Narrow your search

Library

Vlaams Parlement (276)

ULB (192)

KU Leuven (184)

ULiège (166)

Odisee (162)

Thomas More Mechelen (161)

VIVES (161)

UCLL (160)

Thomas More Kempen (159)

LUCA School of Arts (156)

More...

Resource type

book (244)

periodical (32)

digital (2)


Language

English (217)

Undetermined (38)

French (10)

Dutch (3)

Chinese (2)

More...

Year
From To Submit

2025 (2)

2024 (6)

2023 (15)

2022 (23)

2021 (16)

More...
Listing 1 - 10 of 276 << page
of 28
>>
Sort by

Book
Human-centred autonomous shipping
Authors: ---
ISBN: 9781003430957 1003430953 1032549890 Year: 2023 Publisher: Boca Raton : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"This covers the development of autonomous shipping towards a more human-centred approach, placing greater importance on human factors and human-centred design. Combining insight from experts in the industry and academia, it discusses the initial enthusiasm for rapid development of unmanned ships and the eventual shift to a more measured view as cumulative experience revealed the limitations, risks, and lack of a generic business case. This book uniquely covers the resulting focus on more realistic growth of automation to augment humans in maritime operations. It suits practitioners working in the field of autonomous shipping, as well as researchers and graduate students in the area"--


Book
Evaluating the Security of the Global Containerized Supply Chain
Authors: ---
ISBN: 1598753592 Year: 2005 Publisher: Santa Monica : RAND Corporation,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Much worldwide cargo, from raw materials to finished products, travels viacontainerized shipping. For the shippers, the main concern has always beenlosses from theft or accident. But shipping containers are as attractive toterrorists as they are to thieves and smugglers.


Book
Attributes of potential criminal adversaries of U.S. nuclear programs : a report prepared for Sandia Laboratories
Authors: ---
Year: 1978 Publisher: Santa Monica, CA : RAND Corporation,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Improving C2 and situational awareness for operations in and through the information environment
Author:
Year: 2018

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Internetspezifische Wettbewerbsverstöße
Author:
Year: 2006 Publisher: [Place of publication not identified] : KIT Scientific Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Die Arbeit untersucht in ihrem ersten Teil die Auswirkungen der UWG-Novelle und der jüngeren Rechtsprechung auf die Problemkreise der unverlangten E-Mail-Werbung, des Einsatzes von Hyperlinks und der Beeinflussung von Suchmaschinen. In ihrem zweiten Teil wendet sie sich der Bedeutung technischer Schutzmaßnahmen für die lauterkeitsrechtliche Bewertung zu.


Book
Multilateralization of the nuclear fuel cycle. Helping to fulfil the NPT grand bargain
Authors: ---
ISBN: 921055115X Year: 2010 Publisher: [Place of publication not identified] United Nations

Loading...
Export citation

Choose an application

Bookmark

Abstract

Addresses the security risks to a world without nuclear weapons.


Book
"Check six begins on the ground" : responding to the evolving ground threat to U.S. Air Force bases
Authors: --- --- ---
Year: 1995 Publisher: Santa Monica, Calif. : RAND Corporation,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In air-to-air combat, the unseen opponent is the greatest threat. An enemy pilot who slips onto your tail, your "six o'clock," is the one who is most likely to shoot you down. The classic fighter dictum, "keep checking six," may be as applicable on the ramp and on the runways as it is at 20,000 feet. This report explores the possibility that future adversaries will use ground attacks on U.S. Air Force (USAF) bases as at least a partial countermeasure to overwhelming U.S. air superiority. It also identifies, in broad terms, the types of initiatives that have the most potential to counter this evolving threat. The means, motives, and opportunity for ground attacks are converging to create a worsening ground threat to USAF air bases. Base vulnerability will be exacerbated by the kinds of expeditionary operations that are likely to be the most common military action in the future. Standoff attacks from perhaps several miles outside the base's perimeter pose the greatest danger, a danger that is amplified by the ongoing diffusion of affordable-yet-sophisticated weapon technologies and military gear. Surveillance and detection of enemy attack teams well outside the base perimeter will be key to protecting the base, its assets, and its personnel. The authors suggest that increasing the capabilities of the Security Police (SP) against the standoff threat will require some changes in USAF training policies and utilization of passive measures (e.g., deception, camouflage, and hardening) to protect key USAF assets. Finally, whereas defense of air bases against ground attack has been traditionally viewed within the USAF as an SP problem, the authors judge that it should be more properly seen as a challenge to airpower itself, since without secure bases, USAF operations could be severely impeded


Book
The cyber-posture of the national information infrastructure

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Safety Management Systems
Author:
Year: 2018 Publisher: Paris : OECD Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
A Cyberworm that Knows No Boundaries
Authors: --- ---
ISBN: 1280126965 9786613530820 0833059807 9780833059802 9781280126963 6613530824 Year: 2011 Publisher: RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.

Listing 1 - 10 of 276 << page
of 28
>>
Sort by