Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Teresa de Jesús 1,839
- Historia 1,177
- Semana Santa 1,090
- Història 942
- María 937
- Teresa del Niño Jesús 615
- Goigs 613
- Mara 602
- Biografia 555
- Biografías 553
- Culto 508
- Liturgia 426
- Biografa 405
- Setmana Santa 370
- Clara de Asís 364
- Crítica e interpretación 361
- Meditaciones 336
- Església Catòlica 335
- Sants 324
- Espiritualidad 312
- Semana Santa- 311
- Safety measures 296
- Litúrgia 293
- Edith Stein 281
- Santos 279
- Misticismo 275
- Teología 273
- Teresa de Jesús, Santa 267
- Santes 257
- Teresa 203
-
38161Publicado 2020Tabla de Contenidos: “…44 2.6 Additional Terms 49 2.7 Problems 54 References 56 3 Main Elements of Risk Assessment 59 3.1 Introduction 59 3.2 Risk Assessment Process 60 3.3 Risk Assessment Report 76 3.4 Risk Assessment in Safety Legislation 81 3.5 Validity and Quality Aspects of a Risk Assessment 82 3.6 Problems 83 References 84 4 Study Object and Limitations 87 4.1 Introduction 87 4.2 Study Object 87 4.3 Operating Context 91 4.4 System Modeling and Analysis 92 4.5 Complexity 95 4.6 Problems 97 References 98 5 Risk Acceptance 99 5.1 Introduction 99 5.2 Risk Acceptance Criteria 99 5.3 Approaches to Establishing Risk Acceptance Criteria 106 5.4 Risk Acceptance Criteria for Other Assets than Humans 114 5.5 Closure 115 5.6 Problems 115 References 117 6 Measuring Risk 121 6.1 Introduction 121 6.2 Risk Metrics 121 6.3 Measuring Risk to People 123 6.4 Risk Matrices 148 6.5 Reduction in Life Expectancy 154 6.6 Choice and Use of Risk Metrics 156 6.7 Risk Metrics for Other Assets 158 6.8 Problems 159 References 163 7 Risk Management 167 7.1 Introduction 167 7.2 Scope, Context, and Criteria 170 7.3 Risk Assessment 170 7.4 Risk Treatment 171 7.5 Communication and Consultation 172 7.6 Monitoring and Review 173 7.7 Recording and Reporting 174 7.8 Stakeholders 175 7.9 Risk and Decision-Making 176 7.10 Safety Legislation 179 7.11 Problems 180 References 180 8 Accident Models 183 8.1 Introduction 183 8.2 Accident Classification 183 8.3 Accident Investigation 188 8.4 Accident Causation 188 8.5 Accident Models 190 8.6 Energy and Barrier Models 193 8.7 Sequential Accident Models 195 8.8 Epidemiological Accident Models 201 8.9 Event Causation and Sequencing Models 208 8.10 Systemic Accident Models 213 8.11 Combining Accident Models 228 8.12 Problems 229 References 230 9 Data for Risk Analysis 235 9.1 Types of Data 235 9.2 Quality and Applicability of Data 238 9.3 Data Sources 239 9.4 Expert Judgment 250 9.5 Data Dossier 254 9.6 Problems 254 References 257 10 Hazard Identification 259 10.1 Introduction 259 10.2 Checklist Methods 263 10.3 Preliminary Hazard Analysis 266 10.4 Job Safety Analysis 278 10.5 FMECA 287 10.6 HAZOP 295 10.7 STPA 306 10.8 SWIFT 316 10.9 Comparing Semiquantitative Methods 322 10.10 Master Logic Diagram 322 10.11 Change Analysis 324 10.12 Hazard Log 327 10.13 Problems 331 References 335 11 Causal and Frequency Analysis 339 11.1 Introduction 339 11.2 Cause and Effect Diagram Analysis 341 11.3 Fault Tree Analysis 344 11.4 Bayesian Networks 370 11.5 Markov Methods 384 11.6 Problems 396 References 400 12 Development of Accident Scenarios 401 12.1 Introduction 401 12.2 Event Tree Analysis 402 12.3 Event Sequence Diagrams 426 12.4 Cause-Consequence Analysis 426 12.5 Hybrid Causal Logic 428 12.6 Escalation Problems 429 12.7 Consequence Models 429 12.8 Problems 431 References 435 13 Dependent Failures and Events 437 13.1 Introduction 437 13.2 Dependent Failures and Events 437 13.3 Dependency in Accident Scenarios 439 13.4 Cascading Failures 441 13.5 Common-Cause Failures 442 13.6 Factor Model 452 13.7 Binomial Failure Rate Model 456 13.8 Multiple Greek Letter Model 457 13.9-Factor Model 459 13.10 Multiple-Factor Model 461 13.11 Problems 461 References 462 14 Barriers and Barrier Analysis 465 14.1 Introduction 465 14.2 Barriers and Barrier Classification 466 14.3 Barrier Management 474 14.4 Barrier Properties 476 14.5 Safety-Instrumented Systems 477 14.6 Hazard-Barrier Matrices 487 14.7 Safety Barrier Diagrams 488 14.8 Bow-Tie Diagrams 490 14.9 Energy Flow/Barrier Analysis 490 14.10 Layer of Protection Analysis 493 14.11 Barrier and Operational Risk Analysis 502 14.12 Systematic Identification and Evaluation of Risk Reduction Measures 512 14.13 Problems 518 References 520 15 Human Reliability Analysis 525 15.1 Introduction 525 15.2 Task Analysis 536 15.3 Human