Listing 1 - 10 of 266 | << page >> |
Sort by
|
Choose an application
"This covers the development of autonomous shipping towards a more human-centred approach, placing greater importance on human factors and human-centred design. Combining insight from experts in the industry and academia, it discusses the initial enthusiasm for rapid development of unmanned ships and the eventual shift to a more measured view as cumulative experience revealed the limitations, risks, and lack of a generic business case. This book uniquely covers the resulting focus on more realistic growth of automation to augment humans in maritime operations. It suits practitioners working in the field of autonomous shipping, as well as researchers and graduate students in the area"--
Shipping. --- Shipping --- Security measures.
Choose an application
Much worldwide cargo, from raw materials to finished products, travels viacontainerized shipping. For the shippers, the main concern has always beenlosses from theft or accident. But shipping containers are as attractive toterrorists as they are to thieves and smugglers.
Choose an application
Choose an application
Choose an application
Die Arbeit untersucht in ihrem ersten Teil die Auswirkungen der UWG-Novelle und der jüngeren Rechtsprechung auf die Problemkreise der unverlangten E-Mail-Werbung, des Einsatzes von Hyperlinks und der Beeinflussung von Suchmaschinen. In ihrem zweiten Teil wendet sie sich der Bedeutung technischer Schutzmaßnahmen für die lauterkeitsrechtliche Bewertung zu.
Internet. --- Internet --- Security measures.
Choose an application
In air-to-air combat, the unseen opponent is the greatest threat. An enemy pilot who slips onto your tail, your "six o'clock," is the one who is most likely to shoot you down. The classic fighter dictum, "keep checking six," may be as applicable on the ramp and on the runways as it is at 20,000 feet. This report explores the possibility that future adversaries will use ground attacks on U.S. Air Force (USAF) bases as at least a partial countermeasure to overwhelming U.S. air superiority. It also identifies, in broad terms, the types of initiatives that have the most potential to counter this evolving threat. The means, motives, and opportunity for ground attacks are converging to create a worsening ground threat to USAF air bases. Base vulnerability will be exacerbated by the kinds of expeditionary operations that are likely to be the most common military action in the future. Standoff attacks from perhaps several miles outside the base's perimeter pose the greatest danger, a danger that is amplified by the ongoing diffusion of affordable-yet-sophisticated weapon technologies and military gear. Surveillance and detection of enemy attack teams well outside the base perimeter will be key to protecting the base, its assets, and its personnel. The authors suggest that increasing the capabilities of the Security Police (SP) against the standoff threat will require some changes in USAF training policies and utilization of passive measures (e.g., deception, camouflage, and hardening) to protect key USAF assets. Finally, whereas defense of air bases against ground attack has been traditionally viewed within the USAF as an SP problem, the authors judge that it should be more properly seen as a challenge to airpower itself, since without secure bases, USAF operations could be severely impeded
Air bases --- Security measures --- United States. --- Security measures.
Choose an application
Telecommunication --- Security measures --- Government policy
Choose an application
Choose an application
It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.
Choose an application
L'opération LE VIRUS DE LA RECHERCHE En réaction à la situation inédite engendrée par le coronavirus, les PUG proposaient fin mars 2020 à leurs auteurs et aux chercheurs intéressés d'ouvrir la réflexion sur les enjeux de la crise de la Covid-19 vus par le monde de la recherche, sur la base d'une contribution libre et volontaire. La commande faite aux auteurs était alors de questionner les modes de formulation et de diffusion des savoirs. Les chercheurs sont des gens passionnés, atteints de ce virus de la recherche qui formate leurs réflexions sur la marche du monde, et il nous semblait que cette crise sociétale favorisait aussi un travail d'introspection sur les ressorts sensibles du métier de chercheur – ses tâtonnements, ses doutes, ses énigmes mais aussi ses espoirs. La collection « Le virus de la recherche » est née de cette intuition. Coordonnée par Alain Faure, directeur de recherche au CNRS (Sciences Po Grenoble, Pacte, UGA), elle rassemble les meilleurs textes issus de cette initiative dans une série d'e-books courts qui sont proposés en libre accès et en téléchargement sur le site des PUG ainsi que dans leur réseau de diffusion et chez tous les libraires en ligne. Le succès de l'aventure collective (avec plus de cinquante auteurs en un mois) et la fraîcheur d'un format inhabituel (10 000 signes) ont convaincu les PUG de prolonger cette expérience au-delà de la conjoncture particulière du coronavirus. La série continue donc sur ses trois qualités principales : des savoirs scientifiques accessibles, un style littéraire vif, une pensée réflexive sur le monde. La collection se pérennise, en se fixant pour défi de diffuser les résultats de la recherche au plus grand nombre, et de mettre en valeur ses travaux les plus novateurs, qu'ils proviennent de la jeune recherche, de chercheurs confirmés ou d'inclassables qui font avancer les savoirs à la croisée de la culture et de l'innovation. Bonne lecture à tous !
Internet users --- Cyberspace --- Attitudes. --- Security measures.
Listing 1 - 10 of 266 | << page >> |
Sort by
|