Vores kunder ligger øverst på Google

Google Ads Specialister fra Vestjylland

Vi er 100% dedikerede til Google Annoncering – Vi har mange års erfaring med Google Ads og den bruger vi på at opsætte, optimere & vedligeholde vores fantastiske kunders konti.

100% Specialiseret i Google Ads
Vi har mange års erfaring fra +300 konti
Ingen lange bindinger & evighedskontrakter
Jævnlig opfølgning med hver enkelt kunde
Vi tager din virksomhed seriøst

23 results (0,20140 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Advanced Structural Analysis with MATLAB

Geologic Hazards A Field Guide for Geotechnical Engineers

Geologic Hazards A Field Guide for Geotechnical Engineers

Geologic hazards pose the greatest threat to human safety for any geotechnical undertaking but it is ultimately the engineer's ability to recognize and cope with these hazards that will determine the safety of life and property. Armed with Geologic Hazards: A Field Guide for Geotechnical Engineers you will be able to properly recognize understand various geologic hazards and provide safe and economical construction. Eminent expert Roy E. Hunt thoroughly examines the potential for slope failures earthquakes ground subsidence collapse and expansion. Using a clear conceptual approach he explains what measures are available to minimize or eliminate the risks associated with each of these geologic hazards. The book sets forth the basis for recognizing understanding and treating geologic hazards using general concepts rather than rigorous mathematical analyses. The author covers the prediction of slope failures through recognition of geologic and other factors that govern failure the treatment of slopes that are potentially unstable and pose a danger to some existing development the design and construction of stable cut slopes and sidehill fills and the stabilization of failed slopes. He provides the foundation for determining the potential for surface movements and for preventing or controlling their effects. A section on earthquakes summarizes and links all of the aspects of earthquakes including their causes characteristics and surface effects. It provides a thorough grounding in how to recognize hazard potential and minimize the consequences. There is no field within geotechnical engineering in which the state of the art is changing so rapidly. Providing the latest information this resource is a useful tool for designing new projects and redesigning old ones. | Geologic Hazards A Field Guide for Geotechnical Engineers

GBP 59.99
1

Computational Electromagnetics with MATLAB Fourth Edition

Geosynthetic Clay Liners for Waste Containment Facilities

Explosives and Chemical Weapons Identification

Handbook of Chemical and Biological Warfare Agents Volume 2 Nonlethal Chemical Agents and Biological Warfare Agents

Handbook of Chemical and Biological Warfare Agents Volume 2 Nonlethal Chemical Agents and Biological Warfare Agents

The Handbook of Chemical and Biological Warfare Agents Volume 2: Pathogens Mid-Spectrum and Incapacitating Agents Third Edition provides rapid access to key data to response professionals and decision-makers on a broad range of agents and pathogens. This volume presents information on a wide range of chemical and biological agents. Chemical agents detailed in this volume are those that were developed specifically for their non-lethal potential. The biological agents described are militarily significant pathogens that could be weaponized to pose a threat to people animals or crops and other agricultural interests. Mid-spectrum agents materials that do not fit clearly into either the Chemical or the Biological Weapons Conventions include toxins and bioregulators. Entomological agents the final class of agents discussed in volume are arthropods that could pose a significant threat to a country’s agriculture infrastructure and be used to devastate its economy. They were proposed for inclusion in the Biological Weapons Convention but never adopted. In addition to a discussion of each of these classes of agents coverage includes detailed information on a broad spectrum of individual agents that have been used on the battlefield stockpiled as weapons used or threatened to be used by terrorists or have been otherwise assessed by qualified law enforcement and response organizations and determined to be agents of significant concern. The information presented in this edition has been updated and expanded to contain more information on toxicology health effects presentation of diseases advances in medical care and treatment as well as protective actions needed at the scene of an incident. Key Features: Focuses on the key information needed during an emergency response Provides updated toxicology exposure hazards physical-chemical data and treatment of casualties Profiles the presentation of diseases in people animals and plants Presents updated protective action distances decontamination and remediation information All data compiled is gathered from numerous sources and arranged into the current easy-to-access format. In order to ensure accuracy all data has been cross-checked over the widest variety of military scientific and medical sources available. The Handbook of Chemical and Biological Warfare Agents Volume 2: Pathogens Mid-Spectrum and Incapacitating Agents Third Edition remains the gold-standard reference detailing the widest variety of military scientific and medical sources available. | Handbook of Chemical and Biological Warfare Agents Volume 2 Nonlethal Chemical Agents and Biological Warfare Agents

