Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Dieses essential vermittelt Denkmaleigentümern und ihren Auftragnehmern Grundlagen zur Erhaltung und Modernisierung von Denkmälern, zur Kommunikation mit Behörden und zur Antragstellung. Es beleuchtet die Themen Unterschutzstellung, Zumutbarkeit, Energieeffizienz und Klimaschutz. Und es gibt Hinweise zur Integration erneuerbarer Energien in den historischen Baubestand.
The Magnesium Technology Symposium at the TMS Annual Meeting & Exhibition is one of the largest yearly gatherings of magnesium specialists in the world. Papers represent all aspects of the field, ranging from primary production to applications and recycling. Moreover, papers explore everything from basic research findings to industrialization. Magnesium Technology 2024 is a definitive reference that covers a broad spectrum of current topics, including novel extraction techniques; primary production; alloys and their production; integrated computational materials engineering; thermodynamics and kinetics; plasticity mechanisms; cast products and processing; wrought products and processing; forming, joining, and machining; corrosion and surface finishing; fatigue and fracture; dynamic response; structural applications; degradation and biomedical applications; emerging applications; additive manufacturing of powders; and recycling, ecological issues, and life cycle analysis.
This collection presents papers from a symposium on extraction of rare metals from primary and secondary materials and residues as well as rare extraction processing techniques used in metal production. The collection covers the extraction of less common or minor metals including elements such as antimony, bismuth, barium, beryllium, boron, calcium, chromium, gallium, germanium, hafnium, indium, manganese, molybdenum, platinum group metals, rare earth metals, rhenium, scandium, selenium, sodium, strontium, tantalum, tellurium, and tungsten. It also includes rare metals of low-tonnage sales compared to high-tonnage metals (iron, copper, nickel, lead, tin, zinc, or light metals such as aluminum, magnesium, or titanium and electronic metalloid silicon). Rare metal processing covers bio-metallurgy, hydro-metallurgy, and electro-metallurgy while novel high-temperature processes such as microwave heating, solar-thermal reaction synthesis, and cold crucible synthesis of rare metals are also addressed. Also included in this collection is the design of extraction equipment used in these processes from suppliers as well as laboratory and pilot plant studies.
This book gathers the thoughts of 8 hospital presidents, 9 vice presidents focusing on construction management in hospitals, and 6 hospital architects regarding the hospital design and construction in China. These experts are from top hospitals in Beijing, Shanghai, Zhenjiang, Gansu, Shangdong, Sichuang, and Neimenggu Province and have an average of 21 years of experience managing and developing hospitals in China. The book shares their thoughts on the soul of a hospital, the history and standards of Chinese healthcare systems, and the development of environments for healthcare in China.
This volume presents a compilation of research works in civil engineering. All manuscripts in this volume were presented during the 2nd International Conference on Architecture and Civil Engineering (ICACE 2018) which was held at Parkroyal Hotel, Penang, Malaysia on 09-10 May 2018. The editor(s) of the proceeding would like to express the utmost gratitude and thanks to all reviewers in the technical team for making this volume a success.
This book highlights the basic theories and technical principles of the synthetic aperture radar (SAR), aiming to bridge theories and applications for readers. Supported by the practical experience of the author's dedicated research, this book also constructs the SAR theoretical system from multiple perspectives.The synthetic aperture radar (SAR) is a weather-independent microwave remote sensing device that involves a number of multidisciplinary fields such as signal processing and image information processing. Written by experts in remote sensing and signal processing, the book explains the signal echo modeling, imaging principles and algorithms, image quality control methods, and image applications. Readers are provided with concise descriptions of commonly used imaging algorithms for SAR in multiple regimes, modes, and applications, including the Range Doppler Algorithm (RDA) and the Frequency Scaling Algorithm (FSA). Continuous wave/pulse regime SAR technology, inverse synthetic aperture radar (ISAR) technology, digital beam forming (DBF), interferometry, and moving target detection methods are discussed in detail.The book is a must-read and comprehensive reference for researchers and engineers engaged in the R&D of the SAR and for graduate students interested in the field.
Essentials of Digital Construction is a concise practical reference to help professionals and companies navigate the key issues and accelerate the process of implementing digital construction.
