Browse Results

Showing 45,126 through 45,150 of 54,258 results

Sachkunde im Bewachungsgewerbe (IHK) - Übungsbuch: 250 Fragen mit Antworten und 10 Übungsfälle mit Lösungen

by Robert Schwarz

Dieses Übungsbuch ergänzt das gleichnamige Lehrbuch. Es schließt die Lücke zwischen dem Unterrichts- und Lernstoff und der Vorbereitung auf die Prüfung. Mit Hilfe der Fragen und Antworten können Lernende den wichtigen Prüfungsstoff strukturiert wiederholen, den eigenen Lernfortschritt kontrollieren und sich gründlich auf die Prüfung vorbereiten. Zehn Übungsfälle mit ausführlichen Lösungen stellen Zusammenhänge her und vertiefen das Gelernte. Die überarbeitete 5. Auflage entspricht dem aktuellen Rahmenstoffplan vom Mai 2021.

SAFE: Science and Technology in the Age of Ter

by Martha Baer Katrina Heron

If our society is the most technologically sophisticated on Earth, then why can't we protect ourselves from terrorists and other threats to our safety and security? This is the question that frustrates—and scares—all of us today, and the answers have proved maddeningly elusive. Until now. Through dramatic, enlightening, and often entertaining narratives, SAFE makes visible—and understandable—the high-stakes work being done by some of the most ingenious problem-solvers across the country and around the world, people committed to creating real and dependable security in the twenty-first century.The characters in these pages, from scientists and engineers to academics, entrepreneurs, and emergency workers, take us into a fascinating world of inquiry and discovery. Their stories reveal where our greatest vulnerabilities lie and where our best hope deservedly shines through. They show why the systems we rely on to protect ourselves can also be exploited by others to create catastrophe—and what we can do to outsmart the terrorists. We have ample proof that terrorists will go to great lengths to understand how our technologies can be put to destructive use. Now it's time to ask ourselves a question: Are we willing to let them keep beating us at our own game? For the brilliant and colorful innovators in these pages, the answer is no.Among them are Eric Thompson, an expert digital code breaker instrumental in deciphering hidden Al Qaeda messages; Mike Stein, a New York City firefighter turned technologist who is working to overcome the numerous communications failures of 9/11; Eve Hinman, who conducts structural autopsies at the scene of explosions, including the Oklahoma City bombing, in order to develop more blast-resistant designs; Ken Alibek, the infamous architect of the former Soviet bioweapons program and now an American entrepreneur working in the business of defending his adopted country from bioterrorism; Kris Pister and Michael Sailor, university researchers developing sensors no larger than a speck of dust; Rafi Ron, former head of security for Ben Gurion Airport in Tel Aviv and now a leading strategist on U.S. airport security; Tara O'Toole, who stages doomsday bioterror scenarios in order to craft better biodefense systems; and Jeff Jonas, a high-rolling Las Vegas software entrepreneur whose methods for spotting casino cheats might just have uncovered the 9/11 plot.Readers of SAFE will come away understanding the unique challenges posed by technological progress in a networked, and newly dangerous, world. Witnessing the work of this gathering force of innovators up close, they'll be inspired by the power of the human intellect and spirit—and realize how important the contributions of individual citizens and communities can be.

Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems

by Marilyn Wolf Dimitrios Serpanos

​This book provides the first comprehensive view of safe and secure CPS and IoT systems. The authors address in a unified manner both safety (physical safety of operating equipment and devices) and computer security (correct and sound information), which are traditionally separate topics, practiced by very different people. Offers readers a unified view of safety and security, from basic concepts through research challenges;Provides a detailed comparison of safety and security methodologies;Describes a comprehensive threat model including attacks, design errors, and faults;Identifies important commonalities and differences in safety and security engineering.

Safe, Autonomous and Intelligent Vehicles (Unmanned System Technologies)

by Huafeng Yu Xin Li Richard M. Murray S. Ramesh Claire J. Tomlin

This book covers the start-of-the-art research and development for the emerging area of autonomous and intelligent systems. In particular, the authors emphasize design and validation methodologies to address the grand challenges related to safety. This book offers a holistic view of a broad range of technical aspects (including perception, localization and navigation, motion control, etc.) and application domains (including automobile, aerospace, etc.), presents major challenges and discusses possible solutions.