GBP 64.99
1

Particulate Plastics in Terrestrial and Aquatic Environments

Critical Infrastructure Homeland Security and Emergency Preparedness Fourth Edition

Critical Infrastructure Homeland Security and Emergency Preparedness Fourth Edition

This edition of Critical Infrastructure presents a culmination of ongoing research and real-work experience building upon previous editions. Since the first edition of this work the domain has seen significant evolutions in terms of operational needs environmental challenges and threats – both emerging and evolving. This work expands upon the previous works and maintains its focus on those efforts vital to securing the safety and security of populations. The world continues to see a shift from a force-protection model to one more focused on resilience. This process has been exacerbated and challenged as societies face increased instability in weather and arguably climate a destabilized geopolitical situation and continuing economic instability. Various levels—ranging from international oversight to individual actions—continue to work towards new approaches and tools that can assist in meeting this challenge. This work keeps pace with the key changes that have occurred since previous editions and continues to provide insight into emerging and potential issues. Expanding from historical research major areas of interest such as climate change regulatory oversight and internal capacity building are explored. This work provides a reference for those that are working to prepare themselves and their organizations for challenges likely to arise over the next decade. In keeping with the fast-changing nature of this field Critical Infrastructure: Homeland Security and Emergency Preparedness Fourth Edition has been completely revised and fully updated to reflect this shift in focus and to incorporate the latest developments. Presents an overview of some of the emerging challenges and conflicts between the public and private sector;Continues to build the case for organizations to adopt an intelligence-driven and adaptive approach to protecting infrastructure;Presents a unique and new perspective of re-examining baseline requirements against a range of shifting factors taking a balanced approach between risk-based planning and consequence management;Expands upon the issue of internal and lone-wolf threats that pose additional challenges to a system that continues to focus largely on external threats; andAn enhanced and improved view of interdependencies in an increasingly inter-connected and network-enabled world. Preparing for the challenges of increasingly unstable threat and operating environments will pose challenges at all levels. Those involved in ensuring that critical infrastructure protection and assurance efforts function effectively and efficiently—whether as government regulators business operators clients of various infrastructure sectors or those seeking to maintain an accountable system – will find insights into less-explored aspects of this challenging field. | Critical Infrastructure Homeland Security and Emergency Preparedness Fourth Edition

GBP 56.99
1

Pests of Fruit Crops A Colour Handbook Second Edition

Neutrino Physics

Neutrino Physics

When Kai Zuber’s pioneering text on neutrinos was published in 2003 the author correctly predicted that the field would see tremendous growth in the immediate future. In that book Professor Zuber provided a comprehensive self-contained examination of neutrinos covering their research history and theory as well as their application to particle physics astrophysics nuclear physics and the broad reach of cosmology; but now to be truly comprehensive and accurate the field’s seminal reference needs to be revised and expanded to include the latest research conclusions and implications. Revised as needed to be equal to the research of today Neutrino Physics Third Edition delves into neutrino cross-sections mass measurements double beta decay solar neutrinos neutrinos from supernovae and high-energy neutrinos as well as entirely new experimental results in the context of theoretical models. Written to be accessible to graduate students and readers from diverse backgrounds this edition like the first provides both an introduction to the field as well as the information needed by those looking to make their own contributions to it. And like the second edition it whets the researcher’s appetite going beyond certainty to pose those questions that still need answers. Features Presents the only single-author comprehensive text on neutrino physics Includes experimental and theoretical particle physics and examines solar neutrinos and astroparticle implications Offers details on new developments and recent experiments

