Listing 1 - 10 of 276 | << page >> |
Sort by
|
Choose an application
"This covers the development of autonomous shipping towards a more human-centred approach, placing greater importance on human factors and human-centred design. Combining insight from experts in the industry and academia, it discusses the initial enthusiasm for rapid development of unmanned ships and the eventual shift to a more measured view as cumulative experience revealed the limitations, risks, and lack of a generic business case. This book uniquely covers the resulting focus on more realistic growth of automation to augment humans in maritime operations. It suits practitioners working in the field of autonomous shipping, as well as researchers and graduate students in the area"--
Shipping. --- Shipping --- Security measures.
Choose an application
Much worldwide cargo, from raw materials to finished products, travels viacontainerized shipping. For the shippers, the main concern has always beenlosses from theft or accident. But shipping containers are as attractive toterrorists as they are to thieves and smugglers.
Choose an application
Choose an application
Choose an application
Die Arbeit untersucht in ihrem ersten Teil die Auswirkungen der UWG-Novelle und der jüngeren Rechtsprechung auf die Problemkreise der unverlangten E-Mail-Werbung, des Einsatzes von Hyperlinks und der Beeinflussung von Suchmaschinen. In ihrem zweiten Teil wendet sie sich der Bedeutung technischer Schutzmaßnahmen für die lauterkeitsrechtliche Bewertung zu.
Internet. --- Internet --- Security measures.
Choose an application
Addresses the security risks to a world without nuclear weapons.
Nuclear nonproliferation --- Nuclear fuels --- International cooperation --- Security measures --- Security measures.
Choose an application
In air-to-air combat, the unseen opponent is the greatest threat. An enemy pilot who slips onto your tail, your "six o'clock," is the one who is most likely to shoot you down. The classic fighter dictum, "keep checking six," may be as applicable on the ramp and on the runways as it is at 20,000 feet. This report explores the possibility that future adversaries will use ground attacks on U.S. Air Force (USAF) bases as at least a partial countermeasure to overwhelming U.S. air superiority. It also identifies, in broad terms, the types of initiatives that have the most potential to counter this evolving threat. The means, motives, and opportunity for ground attacks are converging to create a worsening ground threat to USAF air bases. Base vulnerability will be exacerbated by the kinds of expeditionary operations that are likely to be the most common military action in the future. Standoff attacks from perhaps several miles outside the base's perimeter pose the greatest danger, a danger that is amplified by the ongoing diffusion of affordable-yet-sophisticated weapon technologies and military gear. Surveillance and detection of enemy attack teams well outside the base perimeter will be key to protecting the base, its assets, and its personnel. The authors suggest that increasing the capabilities of the Security Police (SP) against the standoff threat will require some changes in USAF training policies and utilization of passive measures (e.g., deception, camouflage, and hardening) to protect key USAF assets. Finally, whereas defense of air bases against ground attack has been traditionally viewed within the USAF as an SP problem, the authors judge that it should be more properly seen as a challenge to airpower itself, since without secure bases, USAF operations could be severely impeded
Air bases --- Security measures --- United States. --- Security measures.
Choose an application
Telecommunication --- Security measures --- Government policy
Choose an application
Choose an application
It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.
Listing 1 - 10 of 276 | << page >> |
Sort by
|