Recent Developments and Innovations in the Sustainable Production of Concrete covers the various aspects of sources, materials, and waste products in concrete production, innovation in materials-new technological developments, and the upgradation of existing concrete production systems. Importantly, it covers the so-called EEE aspects (Economy, Energy, and Environment), not touched by other books. The books also highlights the sustainability aspects of concrete production when recycled materials are added. Case studies are used to demonstrate the practical aspect of concrete production, including the machine learning approach.
La 'piera da l'aga' (pietra dell'acqua) di Ciago di Meduno (PN) è la base pressoria di un torchio vinario di epoca romana - una leggenda popolare vuole che il grosso monolite giacesse un tempo in mezzo al prato e che, spostato tramite l'aiuto di una coppia di buoi, fosse ritrovato il giorno seguente al posto di partenza. Solo in seguito ad un nuovo tentativo il masso ri¬mase nella nuova collocazione.Una seconda leggenda racconta, invece, che Ciago è stata in passato una "grande città", protetta dai quattro castelli di Meduno, Toppo, Cavasso e Solimbergo. La credenza è stata originata dal frequente ritrovamento, nella pianura ad Ovest e a Sud del borgo, di fondamenta di antiche case e dei resti di numerose tombe di epoca romana.Una vecchia consuetudine locale voleva che l'acqua piovana raccoltasi nelle quattro coppelle fosse benefica alla vista; veniva perciò toc¬cata dalle contadine di passaggio prima di fare il segno della croce, mentre mormoravano una preghiera.
2024 Edition.The Interagency Standards for Fire and Fire Aviation Operations provides fire and fire aviation program management direction for BLM, USFS, FWS, NPS, and BIA managers. Employees engaged in fire management activities will continue to comply with all agency policies. The Interagency Standards for Fire and Fire Aviation Operations states, references, or supplements policy for Bureau of Land Management (BLM), U.S. Forest Service (USFS), U.S. Fish and Wildlife Service (FWS), National Park Service (NPS), and Bureau of Indian Affairs (BIA) fire and fire aviation program management. Original source policy is stated or referenced throughout this handbook. This handbook attempts to reference policy, rather than paraphrase policy to limit duplication.
This book presents papers submitted at 32nd International Conference on Organization and Technology of Maintenance (OTO 2023) held on December 12, 2023, at Osijek, Republic of Croatia.The objective of this conference is to promote, standardize, and support efforts to gain new knowledge in areas that are intimately tied to technical and social systems and where maintenance of any kind is of utmost importance. By bringing together experts from various fields, this conference aims to foster collaboration and the exchange of ideas, ultimately leading to advancements in both technical and social systems. Additionally, it seeks to create a platform for discussing best practices and innovative approaches in maintenance, ensuring the sustainability and efficiency of these systems in the long run. Furthermore, the upkeep of technological and social systems, along with their accessibility and dependability, significantly influences the long-term sustainability and economic feasibility of their functioning. Periodic and condition-based maintenance are integral components of the various systems, influencing their operational efforts and outcomes. By providing a space for professionals to exchange ideas and experiences, this platform facilitates the identification and implementation of cutting-edge maintenance strategies. Moreover, it recognizes the importance of addressing emerging challenges such as digitalization and environmental impact in order to ensure the continued effectiveness of these systems.Conference topics will address maintenance challenges in the areas of machine design, maintenance technologies in general, organization and management of maintenance proposals and procedures, quality management in system maintenance, information systems, product life cycle management, design for maintainability, material and structural properties, diagnosis and prediction of failures and breakdowns, design optimization for maintenance, analysis of maintenanceefficiency and cost-effectiveness, civil, mechanical and electrical engineering, etc.
This volume gathers the latest advances, innovations, and applications in the field of wind engineering, as presented by leading international researchers and engineers at the XVII Conference of the Italian Association for Wind Engineering (IN-VENTO), held in Milan, Italy on September 4¿7, 2022. It covers highly diverse topics, including aeroelasticity, bluff-body aerodynamics, boundary layer wind tunnel testing, computational wind engineering, structural dynamics and reliability, wind-structure interaction, flow-induced vibrations, wind modeling and forecast, wind disaster mitigation, and wind climate assessment. The contributions, which were selected by means of a rigorous international peer-review process, highlight numerous exciting ideas that will spur novel research directions and foster multidisciplinary collaboration among different specialists.
