This SpringerBrief offers careful assessments of the appropriateness and effectiveness of currently available methodologies for fire flow. It explains the water supply requirements for firefighting including rate of flow, the residual pressure required at that flow, and the duration that is necessary to control a major fire in a specific structure. First reviewing existing fire flow calculation…
This book details how safety (i.e. the absence of unacceptable risks) is ensured in areas where potentially explosive atmospheres (ATEX) can arise. The book also offers readers essential information on how to comply with the newest (April 2016) EU legislation when the presence of ATEX cannot be avoided. By presenting general guidance on issues arising out of the EU ATEX legislation – espec…
The current volume provides examples of how environmental hazards such as landslides, earthquakes, mountain processes, cold climate processes and tidal flows and currents can affect the energy supply infrastructure. In times of uncertainty, the security of the European cross-border energy supply infrastructure, such as pipelines, has great importance. Whilst the potential effects of political d…
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp t…
Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity pro…
This volume contains a selection of the best papers presented at the 8th International Conference on Industrial Engineering and Industrial Management, XX International Conference on Industrial Engineering and Operations Management, and International IIE Conference 2014, hosted by ADINGOR, ABEPRO and the IIE, whose mission is to promote links between researchers and practitioners from different…
Demonstrating the latest research and analysis in the area of through-life engineering services (TES), this book utilizes case studies and expert analysis from an international array of practitioners and researchers – who together represent multiple manufacturing sectors: aerospace, railway and automotive – to maximize reader insights into the field of through-life engineering services. …
The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concu…
The topics discussed at the NATO Advanced Research Workshop “Nanotechnology in the Security Systems" included nanophysics, nanotechnology, nanomaterials, sensors, biosensors security systems, explosive detection. There have been many significant advances in the past two years and some entirely new directions of research are just opening up. Recent advances in nano science have demonstrated th…
This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; appl…