9.9 Advantages and Disadvantages; 9.10 Common Mistakes to Avoid; 9.11 Summary 10. Safety Requirements/Criteria Analysis |
Record Nr. | UNINA-9910143579903321 |
Ericson Clifton A., II. | ||
Hoboken, NJ, : Wiley-Interscience, c2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Homomorphic Encryption and Applications / / by Xun Yi, Russell Paulet, Elisa Bertino |
Autore | Yi Xun |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (136 p.) |
Disciplina |
004
004.0151 005.82 006.312 621 621.389 |
Collana | SpringerBriefs in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Physics Computer science—Mathematics Computer mathematics Data mining System safety Cryptology Applications of Graph Theory and Complex Networks Mathematical Applications in Computer Science Data Mining and Knowledge Discovery Security Science and Technology |
ISBN | 3-319-12229-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Homomorphic Encryption -- Fully Homomorphic Encryption -- Remote End-to-End Voting Scheme -- Nearest Neighbor Queries with Location Privacy -- Private Searching on Streaming Data. |
Record Nr. | UNINA-9910298973803321 |
Yi Xun | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The human factors of process safety and worker empowerment in the offshore oil industry : proceedings of a workshop / / Steve Olson and Heather Kreidler, rapporteurs ; Steering Committee on the Human Factors of Process Safety and Worker Empowerment in the Offshore Oil Industry: a Workshop, Board on Human-Systems Integration, Division of Behavioral and Social Sciences and Education, the National Academies of Sciences, Engineering, Medicine |
Pubbl/distr/stampa | Washington, DC : , : the National Academies Press, , [2018] |
Descrizione fisica | 1 online resource (xii, 105 pages) : illustrations |
Disciplina | 620.86 |
Soggetto topico |
System safety
Offshore oil industry - Safety regulations - United States Offshore oil industry - United States - Safety measures |
Soggetto genere / forma | Electronic books. |
ISBN |
0-309-47337-3
0-309-47335-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910480419103321 |
Washington, DC : , : the National Academies Press, , [2018] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The human factors of process safety and worker empowerment in the offshore oil industry : proceedings of a workshop / / Steve Olson and Heather Kreidler, rapporteurs ; Steering Committee on the Human Factors of Process Safety and Worker Empowerment in the Offshore Oil Industry: a Workshop, Board on Human-Systems Integration, Division of Behavioral and Social Sciences and Education, the National Academies of Sciences, Engineering, Medicine |
Pubbl/distr/stampa | Washington, DC : , : the National Academies Press, , [2018] |
Descrizione fisica | 1 online resource (xii, 105 pages) : illustrations |
Disciplina | 620.86 |
Soggetto topico |
System safety
Offshore oil industry - Safety regulations - United States Offshore oil industry - United States - Safety measures |
ISBN |
0-309-47337-3
0-309-47335-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910792901903321 |
Washington, DC : , : the National Academies Press, , [2018] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|