GBP 38.99
1

Morphodynamics

Morphodynamics

Morphodynamics is defined as the unique interaction among environment functional morphology developmental constraints phylogeny and time—all of which shape the evolution of life. These fabricational patterns and similarities owe their regularity not to a detailed genetic program but to extrinsic factors which may be mechanical chemical or biological in nature. These self-organizing mechanisms are the focus of Morphodynamics. Illustrated by numerous examples from across the biological spectrum this book embodies the foundation of noted paleontologist Adolf Seilacher’s thinking on the study of morphodynamics. It represents his unique approach of presenting paleontology from an ecological and constructional perspective rather than a purely taxonomic one. The hallmark of Seilacher’s storied career has been a constructional and functional focus. He begins by discussing the basic principles—form pattern formation ecology and evolution as well as the factors that override those processes. Next he examines how morphodynamic principles are implemented in various invertebrates including single-celled protists Ediacarans sponges coelenterates shelled organisms worms arthropods and echinoderms. The final chapter explores how morphogenetic principles may apply to clonal colonial organisms. Summarizing seventy years of research into the interactions of form function and evolution the book is copiously illustrated with the author’s own distinctive drawings and an abundance of photos. It provides a framework for readers to pose their own questions and sharpen their interpretive skills on this fascinating topic.

GBP 44.99
1

Mechanical Design and Manufacturing of Electric Motors

Mechanical Design and Manufacturing of Electric Motors

This Second Edition of Mechanical Design and Manufacturing of Electric Motors provides in-depth knowledge of design methods and developments of electric motors in the context of rapid increases in energy consumption and emphasis on environmental protection alongside new technology in 3D printing robots nanotechnology and digital techniques and the challenges these pose to the motor industry. From motor classification and design of motor components to model setup and material and bearing selections this comprehensive text covers the fundamentals of practical design and design-related issues modeling and simulation engineering analysis manufacturing processes testing procedures and performance characteristics of electric motors today. This Second Edition adds three brand new chapters on motor breaks motor sensors and power transmission and gearing systems. Using a practical approach with a focus on innovative design and applications the book contains a thorough discussion of major components and subsystems such as rotors shafts stators and frames alongside various cooling techniques including natural and forced air direct- and indirect-liquid phase change and other newly-emerged innovative cooling methods. It also analyzes the calculation of motor power losses motor vibration and acoustic noise issues and presents engineering analysis methods and case-study results. While suitable for motor engineers designers manufacturers and end users the book will also be of interest to maintenance personnel undergraduate and graduate students and academic researchers.

GBP 160.00
1

FRP-Strengthened Metallic Structures

FRP-Strengthened Metallic Structures

Repairing or strengthening failing metallic structures traditionally involves using bulky and heavy external steel plates that often pose their own problems. The plates are generally prone to corrosion and overall fatigue. Fiber-reinforced polymer (FRP) a composite material made of a polymer matrix reinforced with fibers offers a great alternative for strengthening metallic structures especially steel structures such as bridges buildings offshore platforms pipelines and crane structures. FRP-Strengthened Metallic Structures explores the behaviour and design of these structures from basic concepts to design recommendations. It covers bond behaviour between FRP and steel and describes improvement of fatigue performance bending compression and bearing forces strengthening of compression and steel tubular members strengthening for enhanced fatigue and seismic performance and strengthening against web crippling of steel sections. It also provides examples of performance improvement by FRP strengthening. • Summarizes worldwide research on the FRP strengthening of metallic structures • Contains several topics not generally covered in existing texts • Presents comprehensive topical references throughout the book The book outlines the applications existing design guidance and special characteristics of FRP composites within the context of their use in structural strengthening. While the major focus is on steel structures it also describes others such as aluminium structures. This book is suitable for structural engineers researchers and university students interested in the FRP strengthening technique. Xiao-Ling Zhao is chair of structural engineering at Monash University Australia and is author of Concrete-Filled Tubular Members and Connections also published by Taylor & Francis.