Error Identification 543 15.4 HRA Methods 552 15.5 Problems 573 References 574 16 Risk Analysis and Management for Operation 579 16.1 Introduction 579 16.2 Decisions About Risk 581 16.3 Aspects of Risk to Consider 583 16.4 Risk Indicators 585 16.5 Risk Modeling 594 16.6 Operational Risk Analysis - Updating the QRA 596 16.7 MIRMAP 598 16.8 Problems 601 References 602 17 Security Assessment 605 17.1 Introduction 605 17.2 Main Elements of Security Assessment 608 17.3 Industrial Control and Safety Systems 615 17.4 Security Assessment 617 17.5 Security Assessment Methods 625 17.6 Application Areas 626 17.7 Problems 627 References 628 18 Life Cycle Use of Risk Analysis 631 18.1 Introduction 631 18.2 Phases in the Life Cycle 631 18.3 Comments Applicable to all Phases 634 18.4 Feasibility and Concept Selection 635 18.5 Preliminary Design 637 18.6 Detailed Design and Construction 639 18.7 Operation and Maintenance 641 18.8 Major Modifications 641 18.9 Decommissioning and Removal 643 18.10 Problems 643 References 643 19 Uncertainty and Sensitivity Analysis 645 19.1 Introduction 645 19.2 Uncertainty 647 19.3 Categories of Uncertainty 648 19.4 Contributors to Uncertainty 651 19.5 Uncertainty Propagation 656 19.6 Sensitivity Analysis 661 19.7 Problems 663 References 664 20 Development and Applications of Risk Assessment 667 20.1 Introduction 667 20.2 Defense and Defense Industry 668 20.3 Nuclear Power Industry 670 20.4 Process Industry 674 20.5 Offshore Oil and Gas Industry 678 20.6 Space Industry 681 20.7 Aviation 683 20.8 Railway Transport 685 20.9 Marine Transport 686 20.10 Machinery Systems 689 20.11 Food Safety 690 20.12 Other Application Areas 692 20.13 Closure 695 References 697 Appendix A Elements of Probability Theory 701 A.1 Introduction 701 A.2 Outcomes and Events 701 A.3 Probability 706 A.4 Random Variables 710 A.5 Some Specific Distributions 718 A.6 Point and Interval Estimation 728 A.7 Bayesian Approach 732 A.8 Probability of Frequency Approach 733 References 739 Appendix B Acronyms 741 Author Index 747 Subject Index…”
Libro electrónico -
38162Publicado 2020“…As AI (and associated AI-hype) grows more pervasive in our lives, its impact on society is ever more significant, raising ethical concerns and challenges regarding issues such as privacy, safety and security, surveillance, inequality, data handling and bias, personal agency, power relations, effective modes of regulation, accountability, sanctions, and workforce displacement. …”
Libro electrónico -
38163Publicado 2020“…It includes high-quality peer-reviewed papers featuring substantive new research in one of five main research areas:User Modeling for Recommender SystemsAdaptive & Personalized Educational SystemsIntelligent User InterfacesUser modeling in health and safetyResponsible personalization (UMAP 2020 theme)Personality, cognitive aspects and emotions in user modeling This year, we received 139 long paper and 62 short paper submissions. …”
Libro electrónico -
38164Publicado 2017“…Non solamente per ribadire il valore dell’art. 7 della Costituzione, per il quale «lo Stato e la Chiesa cattolica sono, ciascuno nel proprio ordine, indipendenti e sovrani», ma anche per rinnovare lo spirito di collaborazione al servizio del popolo italiano. La salita al Colle di Francesco dello scorso 10 giugno – la seconda del suo pontificato, dopo quella del 14 novembre 2013 al presidente Napolitano – è la nona visita di un Papa al Quirinale dopo la costituzione della Repubblica. …”
Artículo -
38165Publicado 2001“…And how can some of these answers change if you're writing multithread-safe code? Does exception safety affect class design, or can it be retrofitted in as an afterthought? …”
Libro electrónico -
38166Publicado 2017“…The pillar of memory safety is treated in depth as we explore the various pointer kinds. …”
Libro electrónico -
38167Publicado 2017“…We'll use Kotlin's basic programming concepts such as functions, lambdas, properties, object-oriented code, safety aspects, type parameterization, testing, and concurrency, which will guide you through writing Kotlin code into production. …”
Libro electrónico -
38168Publicado 2020“…Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. …”
Libro electrónico -