Safe Autonomy with Control Barrier Functions: Theory and Applications (Synthesis Lectures on Computer Science)

by Wei Xiao Christos G. Cassandras Calin Belta

This book presents the concept of Control Barrier Function (CBF), which captures the evolution of safety requirements during the execution of a system and can be used to enforce safety. Safety is formalized using an emerging state-of-the-art approach based on CBFs, and many illustrative examples from autonomous driving, traffic control, and robot control are provided. Safety is central to autonomous systems since they are intended to operate with minimal or no human supervision, and a single failure could result in catastrophic results. The authors discuss how safety can be guaranteed via both theoretical and application perspectives. This presented method is computationally efficient and can be easily implemented in real-time systems that require high-frequency reactive control. In addition, the CBF approach can easily deal with nonlinear models and complex constraints used in a wide spectrum of applications, including autonomous driving, robotics, and traffic control. With the proliferation of autonomous systems, such as self-driving cars, mobile robots, and unmanned air vehicles, safety plays a crucial role in ensuring their widespread adoption. This book considers the integration of safety guarantees into the operation of such systems including typical safety requirements that involve collision avoidance, technological system limitations, and bounds on real-time executions. Adaptive approaches for safety are also proposed for time-varying execution bounds and noisy dynamics.

Safe C++

by Vladimir Kushnir

It's easy to make lots of programming mistakes in C++--in fact, any program over a few hundred lines is likely to contain bugs. With this book, you'll learn about many common coding errors that C++ programmers produce, along with rules and strategies you can use to avoid them. Author Vladimir Kushnir shows you how to use his Safe C++ library, based in part on programming practices developed by the C++ community. You'll not only find recipes for identifying errors during your program's compilation, runtime, and testing phases, you'll learn a comprehensive approach for making your C++ code safe and bug-free. Get recipes for handling ten different error types, including memory leaks and uninitialized variables Discover problems C++ inherited from C, like pointer arithmetic Insert temporary and permanent sanity checks to catch errors at runtime Apply bug prevention techniques, such as using separate classes for each data type Pursue a testing strategy to hunt and fix one bug at a time--before your code goes into production

Safe City: From Law Enforcement to Neighborhood Watches

by Robert Hessel

It's a basic human right to feel and be safe in your communitywhere you live, work and play. But, few people know or understand everything it takes to make this possible. Safe City details the concerted effort and integration of new technology it takes to make communities safer for everyone.From fire departments detecting fires within seconds with thermal imaging to police departments detecting gunfire immediately through gunshot detection sensors, technology continues to evolve daily. Even surveillance cameras have taken great strides from the grainy images of years past, and just one camera can make a difference (read about how police identified the Boston Marathon bombers through a department stores video camera inside!). Safe City teaches the public how to harden targets and protect their homes, businesses, communities, themselves, and their loved ones. It takes a community effort to help reduce and prevent crime, and Safe City answers the questions people have along with pointing out many more that should be asked.,

SAFe® for DevOps Practitioners: Implement robust, secure, and scaled Agile solutions with the Continuous Delivery Pipeline

by Robert Wen Harry Koehnemann

Discover how the DevOps approach with Scaled Agile Framework helps you develop and deliver high-quality, secured solutions with a reduced risk of production failures with this step-by-step guideKey FeaturesExplore the five elements of the CALMR approach to avoid product development challengesUse value stream management to introduce systems thinking and flow for product developmentDemonstrate how the CD pipeline combines practices and technology to optimize your value streamPurchase of the print or Kindle book includes a free eBook in the PDF formatBook DescriptionProduct development and release faces overlapping challenges due to the combined pressure of delivering high-quality products in shorter time-to-market cycles, along with maintaining proper operation and ensuring security in a complex high-tech environment. This calls for new ways of overcoming these challenges from design to development, to release, and beyond. SAFe® for DevOps Practitioners helps you use a DevOps approach with the Scaled Agile Framework and details how value streams help you resolve these challenges using examples and use cases. The book begins by explaining how the CALMR approach makes DevOps effective in resolving product development roadblocks. Next, you'll learn to apply value stream management to establish a value stream that enables product development flow, measure its effectiveness through appropriate feedback loops, and find ways of improving it. Finally, you'll get to grips with implementing a continuous delivery pipeline that optimizes the value stream through four phases during release on demand. This book complements the latest SAFe DevOps courses, and you'll find it useful while studying for the SAFe DevOps Practitioner (SDP) certification. By the end of this DevOps book, you'll have gained a clear understanding of how to achieve continuous execution and release on demand using DevOps and SAFe.What you will learnUnderstand the important elements of the CALMR approachDiscover how to organize around value using value stream mappingMeasure your value stream using value stream metricsImprove your value stream with continuous learningUse continuous exploration to design high-quality and secure featuresPrevent rework and build in quality using continuous integrationAutomate delivery with continuous deploymentMeasure successful outcomes with Release on DemandWho this book is forThis book is for IT professionals such as DevOps and DevSecOps practitioners, SREs, and managers who are interested in implementing DevOps practices using the Scaled Agile Framework (SAFe) approach. Basic knowledge of DevOps and agile software development lifecycle and methodology will be helpful.