GBP 74.99
1

MEMS Fundamental Technology and Applications

MEMS Fundamental Technology and Applications

The microelectromechanical systems (MEMS) industry has experienced explosive growth over the last decade. Applications range from accelerometers and gyroscopes used in automotive safety to high-precision on-chip integrated oscillators for reference generation and mobile phones. MEMS: Fundamental Technology and Applications brings together groundbreaking research in MEMS technology and explores an eclectic set of novel applications enabled by the technology. The book features contributions by top experts from industry and academia from around the world. The contributors explain the theoretical background and supply practical insights on applying the technology. From the historical evolution of nano micro systems to recent trends they delve into topics including: Thin-film integrated passives as an alternative to discrete passives The possibility of piezoelectric MEMS Solutions for MEMS gyroscopes Advanced interconnect technologies Ambient energy harvesting Bulk acoustic wave resonators Ultrasonic receiver arrays using MEMS sensors Optical MEMS-based spectrometers The integration of MEMS resonators with conventional circuitry A wearable inertial and magnetic MEMS sensor assembly to estimate rigid body movement patterns Wireless microactuators to enable implantable MEMS devices for drug delivery MEMS technologies for tactile sensing and actuation in robotics MEMS-based micro hot-plate devices Inertial measurement units with integrated wireless circuitry to enable convenient continuous monitoring Sensors using passive acousto-electric devices in wired and wireless systems Throughout the contributors identify challenges and pose questions that need to be resolved paving the way for new applications. Offering a wide view of the MEMS landscape this is an invaluable resource for anyone working to develop and commercialize MEMS applications. | MEMS Fundamental Technology and Applications

GBP 74.99
1

Physical Security and Environmental Protection

Physical Security and Environmental Protection

Manage a Hazard or Threat Effectively and Prevent It from Becoming a Disaster When disaster strikes it can present challenges to those caught off guard leaving them to cope with the fallout. Adopting a risk management approach to addressing threats vulnerability and risk assessments is critical to those on the frontline. Developed with first responders at the municipal state provincial and federal level in mind Physical Security and Environmental Protection guides readers through the various phases of disaster management including prevention mitigation preparedness response and recovery. It contains the steps and principles essential to effectively managing a hazard or threat preventing it from becoming a disaster. From the Initial Threat Assessment to Response and Recovery Operations Considering both natural and manmade disasters this text includes sections on hazard analysis emergency planning effective communication and leadership. It covers threat assessment examines critical infrastructure protection and addresses violent behavior. The text also outlines protection strategies; discussing strategy management identifying suspicious behavior and detailing how to avoid a potential attack. The text includes an overview on developing force protection plans security plans and business continuity plans. The book also addresses response and recovery operations explores post-incident stress management and poses the following questions: What hazards exist in or near the community? How frequently do these hazards occur? How much damage can they cause? Which hazards pose the greatest threat? This text includes the tools and information necessary to help readers develop business continuity force protection and emergency preparedness plans for their own group or organization.

GBP 77.99
1

Industrial Hygiene Improving Worker Health through an Operational Risk Approach

Industrial Hygiene Improving Worker Health through an Operational Risk Approach

Over the past forty years the Industrial Hygiene profession has significantly grown and is expected to continue to grow as workplaces evolve in the development management and usage of hazardous materials. This growth in the profession is also related to the shift in public knowledge and perception regarding the acceptance of the health risk from activities performed at work and home. As time progresses workplaces are being regulated to not only minimize the health imparts to the workforce but also decrease the likelihood of negatively impacting the environment. Society has become more educated on the potential impacts on human health and the environment that hazardous materials activities and environments can pose. As such there has been a noticeable decrease in the acceptance of risk by workers and the public. The accepted standard of performance for Industrial Hygiene has grown beyond compliance but now also focuses on improving existing processes and practices to create a workplace free from work related injury and illness. Features: Shows application of risk mitigating techniques for industrial hygienists Explains the definition of risk and how it applies to health and safety management Defines the need for quality data management and continuous improvement in assessments Describes the role of the Industrial Hygienist and risk management when responding to emergencies Industrial Hygiene: Improving Worker Health through an Operational Risk Approach focuses on the implementation of Industrial Hygiene using a risk-based approach in an operational environment. The approaches and methods described in this book are designed to assist the Industrial Hygienist in managing workplace risks including risks associated with anticipation recognition evaluation and hazard control processes. | Industrial Hygiene Improving Worker Health through an Operational Risk Approach