38169Publicado 2007“…Tactics and strategy: protecting Internet infrastructure from top to bottom Building more secure transport, messaging, identities, networks, platforms, and more Gaining safety without sacrificing the Internet’s unique power and value Making the Internet safer for honest people without sacrificing ubiquity, simplicity, or privacy Spam: draining the swamp, once and for all Why spam contributes to virtually every form of Internet crime–and what we can do about it Design for deployment: how to really make it happen Defining security objectives, architecture, strategy, and design–and evangelizing them How to Build a Safer, Better Internet You’ll find yourself deeply concerned, then fascinated, then hopeful as you read about • Building an Internet that resists online crime • Phishing, botnets, and spam: tactical, workable, immediate countermeasures • Establishing the “Accountable Web”: a strategic, long-term solution to Internet crime • Improving security without sacrificing what people love about the Internet The Internet is today’s Wild West: too much lawlessness, too little accountability. …”
Libro electrónico -
38170Publicado 2017“…Auf die Arbeit mit dem Bürosoftware-Paket LibreOffice geht er dabei besonders ein. Im weiteren Verlauf des praxisnahen Buches erhalten Sie wertvolle Informationen und Tipps in Sachen Multimedia, Mobilität, Datensicherung in der Cloud oder Sicherheit Ihres Systems. …”
Libro electrónico -
38171por Alger, Douglas“…A comprehensive guide to designing and operating reliable server environments Keep your data center cool, clean, scalable, and secure Learn the five principles of effective data center design Avoid the natural and man-made hazards that can jeopardize a data center site Learn how to lay out key infrastructure objects within the data center for greatest efficiency, from buffer zones to server rows Apply proven installation methods by studying sample illustrations of both overhead and under-floor systems Extract the best practices and design strategies for both in-room and standby electrical infrastructure Avoid accidental downtime, improve productivity, and ensure user safety Safeguard and streamline your network infrastructure with a well-organized physical hierarchy Understand the special challenges of retrofitting overburdened server environments Implement solutions from a wide array of sample illustrations and examples of essential data center signage Safeguard servers with operations standards for people working in or visiting the data center Download templates used by Cisco to design its data centers, customizable to square footage and geography Avoid excess construction costs by designing a data center that meets your needs today and for many years to come All data centers are unique, but they all share the same mission: to protect your company’s valuable information. …”
Publicado 2005
Libro electrónico -
38172Publicado 2013“…You'll discover breakthrough ways of changing the key behaviors that lead to greater safety, productivity, quality, and customer service. …”
Libro electrónico -
38173Publicado 2017Tabla de Contenidos: “…Cover -- Copyrights -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Beginning Your Kotlin Adventure -- Say hello to Kotlin -- Awesome Kotlin examples -- Dealing with Kotlin code -- Kotlin Playground -- Android Studio -- Configuring Kotlin for the project -- Using Kotlin in a new Android project -- Java to Kotlin converter (J2K) -- Alternative ways to run Kotlin code -- Kotlin under the hood -- The Kotlin standard library -- More reasons to use Kotlin -- Summary -- Chapter 2: Laying a Foundation -- Variables -- Type inference -- Strict null safety -- Safe call -- Elvis operator -- Not-null assertion -- The let function -- Nullability and Java -- Casts -- Safe/unsafe cast operator -- Smart casts -- Type smart casts -- Non-nullable smart cast -- Primitive data types -- Numbers -- Char -- Arrays -- The Boolean type -- Composite data types -- Strings -- String templates -- Ranges -- Collections -- Statements versus expressions -- Control flow -- The if statement -- The when expression -- Loops -- The for loop -- The while loop -- Other iterations -- Break and continue -- Exceptions -- The try... catch block -- Compile-time constants -- Delegates -- Summary -- Chapter 3: Playing with Functions -- Basic function declaration and usage -- Parameters -- Returning functions -- Vararg parameter -- Single-expression functions -- Tail-recursive functions -- Different ways of calling a function -- Default argument values -- Named arguments syntax -- Top-level functions -- Top-level functions under the hood -- Local functions -- Nothing return type -- Summary -- Chapter 4: Classes and Objects -- Classes -- Class declaration -- Properties -- Read-write versus read-only -- Property access syntax between Kotlin and Java -- Increment and decrement operators…”