Die Welt des Stahls ist erstaunlich vielfältig und so komplex, dass sie in der Praxis nicht leicht zu überblicken ist. In Form von essentials zu Porträts von ausgewählten Stählen und Stahlgruppen soll dem Leser diese Welt des Stahls nähergebracht werden; kompakt, verständlich, informativ, strukturiert mit Beispielen aus der Praxis und geeignet zum Nachschlagen.Die nichtrostenden martensitischen Stähle aus der Gruppe der rost-, säure- und hitzebeständigen Stähle bieten eine ausgezeichnete Kombination aus hoher Festigkeit und Härte bei guter Korrosionsbeständigkeit; und diese Kombination kann durch den Wärmebehandlungsprozess Vergüten den unterschiedlichen Anforderungen bei der Anwendung angepasst werden. Wissenswertes über diese Stähle fast dieses essential zusammen.
This book provides the latest research and technology advances in building fire safety and smart firefighting. Different experts systemically review the application of new technologies like Artificial Intelligence, Internet of Things, Virtual Reality, Digitalization, and Metaverse in fire safety areas. These multi-disciplinary research and technology fusion will significantly change the fire resilience design and firefighting practices in the next 20 years. Achieving urban fire safety and resilience also plays a key role in developing future smart buildings and cities. This book attracts more young researchers into the latest multi-disciplinary fire safety research and promotes the application of the new technologies in firefighting.
Mit Gebäudeautomation lassen sich Komfort und Sicherheit eines Gebäudes steigern. Dazu kommt das Potenzial, die Energieeffizienz der Immobilie zu erhöhen, was wirschaftliche Vorteile bei der Bewirtschaftung mit sich bringt. Diese Publikation untersucht verschiedene Smart-Home Technologien im Hinblick auf die Senkung der Energiekosten und vergleicht den ökonomischen Nutzen zwischen Wirtschafts- und Wohnimmobilien. Dabei werden die Anwendungsfelder Beleuchtung, Klimatisierung und Beschattung analysiert und bewertet.
"Introduction to Lockpicking" by Black Hat Kathy is a comprehensive guide that explores the art of non-destructive entry, providing historical context, essential tools, techniques, and advanced applications. It delves into the legal and ethical perspectives of lockpicking, offers insights into locksmithing as a profession, explores lockpicking in popular culture, and provides resources for hobbyists. Whether you're a locksmith, hobbyist, or simply interested in the subject, this book offers valuable knowledge and practical skills to enhance your understanding of lockpicking.
This book describes the most recent strategies for the digitalization of railway sector that bring new challenges for the construction, operation, and maintenance of railway infrastructures. These strategies involve the development and application of new technologies and methodologies to enhance the sustainability and resilience of railway infrastructures particularly under extreme climate and operational events. In particular, the digital transformation involves the use of digital twins, augmented and virtual reality, forecast capabilities, risk and life-cycle analysis, cybersecurity, unmanned technologies for monitoring and inspection, computer vision, AI, risk and disaster management, among others. Presently, the literature is lacking a contribution that provides general and foundational knowledge across these and other topics. Therefore, this book provides valuable information for researchers, students, and professionals in railway engineering that want to developtheir knowledge and skills in this field.
Unlock the Power of Advanced OSINT StrategiesWelcome to the "Advanced OSINT Strategies" book bundle - your ultimate guide to mastering Online Investigations and Intelligence Gathering. This comprehensive collection spans four volumes, each tailored to take you from a beginner's foundation to expert-level proficiency in the exciting world of open-source intelligence.¿¿¿¿ BOOK 1 - Foundations of OSINT Mastery: A Beginner's Guide Discover the essentials of OSINT as you embark on this enlightening journey. Explore digital landscapes, decode digital footprints, and harness the vast range of open-source information. This volume equips you with internet search techniques, social media investigation skills, and the ability to analyze websites and extract valuable data. Ethics and privacy considerations are also emphasized to ensure responsible and ethical OSINT practices.¿¿¿¿ BOOK 2 - Navigating the Digital Shadows: Intermediate OSINT Techniques Take your skills to the next level with advanced search queries, deep web and dark web investigations, and geospatial intelligence mastery. Dive deep into social media analysis, email tracing, and open-source analysis tools. This volume also guides you towards automating your OSINT workflows and becoming proficient in cyber threat intelligence.¿¿¿¿ BOOK 3 - Advanced OSINT Arsenal: Expert-Level Intelligence Gathering Elevate your expertise with this advanced volume. Analyze cryptocurrencies and blockchain, exploit IoT devices for intelligence, and employ advanced data scraping and automation techniques. Real-world intelligence operations and the synergy of ethical hacking with OSINT are explored in depth, making you an expert in the field.¿¿¿¿ BOOK 4 - Mastering OSINT Investigations: Cutting-Edge Strategies and Tools In the final volume, delve into cutting-edge strategies and tools that give you an edge in OSINT investigations. Explore the potential of big data, artificial intelligence, and quantum computing in OSINT. Navigate hidden markets and forums, track cryptocurrencies on the dark web, and master advanced geospatial analysis techniques. Complete your journey with IoT vulnerability assessment and data collection and analysis, equipping you with the latest tools and strategies.With "Advanced OSINT Strategies," you'll become a formidable force in the world of online investigations and intelligence gathering. Unlock the power of information, uncover hidden truths, and make informed decisions. Begin your journey to OSINT mastery today!¿¿¿¿ Get the entire bundle now and take your OSINT skills to the next level. Don't miss out on this opportunity to become an expert in Online Investigations and Intelligence Gathering.