GBP 94.99
1

Crime Scene Staging Dynamics in Homicide Cases

Crime Scene Staging Dynamics in Homicide Cases

Individuals who perpetrate murder sometimes pose or reposition victims weapons and evidence to make it look like events happened in a different way than what actually transpired. Until now there has been scarce literature published on crime scene staging. Crime Scene Staging Dynamics in Homicide Cases is the first book to look at this practice providing a methodology of identifying analyzing synthesizing and evaluating the evidence of each case by learning to marry the physical evidence to the behavioral evidence. The book begins with the history of crime scene staging and includes many case examples that illustrate how when and why criminals stage crime scenes. The characteristics of crime scene stagers and their victims are examined along with the intent of crime scene staging and dynamics of the staged crime scene. In addition coverage of forensic victimology explores the reasons why a person might become a victim and why based on this staging may be performed. The book emphasizes the importance of recognizing behavioral red flags which are often present in staged crime scenes. These indicators can be commonly overlooked by investigators when they focus only on the physical evidence of a crime scene. Early detection crime scene analysis and crime scene reconstruction of the staged crime scene are each supported—by the full body of literature and latest published research on staging as well as by proven real-world field-based methodologies. The book identifies and describes various types of crime scene staging behavioral patterns presenting the complications and challenges that crime scene staging presents for investigators. This book will be an invaluable tool for forensic scientists investigators homicide detectives and law enforcement to understand all aspects of crime scene staging dynamics.

GBP 31.99
1

Parasitology A Conceptual Approach

Parasitology A Conceptual Approach

Produced amidst the still rippling effects of a pandemic and as the world experiences the increasing burden of global warming and a rapidly changing biosphere the second edition of Parasitology: A Conceptual Approach offers a timely overview of the eukaryotic parasites affecting human health and the health of domestic and wild animals and plants. The book offers a broadly encompassing integrative view of the phenomenon of parasitism and of the remarkable diversity of the world’s parasites. This second edition has been thoroughly updated on all aspects of parasitism including expanded sections on parasite biodiversity parasite genomes the interface between parasitology and disease ecology and applications of new techniques like CRISPR and gene drives for parasite control. Key selling features: Emphasis on a distinctive integrative and conceptual approach rather than the taxon-by-taxon approach used in most parasitology books A concise handy Rogues Gallery section that summarizes the basic biology for the most important eukaryotic parasites of humans and domestic animals one a reader is repeatedly directed to throughout the chapters Outstanding full-color illustrations and photographs to reinforce key points The use of text boxes to set apart important topics or ideas that deserve special emphasis Provision of end-of-chapter summaries questions to test understanding and key references for those wishing to seek further information Reference to particular URLs to highlight recent developments that often pose new and distinctive problems awaiting solution Parasitology: A Conceptual Approach is designed for an upper-level undergraduate audience but its readability and careful explanation of underlying scientific concepts and terminology makes it appropriate for anyone seeking a broader understanding of the impact of infectious organisms on our well-being and the changes underway in the modern world. | Parasitology A Conceptual Approach

GBP 94.99
1

VLSI Architectures for Modern Error-Correcting Codes

VLSI Architectures for Modern Error-Correcting Codes

Error-correcting codes are ubiquitous. They are adopted in almost every modern digital communication and storage system such as wireless communications optical communications Flash memories computer hard drives sensor networks and deep-space probing. New-generation and emerging applications demand codes with better error-correcting capability. On the other hand the design and implementation of those high-gain error-correcting codes pose many challenges. They usually involve complex mathematical computations and mapping them directly to hardware often leads to very high complexity. VLSI Architectures for Modern Error-Correcting Codes serves as a bridge connecting advancements in coding theory to practical hardware implementations. Instead of focusing on circuit-level design techniques the book highlights integrated algorithmic and architectural transformations that lead to great improvements on throughput silicon area requirement and/or power consumption in the hardware implementation. The goal of this book is to provide a comprehensive and systematic review of available techniques and architectures so that they can be easily followed by system and hardware designers to develop en/decoder implementations that meet error-correcting performance and cost requirements. This book can be also used as a reference for graduate-level courses on VLSI design and error-correcting coding. Particular emphases are placed on hard- and soft-decision Reed-Solomon (RS) and Bose-Chaudhuri-Hocquenghem (BCH) codes and binary and non-binary low-density parity-check (LDPC) codes. These codes are among the best candidates for modern and emerging applications due to their good error-correcting performance and lower implementation complexity compared to other codes. To help explain the computations and en/decoder architectures many examples and case studies are included. More importantly discussions are provided on the advantages and drawbacks of different implementation approaches and architectures.