Libro electrónico -
38174Publicado 2020“…Cyber Minds serves as a strategic briefing on cybersecurity and data safety, collecting expert insights from sector security leaders, including: General Gregory Touhill, former Federal Chief Information Security Officer of the United States Kevin L. …”
Libro electrónico -
38175Publicado 2018“…Highlights include: NS1 VP of architecture Shannon Weyrick on NS1's ground-up rewrite of its advanced DNS server software Computer safety researcher Kyle Kingsbury's (Jepsen) look at the Te..…”
-
38176Publicado 2017“…Coverage includes What IoT is and how it is transforming businesses Common IoT challenges, building blocks, and architectures Core IoT networking protocols, including the 802.15.4 and LPWA families Models for protecting security and integrity in IoT networks Simple, low-cost IoT networks for homes and small businesses IPv6 adaptations for low power and lossy IoT networks IoT management protocols, including CoAP, MQTT, and SCADA Moving processing to the edge and to the “fog” layer Using data analytics to maximize the value of IoT systems Analyzing IoT data with Hadoop, Kafka, Spark, and the Hadoop ecosystem Industry-specific techniques, smart objects, protocols, and analytic techniques IoT for utilities, the smart grid, and energy efficiency IoT for connected and self-driving cars, mass transit, and cargo transportation IoT for manufacturing: reducing cost and accelerating delivery IoT for smart and connected cities: lighting, parking, and public safety IoT for safer, more efficient oil/gas production and mining Skill Level All levels Learn How To Plan, organize, build, and deploy end-to-end IoT solutions Navigate today’s IoT product marketplace Use maturing IoT technologies to solve many business and technical problems Make sense of the full IoT protocol stack, from 802.15.4 and LPWA to IPv6 adaptations and management Archite..…”
-
38177Publicado 2007“…Coverage includes Using Apache Portable Runtime (APR) to streamline C development and avoid its pitfalls Leveraging Apache DBD to build applications far more scalable than classic LAMP software Working with the latest Apache 2.x features: filter modules, XML support, and smart proxies Mastering best practices, from thread safety to multi-platform development Utilizing the Apache Authentication Framework Tracing and debugging problems in both Apache and your custom modules Foreword Preface Acknowledgments About the Author Chapter 1 Applications Development with Apache Chapter 2 The Apache Platform and Architecture Chapter 3 The Apache Portable Runtime Chapter 4 Programming Techniqu..…”
Libro electrónico -
38178Publicado 2022“…But as AI applications grow, concerns have increased, too, including worries about applications that amplify existing biases in business practices and about the safety of self-driving vehicles. In Can We Trust AI?…”
Libro electrónico -
38179Publicado 2013“…You'll discover breakthrough ways of changing the key behaviors that lead to greater safety, productivity, quality, and customer service. …”
Grabación de sonido -
38180Publicado 2020“…The organization of the relevant debate is aligned around three pillars: Section A: Sustainable Smart City and Smart Village Research: Foundations - Clustering Smart City Services: Perceptions, Expectations, and Responses - Smart City Development and Residents' Well-Being - Analysis of Social Networking Service Data for Smart Urban Planning Section B: Sustainable Smart City and Smart Village Research: Case Studies on Rethinking Security, Safety, Well-being, and Happiness - Exploring a Stakeholder-Based Urban Densification and Greening Agenda for Rotterdam Inner City--Accelerating the Transition to a Liveable Low Carbon City - The Impact of the Comprehensive Rural Village Development Program on Rural Sustainability in Korea - Analyzing the Level of Accessibility of Public Urban Green Spaces to Different Socially Vulnerable Groups of People - Consumers' Preference and Factors Influencing Offal Consumption in the Amathole District Eastern Cape, South Africa - Sustainable Tourism: A Hidden Theory of the Cinematic Image? …”
Libro electrónico