This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security. It draws insights from a range of diverse fields, including Computer Science, Social Science, Political Science, International Relations, Criminology, and Law. Furthermore, the book investigates the field of Artificial Intelligence (AI) and related technologies, exploring their dual role in this dynamic landscape of contemporary cyberthreats, with both constructive and malicious implications.The book comprises four distinct themes, with each theme represented by a dedicated Part. Within this organisational framework, each overarching theme is systematically explored through a series of chapters, providing readers with a clear and thematic roadmap for their journey through the content.Part I, Understanding Terrorism and Counter-Terrorism Strategies, of the book explores complexities surrounding contemporary global security challenges. It serves as the foundational segment of the book, consisting of three chapters that critically analyse various dimensions of terrorism and the strategies implemented to combat it.Part II, Cyberterrorism Landscape, of the book offers an in-depth assessment of the current cyberterrorism landscape. This section comprises two critical chapters, each contributing to a comprehensive understanding of the contemporary threats posed by cyberterrorism and their implications for national security.Part III, Countering Cyberterrorism with Technology, of the book forms the core of the book's exploration into leveraging technology to mitigate the threats of cyberterrorism. This section includes four critical chapters, collectively providing an in-depth understanding of the intersection between technology and counterterrorism strategies.Part IV, Artificial Intelligence and National and International Security, of the book delves into the complex relationship between AI technology and the broader security landscape. Comprising three pivotal chapters, this section provides a detailed understanding of AI's transformative role in shaping the future of national and international security.
Introducing the "OSINT Hacker's Arsenal" Book Bundle!Unlock the Power of Open Source Intelligence (OSINT) with our comprehensive book bundle, carefully crafted to take you from a novice to a seasoned OSINT professional. With a combined wealth of knowledge from four unique volumes, this bundle covers essential OSINT tools and techniques that will empower you to navigate the digital world with confidence.BOOK 1 - OSINT Hacker's Arsenal: Unveiling the Essentials Dive headfirst into the fundamentals of OSINT with this essential guide. Explore the key concepts and core tools such as Metagoofil, theHarvester, Mitaka, and BuiltWith that form the foundation of OSINT practice. Whether you're a beginner or seeking to refresh your knowledge, this volume equips you with the essentials to kickstart your OSINT journey.BOOK 2 - Mastering OSINT: Advanced Techniques with Mitaka Elevate your OSINT skills with advanced techniques using Mitaka, a powerful automation and integration platform. Customize your workflows, automate tasks, and seamlessly integrate OSINT tools. Master Mitaka's capabilities and discover best practices to conduct in-depth investigations like a pro.BOOK 3 - Expert OSINT Strategies: Harnessing BuiltWith for Profound Insights Delve into the world of BuiltWith, a versatile tool for profiling website technologies. This volume unlocks the potential of BuiltWith, enabling you to extract hidden insights, perform competitive analysis, and excel in corporate investigations. Gain a competitive edge with advanced OSINT strategies and profound insights.BOOK 4 - The Ultimate OSINT Handbook: From Novice to Pro with Comprehensive Toolkits Embark on a comprehensive OSINT journey, from novice to professional. This ultimate handbook arms you with comprehensive toolkits, legal and ethical considerations, and real-world case studies. Understand the responsibilities that come with OSINT expertise and learn how to apply your skills in real-life scenarios.Whether you're an aspiring OSINT enthusiast, a cybersecurity professional, or someone curious about the world of open-source intelligence, the "OSINT Hacker's Arsenal" book bundle is your gateway to mastering this essential skill set. Harness the power of Metagoofil, theHarvester, Mitaka, and BuiltWith as you explore the depths of OSINT knowledge and practice.Don't miss out on this opportunity to enhance your digital investigation skills and uncover the secrets hidden in the digital realm. Purchase the "OSINT Hacker's Arsenal" book bundle today and take your OSINT expertise to the next level!