GBP 52.99
1

Cyberpredators and Their Prey

Cyberpredators and Their Prey

The online environment has emerged as a continuous and unfettered source of interpersonal criminal activity beyond physical boundaries. Cyberpredators commit their crimes by employing the Internet and online services—social network platforms online groups and organizations smart phone apps bulletin board systems online forums websites internet relay chat channels—to locate and harm victims of all ages through attacking exploiting humiliating bullying harassing threatening defrauding and extorting. Cyberpredators and Their Prey describes non-sexual and sexual interpersonal crimes—online romance scam swatting trolling stalking bullying harassment minor sexting sexual trafficking child sexual abuse material sextortion and image-based sexual abuse offenses. Each chapter contains: crime definition and relevant issues; typical cyberpredator motives and methods; typical victims and behaviors that make them targets; current criminal laws for prosecuting cybercrimes and assessment of their applicability and effectiveness as deterrents; the crime’s impact on individual victims and society in general; and cybersecurity prevention and intervention strategies. Also covered are the unique challenges that the regulation investigation and prosecution of these cybercrimes pose to criminal justice and private security agents worldwide; the need for society to hold companies operating online responsible for their role in cybercrime; and how aspects of the online environment (i. e. anonymity toxic disinhibition de-individuation inculpability) contribute to harmful and abusive interpersonal interaction particularly when enacted by perpetrators as part of a group attack. Key features: Portrays material through multidisciplinary lens of psychology criminal justice law and security Provides consistent practical information about online criminals and victims Compares online to offline versions of the same crime Discusses adequacy of current laws for prosecuting cybercriminals Considers elements of the online environment that foster criminal activity Describes social engineering techniques Considers the role of intimate partner violence in cybercrimes Reviews 21st century skills needed to educate and protect potential targets Cyberpredators and Their Prey will prove essential reading to those who are studying to become or are currently security professionals; law enforcement personnel and investigators; intelligence agents; private investigators; lawyers; compliance officers; social service workers; and other professionals who deal with interpersonal cybercrime through the lens of social science.

GBP 46.99
1

Forensic Law Casebook Judicial Reasoning and the Application of Forensic Science in Criminal Cases

Forensic Law Casebook Judicial Reasoning and the Application of Forensic Science in Criminal Cases

While there are several texts that focus on forensic science techniques and applications there are few to no quality books that adequately address the judicial interpretation of forensic legal and scientific principles. The field of forensic science and law has long been in need of a historic casebook. Forensic Law Casebook: Judicial Reasoning and the Application of Forensic Science in Criminal Cases fills the current void by reviewing actual case law and translating the practical application of science to the courtroom. Each chapter represents a unique forensic discipline providing a short introduction to the subject matter the relevant case law and court cases that pertain to that subject area and posing a variety of questions and issues to the student. All cases provided contain a sufficient portion of the legal decision - and its implications to the evidence and analytical practices of that discipline - in order to then pose critical and analytical questions to the student once they have fully read the case material and the decision and considered its implications. Each chapter ends its theoretical examination with real-world experience encountered by those laboring in the investigative and collection processes - as well as problems or challenges encountered by those employed in the office of the prosecutor public defender medical examiner or other aligned office. This last section of each chapter gives true meaning and impact as to how forensic law decision-making impacts forensic practitioners and a true understanding of the responsibility placed on law enforcement investigators and scientists tasked with collecting preserving and analyzing the evidence. Forensic Law Casebook provides the reader with an array of legal cases and decisions that lay out the parameters of forensic law and its evidentiary value. In the end what emerges from this are the bedrock principles that guide current forensic evidence and the admissibility of various practices common to the field applications of forensic science. Practitioners law students undergraduate and graduate students in compatible majors - as well as law and university libraries - will benefit from this essential reference and adjunct to anyone studying forensic science criminalistics and the law. | Forensic Law Casebook Judicial Reasoning and the Application of Forensic Science in Criminal Cases