Safe, Secure, Ethical, Responsible Technologies and Emerging Applications: First EAI International Conference, SAFER-TEA 2023, Yaoundé, Cameroon, October 25-27, 2023, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #566)

by Franklin Tchakounte Marcellin Atemkeng Rajeswari Pillai Rajagopalan

This book constitutes the refereed proceedings of the First EAI International Conference on Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, SAFER-TEA 2023, held in Yaoundé, Cameroon, during October 25-27, 2023. The 24 full papers were carefully reviewed and selected from 75 submissions. They were organized in topical sections as follows: Regulations and Ethics of Artificial Intelligence, Resource-constrained Networks and Cybersecurity, Emerging Artificial Intelligence Applications, Reviews.

Safe Social Networking

by Heather E. Schwartz Frank W. Baker

Describes safe social networking usage and ways to avoid dangerous situations, such as identity theft, cyberbullying, or predators.

Safe Trajectory Planning for Maritime Surface Ships (Springer Series on Naval Architecture, Marine Engineering, Shipbuilding and Shipping #13)

by Agnieszka Lazarowska

This book offers a comprehensive review of collision avoidance techniques and safe trajectory planning for manned and unmanned ships, together with extensive information on how to develop and implement algorithms for applications in real-world settings. It describes the most relevant decision-support systems and guidance systems used in the control of marine craft, giving a special emphasis to autonomous vehicles, but also covering manned ones. Thanks to its good balance of theory and practice, and the inclusion of basic explanations of all essential concepts, this book fills an important gap in the literature of marine navigation, providing not only researchers and practitioners with a timely reference guide to safe trajectory planning, but also supporting students and newcomers to the field.

Safe Zone (Level Up)

by R. T. Martin

No_Idea has actually no idea how he wound up in the middle of a zombie apocalypse. It's not until he meets another player, named N3V3RDIE, that he learns he's been selected to test a virtual reality video game. And if they don't win the game, they'll be stuck inside the virtual world forever. Will No_Idea figure out the gameplay and make it to the game's safe zone in time, or will he end up trapped in a world filled with virtual zombies?

Safety and Risk Modeling and Its Applications

by Hoang Pham

Safety and Risk Modeling presents the latest theories and methods of safety and risk with an emphasis on safety and risk in modeling. It covers applications in several areas including transportations and security risk assessments, as well as applications related to current topics in safety and risk. Safety and Risk Modeling is a valuable resource for understanding the latest developments in both qualitative and quantitative methods of safety and risk analysis and their applications in operating environments. Each chapter has been written by active researchers or experienced practitioners to bridge the gap between theory and practice and to trigger new research challenges in safety and risk. Topics include: safety engineering, system maintenance, safety in design, failure analysis, and risk concept and modelling. Postgraduate students, researchers, and practitioners in many fields of engineering, operations research, management, and statistics will find Safety and Risk Modeling a state-of-the-art survey of reliability and quality in design and practice.

Safety and Security of Cyber-Physical Systems: Engineering dependable Software using Principle-based Development

by Frank J. Furrer

Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with each other and interacting with the physical world through sensors and actuators.Because most of the functionality of a CPS is implemented in software, the software is of crucial importance for the safety and security of the CPS. This book presents principle-based engineering for the development and operation of dependable software.The knowledge in this book addresses organizations that want to strengthen their methodologies to build safe and secure software for mission-critical cyber-physical systems.The book:• Presents a successful strategy for the management of vulnerabilities, threats, and failures in mission-critical cyber-physical systems;• Offers deep practical insight into principle-based software development (62 principles are introduced and cataloged into five categories: Business & organization, general principles, safety, security, and risk management principles);• Provides direct guidance on architecting and operating dependable cyber-physical systems for software managers and architects.

Safety-Critical Electrical Drives: Topologies, Reliability, Performance (SpringerBriefs in Electrical and Computer Engineering)

by Anatoly Lisnianski Lev Khvatskin Ilia Frenkel Hans-Georg Herzog Igor Bolvashenkov

This book focuses on one of the most important aspects of electrical propulsion systems – the creation of highly reliable safety-critical traction electrical drives. It discusses the methods and models for analysis and optimization of reliability and fault tolerance indices, based on which, it proposes and assesses methods for improving the availability, fault tolerance and performance of traction electric drives.