This book presents the select proceedings of the 3rd International Conference on Structural Health Monitoring & Engineering Structures (SHM&ES 2023). It covers the recent advances in the fields related to structural health monitoring, damage detection and assessment, non-destructive testing, inverse problems, optimization, artificial neural networks, and evaluation. This book is useful for researchers and professionals working in the field of health monitoring of engineering structures.
This book presents recent research on risk management in the construction industry. It consists of eight chapters, each of which contains valuable information on specified areas of risk management engineering. Topics addressed include identifying, analyzing, assessing, controlling, and monitoring risk for planning and construction stages; risk management methods used in the construction industry and case studies; risk management for buildings, dams, highways, railways, nuclear power plants, underground structures, energy facilities, and their appurtenant structures. This book provides a comprehensive overview of the latest information in risk management in the construction industry.
This book examines multimodality in architecture and its impacts on collaborative, technical and educational processes or systems. Multimodality is becoming increasingly critical in contemporary architectural practice and education. Creative design teams face new challenges when they embrace new modes of communication, technology, and knowledge development processes. From diverse online modes of communication to shared digital environments, generative AI and advanced hardware solutions, new modes of information creation, sharing, and application are changing the ways architects and designers work.The book presents new research which empowers international researchers and designers to work more effectively in a diverse range of digital environments.Whether the readers are architects, teachers, students, or scholars, this book provides critical insights and practical tools for understanding and optimising processes in architecture and design.
¿¿¿¿ Discover the Ultimate Web Application Security Book Bundle: OWASP Top 10 VulnerabilitiesAre you ready to fortify your web applications against the ever-evolving threats of the digital world? Dive into the "OWASP Top 10 Vulnerabilities" book bundle, a comprehensive collection of four distinct books tailored to meet the needs of both beginners and experts in web application security.¿¿¿¿ Book 1 - Web Application Security 101: A Beginner's Guide to OWASP Top 10 Vulnerabilities· Perfect for beginners, this book provides a solid foundation in web application security. Demystify the OWASP Top 10 vulnerabilities and learn the essentials to safeguard your applications.¿¿¿¿ Book 2 - Mastering OWASP Top 10: A Comprehensive Guide to Web Application Security· Whether you're an intermediate learner or a seasoned professional, this book is your key to mastering the intricacies of the OWASP Top 10 vulnerabilities. Strengthen your skills and protect your applications effectively.¿¿¿¿ Book 3 - Advanced Web Application Security: Beyond the OWASP Top 10· Ready to go beyond the basics? Explore advanced security concepts, emerging threats, and in-depth mitigation strategies in this book designed for those who crave deeper knowledge.¿¿¿¿ Book 4 - The Ultimate OWASP Top 10 Handbook: Expert Insights and Mitigation Strategies· Dive into the wisdom and experiences of industry experts. Bridge the gap between theory and practice with real-world strategies, making you a true security champion.¿¿¿¿¿ Why Choose the OWASP Top 10 Vulnerabilities Book Bundle?· Comprehensive Coverage: From beginners to experts, this bundle caters to all skill levels.· Real-World Strategies: Learn from industry experts and apply their insights to your projects.· Stay Ahead: Keep up with evolving threats and protect your web applications effectively.· Ultimate Knowledge: Master the OWASP Top 10 vulnerabilities and advanced security concepts.Don't miss out on this opportunity to become a guardian of the digital realm. Invest in the "OWASP Top 10 Vulnerabilities" book bundle today, and take the first step toward securing your web applications comprehensively.¿¿¿¿ Get Your Bundle Now! ¿¿¿¿
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.