GBP 68.99
1

Designing for Safe Use 100 Principles for Making Products Safer

Designing for Safe Use 100 Principles for Making Products Safer

How do you prevent a critical care nurse from accidentally delivering a morphine overdose to an ill patient? Or ensure that people don't insert their arm into a hydraulic mulcher? And what about enabling trapped airline passengers to escape safely in an emergency? Product designers and engineers face myriad such questions every day. Failure to answer them correctly can result in product designs that lead to injury or even death due to use error. Historically designers and engineers have searched for answers by sifting through complicated safety standards or obscure industry guidance documents. Designing for Safe Use is the first comprehensive source of safety-focused design principles for product developers working in any industry. Inside you’ll find 100 principles that help ensure safe interactions with products as varied as baby strollers stepladders chainsaws automobiles apps medication packaging and even airliners. You’ll discover how protective features such as blade guards roll bars confirmation screens antimicrobial coatings and functional groupings can protect against a wide range of dangerous hazards including sharp edges that can lacerate top-heavy items that can roll over and crush fumes that can poison and small parts that can pose a choking hazard. Special book features include: Concise illustrated descriptions of design principles Sample product designs that illustrate the book’s guidelines and exemplify best practices Literature references for readers interested in learning more about specific hazards and protective measures Statistics on the number of injuries that have arisen in the past due to causes that might be eliminated by applying the principles in the book Despite its serious subject matter the book’s friendly tone surprising anecdotes bold visuals and occasional attempts at dry humor will keep you interested in the art and science of making products safer. Whether you read the book cover-to-cover or jump around the book’s relatable and practical approach will help you learn a lot about making products safe. Designing for Safe Use is a primer that will spark in readers a strong appreciation for the need to design safety into products. This reference is for designers engineers and students who seek a broad knowledge of safe design solutions. . | Designing for Safe Use 100 Principles for Making Products Safer

GBP 66.99
1

Security Operations An Introduction to Planning and Conducting Private Security Details for High-Risk Areas

Security Operations An Introduction to Planning and Conducting Private Security Details for High-Risk Areas

Security Operations: An Introduction to Planning and Conducting Private Security Details for High-Risk Areas Second Edition was written for one primary purpose: to keep people alive by introducing them to private security detail tactics and techniques. The book provides an understanding of the basic concepts and rules that need to be followed in protective services including what comprises good security practice. This second edition is fully updated to include new case scenarios threat vectors and new ambush ploys and attack tactics used by opportunistic predators and seasoned threat actors with ever-advanced sophisticated schemes. Security has always been a necessity for conducting business operations in both low- and high-risk situations regardless of the threat level in the operating environment. Overseas those with new ideas or businesses can frequently be targets for both political and criminal threat agents intent on doing harm. Even in the United States people become targets because of positions held publicity politics economics or other issues that cause unwanted attention to a person their family or business operations. Security Operations Second Edition provides an introduction to what duties a security detail should perform and how to effectively carry out those duties. The book can be used by a person traveling with a single bodyguard or someone being moved by a full security detail. FEATURES • Identifies what can pose a threat how to recognize threats and where threats are most likely to be encountered • Presents individuals and companies with the security and preparedness tools to protect themselves when operating in various environments especially in high-risk regions • Provides an understanding of operational security when in transit: to vary route selection and keep destinations and movement plans out of the public view • Outlines the tools and techniques needed for people to become security conscious and situationally aware for their own safety and the safety of those close to them An equal help to those just entering the protection business or people and companies that are considering hiring a security detail Security Operations is a thorough detailed and responsible approach to this serious and often high-risk field. Robert H. Deatherage Jr. is a veteran Special Forces Soldier and private security consultant with thirty years’ experience in military and private security operations. His various writings on security topics cover security operations threat assessment risk management client relations surveillance detection counter surveillance operations foot and vehicle movements and building security—blending solid operational theory with practical field experience. | Security Operations An Introduction to Planning and Conducting Private Security Details for High-Risk Areas

GBP 58.99
1