Safety for Future Transport and Mobility

by Hans-Leo Ross

The book provides background information about technical solutions, processes and methodology to develop future automated mobility solutions. Beginning from the legal requirements as the minimum tolerable risk level of the society, the book provides state-of-the-art risk-management methodologies. The system engineering approach based on todays engineering best practices enhanced by principles derived from cybernetics. The approach derived from the typical behaviour of a human driver in public road traffic to a cybernetical based system engineering approach. Beyond the system engineering approach, a common behaviour model for the operational domain will show aspects how to extend the system engineering model with principles of cybernetics. The role and the human factors of road traffic participants and drivers of motor vehicles are identified and several viewpoints for different observers show how such mixed traffic scenarios could be assessed and optimised. The influence of the changing mobility demands of the society and the resulting changes to the origination of producer, owner, driver and supplier show aspects for future liability and risk share option for new supply chains. Examples from various industries provide some well-proven engineering principles how to adapt those for the future mobility for the benefit of the users. The aim of the book is to raise awareness that the safety provided by a product, a means of transport or a system up to an entire traffic system depends on the capabilities of the various actors. In addition to the driver and passengers, there are also other road users, maintenance personnel and service providers, who must have certain abilities to act safely in traffic. These are also the capabilities of the organisation, not only the organisation that develops or brings the product to market, but also the organisation that is responsible for the operation and the whole lifecycle of the products. The book is for people who want to get involved in the mobility of the future. People, that have ideas to become a player who want to help shape the future mobility of society and who want to bring responsible solutions for users into the market.

Safety in the Digital Age: Sociotechnical Perspectives on Algorithms and Machine Learning (SpringerBriefs in Applied Sciences and Technology)

by Jean-Christophe Le Coze Stian Antonsen

This open access book gathers authors from a wide range of social-scientific and engineering disciplines to review challenges from their respective fields that arise from the processes of social and technological transformation taking place worldwide. The result is a much-needed collection of knowledge about the integration of social, organizational and technical challenges that need to be tackled to uphold safety in the digital age.The contributors whose work features in this book help their readers to navigate the massive increase in the capability to generate and use data in developing algorithms intended for automation of work, machine learning and next-generation artificial intelligence and the blockchain technology already in such extensive use in real-world organizations.This book deals with such issues as:· How can high-risk and safety-critical systems be affected by these developments, in terms of their activities, their organization, management and regulation?· What are the sociotechnical challenges of the proliferation of big data, algorithmic influence and cyber-security challenges in health care, transport, energy production/distribution and production of goods?Understanding the ways these systems operate in the rapidly changing digital context has become a core issue for academic researchers and other experts in safety science, security and critical-infrastructure protection. The research presented here offers a lens through which the reader can grasp the way such systems evolve and the implications for safety—an increasingly multidisciplinary challenge that this book does not shrink from addressing.

Safety Message Broadcast in Vehicular Networks

by Yuanguo Bi Haibo Zhou Weihua Zhuang Hai Zhao

This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature. A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle-to-infrastructure communications. This book offers useful insights into protocol design and inspires a new line of thinking in performance improvements for safety applications in vehicular networks. It is a valuable resource for professionals, researchers, or advanced-level students working in vehicular networks or quality of service.

Safety of Computer Architectures

by Jean-Louis Boulanger

It is currently quite easy for students or designers/engineers to find very general books on the various aspects of safety, reliability and dependability of computer system architectures, and partial treatments of the elements that comprise an effective system architecture. It is not so easy to find a single source reference for all these aspects of system design. However, the purpose of this book is to present, in a single volume, a full description of all the constraints (including legal contexts around performance, reliability norms, etc.) and examples of architectures from various fields of application, including: railways, aeronautics, space, automobile and industrial automation.The content of the book is drawn from the experience of numerous people who are deeply immersed in the design and delivery (from conception to test and validation), safety (analysis of safety: FMEA, HA, etc.) and evaluation of critical systems. The involvement of real world industrial applications is handled in such as a way as to avoid problems of confidentiality, and thus allows for the inclusion of new, useful information (photos, architecture plans/schematics, real examples).

The Safety of Intelligent Driver Support Systems: Design, Evaluation and Social Perspectives (Human Factors in Road and Rail Transport)

by Ralf Risser

The development of new technologies of information and communication will, in the coming years, transform deeply their uses and practices in transport. The current developments in the field of road telematics and driver assistance systems offer a real opportunity to aid mobility and road safety. However, they also raise numerous questions about their effectiveness, possible positive and negative modifications of behaviour or attitudes and about their acceptability by drivers. Problems related to the design and evaluation of intelligent driver support systems (IDSSs) and social perspectives related to their introduction on a large scale may only be fully addressed from a multi-disciplinary point of view. People from different backgrounds, from both engineering and social sciences, should be involved in this development. This book provides such knowledge from both a human and social factors background. The Safety of Intelligent Driver Support Systems serves the training of professionals working within the transport area so that they can use this knowledge in their work. It will be of direct interest to transportation and traffic professionals, engineers, system designers, researchers and specialists working in automotive and related industries, departments of transport, and communication and public bodies related to transport in the automotive industry, public authorities, etc. Also students at Masters and PhD level, performing studies in the road transportation area, will find in this book a rich source of knowledge. Teachers and trainers, both in professional training and academic education, may use the book as a basis for giving a course on the topic addressed.

Safety, Security and Privacy for Cyber-Physical Systems (Lecture Notes in Control and Information Sciences #486)

by Riccardo M. G. Ferrari André M. H. Teixeira

This book presents an in-depth overview of recent work related to the safety, security, and privacy of cyber-physical systems (CPSs). It brings together contributions from leading researchers in networked control systems and closely related fields to discuss overarching aspects of safety, security, and privacy; characterization of attacks; and solutions to detecting and mitigating such attacks. The book begins by providing an insightful taxonomy of problems, challenges and techniques related to safety, security, and privacy for CPSs. It then moves through a thorough discussion of various control-based solutions to these challenges, including cooperative fault-tolerant and resilient control and estimation, detection of attacks and security metrics, watermarking and encrypted control, privacy and a novel defense approach based on deception. The book concludes by discussing risk management and cyber-insurance challenges in CPSs, and by presenting the future outlook for this area of research as a whole. Its wide-ranging collection of varied works in the emerging fields of security and privacy in networked control systems makes this book a benefit to both academic researchers and advanced practitioners interested in implementing diverse applications in the fields of IoT, cooperative autonomous vehicles and the smart cities of the future.

Sage ACT! 2011 Dashboard and Report Cookbook

by Roy Laudenslager Karen Fredricks

This is a cookbook of easy-to-follow recipes about ACT! 2011 dashboard and report practices. If you are an ACT! end user who wants to learn about the existing reports and dashboards available in ACT! 2009, 2010, and 2011, then this book is for you. If you are an ACT! administrator who wants to make changes to ACT!'s dashboard and reporting features or a sales manager who needs to measure the effectiveness of his sales force, you will also find this book helpful. New CRM users will learn how to measure the success of their database. Prior knowledge of ACT! is not essential; however, you'll find it helpful to have good working knowledge of how to add data to ACT!, or to work with an ACT! database that has already been populated with data.

Sage ACT! 2012 Cookbook

by Karen Fredricks

This is an advanced cookbook of easy-to-follow recipes about ACT! 2012 designed to transform you into an ACT! Power User. If you are an ACT! end user who wants to learn about the advanced functionality of ACT! 2012, then this book is for you. It will also be useful if you are a 2009,2010 or 2011 user, as many advanced features originate from these ACT! versions. If you are an ACT! administrator who needs to administer an ACT! database or understand Outlook integration, you will also find this book helpful. No prior ACT! knowledge is necessarily required; however, you'll find it helpful to have good working knowledge of how to add data into ACT!, or to work with an ACT! database that has already been populated with data.

Sage Beginner's Guide

by Craig Finch

This is a beginner's guide with clear step-by-step instructions, explanations, and advice. Each concept is illustrated with a complete example that you can use as a starting point for your own work. If you are an engineer, scientist, mathematician, or student, this book is for you. To get the most from Sage by using the Python programming language, we'll give you the basics of the language to get you started. For this, it will be helpful if you have some experience with basic programming concepts.

The SAGE Encyclopedia of the Internet

by Barney Warf

The Internet needs no introduction, and its significance today can hardly be exaggerated. Today, more people are more connected technologically to one another than at any other time in human existence. For a large share of the world’s people, the Internet, text messaging, and various other forms of digital social media such as Facebook have become thoroughly woven into the routines and rhythms of daily life. The Internet has transformed how we seek information, communicate, entertain ourselves, find partners, and, increasingly, it shapes our notions of identity and community. The SAGE Encyclopedia of the Internet addresses the many related topics pertaining to cyberspace, email, the World Wide Web, and social media. Entries will range from popular topics such as Alibaba and YouTube to important current controversies such as Net neutrality and cyberterrorism. The goal of the encyclopedia is to provide the most comprehensive collection of authoritative entries on the Internet available, written in a style accessible to academic and non-academic audiences alike.

Refine Search

Showing 45,126 through 45,150 of 54,258 results