FTP Code

FTP Code

Author: International Maritime Organization

Publisher:

Published: 2012

Total Pages: 292

ISBN-13:

DOWNLOAD EBOOK

The 2010 FTP Code provides the international requirements for laboratory testing, typeapproval and fire test procedures for products referenced under SOLAS chapter II-2. It comprehensively revises and updates the current Code, adopted by the MSC in 1996. The 2010 FTP Code includes the following: test for non-combustibility; test for smoke and toxicity; test for "A", "B" and "F" class divisions; test for fire door control systems; test for surface flammability (surface materials and primary deck coverings); test for vertically supported textiles and films; test for upholstered furniture; test for bedding components; test for fire-restricting materials for high-speed craft; and test for fire-resisting divisions of high-speed craft. It also includes annexes on Products which may be installed without testing and/or approval and on Fire protection materials and required approval test methods


Analysis of Flame Retardancy In Polymer Science

Analysis of Flame Retardancy In Polymer Science

Author: Henri Vahabi

Publisher: Elsevier

Published: 2022-03-10

Total Pages: 472

ISBN-13: 0128242612

DOWNLOAD EBOOK

Analysis of Flame Retardancy in Polymer Science is a scientific/practical book that is conceptualized, designed, and written for students, early-career researchers, and junior engineers to explain the basic principles of fire analysis/characterization methods/methodologies, from flammability, ignition, and fire spread to forced convection and related analyses and to elucidate the mechanisms underlying flame retardancy in both gas and condensed phases followed by correlation between laboratory- and real-scale fire analyses as well as fire analysis from an industrial standpoint. This book is also an indispensable resource for identifying and mounting the latest achievements in fire analysis/characterization methods to frame the effects of fire evaluation strategies to be utilized for research and development. The book also gives a broad description of fire analysis related to different standards and regulations for different applications in different geographic zones. - Includes the background, fundamental, and modern features of techniques of characterization of fire and flame behavior - Provides an overview of the major techniques used in fire analysis of flame-retardant polymers - Characterizes different types of materials at small, bench, and real-life scale - Offers a comprehensive overview of fire behavior and testing and associated toxicity issues - Integrates the scientific, technical, standard, regulation, and industrial aspects of fire analysis into a book for future developments in the field


Network Security Assessment

Network Security Assessment

Author: Chris McNab

Publisher: "O'Reilly Media, Inc."

Published: 2016-12-06

Total Pages: 493

ISBN-13: 1491911069

DOWNLOAD EBOOK

How secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. With the third edition of this practical book, you’ll learn how to perform network-based penetration testing in a structured manner. Security expert Chris McNab demonstrates common vulnerabilities, and the steps you can take to identify them in your environment. System complexity and attack surfaces continue to grow. This book provides a process to help you mitigate risks posed to your network. Each chapter includes a checklist summarizing attacker techniques, along with effective countermeasures you can use immediately. Learn how to effectively test system components, including: Common services such as SSH, FTP, Kerberos, SNMP, and LDAP Microsoft services, including NetBIOS, SMB, RPC, and RDP SMTP, POP3, and IMAP email services IPsec and PPTP services that provide secure network access TLS protocols and features providing transport security Web server software, including Microsoft IIS, Apache, and Nginx Frameworks including Rails, Django, Microsoft ASP.NET, and PHP Database servers, storage protocols, and distributed key-value stores


Computational Geometry in C

Computational Geometry in C

Author: Joseph O'Rourke

Publisher: Cambridge University Press

Published: 1998-10-13

Total Pages: 396

ISBN-13: 110726863X

DOWNLOAD EBOOK

This is the revised and expanded 1998 edition of a popular introduction to the design and implementation of geometry algorithms arising in areas such as computer graphics, robotics, and engineering design. The basic techniques used in computational geometry are all covered: polygon triangulations, convex hulls, Voronoi diagrams, arrangements, geometric searching, and motion planning. The self-contained treatment presumes only an elementary knowledge of mathematics, but reaches topics on the frontier of current research, making it a useful reference for practitioners at all levels. The second edition contains material on several new topics, such as randomized algorithms for polygon triangulation, planar point location, 3D convex hull construction, intersection algorithms for ray-segment and ray-triangle, and point-in-polyhedron. The code in this edition is significantly improved from the first edition (more efficient and more robust), and four new routines are included. Java versions for this new edition are also available. All code is accessible from the book's Web site (http://cs.smith.edu/~orourke/) or by anonymous ftp.


NET Patterns

NET Patterns

Author: Christian Thilmany

Publisher: Addison-Wesley Professional

Published: 2004

Total Pages: 452

ISBN-13: 9780321130020

DOWNLOAD EBOOK

bull; bull;Extends the proven concept of design patterns to the relatively new field of .NET design and development bull;Part of the acclaimed Addison-Wesley Software Patterns Series, with John Vlissides as series editor bull;Includes helpful primers on XML and web services as well as thorough coverage of debugging, exceptions, error handling, and architecture


Network Security Tools

Network Security Tools

Author: Nitesh Dhanjani

Publisher: "O'Reilly Media, Inc."

Published: 2005-04-04

Total Pages: 342

ISBN-13: 149194742X

DOWNLOAD EBOOK

If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle.Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus.This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function.Some of the topics covered include: Writing your own network sniffers and packet injection tools Writing plugins for Nessus, Ettercap, and Nikto Developing exploits for Metasploit Code analysis for web applications Writing kernel modules for security applications, and understanding rootkits While many books on security are either tediously academic or overly sensational, Network Security Tools takes an even-handed and accessible approach that will let you quickly review the problem and implement new, practical solutions--without reinventing the wheel. In an age when security is critical, Network Security Tools is the resource you want at your side when locking down your network.


The Management of Maritime Regulations

The Management of Maritime Regulations

Author: Hristos Karahalios

Publisher: Routledge

Published: 2015-06-19

Total Pages: 188

ISBN-13: 1317614666

DOWNLOAD EBOOK

Ship management is a worldwide activity. Modern ships are sophisticated designed structures equipped with several automatic devices. It is estimated that 90 per cent of commodities transported worldwide are carried by ships. Therefore there is great interest from many private and public organizations that those ships are operating, manned, designed and maintained within international acceptable standards. The obligation of stakeholders to comply with maritime regulations is included in most statutory and commercial agreements and therefore inadequate implementation of maritime regulations exposes stakeholders to commercial risks. This book explores how the application of mathematical decision-making tools could be used to manage maritime regulations. Performance management tools are proposed which would allow stakeholders to monitor the regulatory performance of their organization in order to reduce or eliminate those commercial risks. The process of introducing an implementation process for maritime regulations worldwide is described within this text. An emphasis is put on the role of main stakeholders in the regulatory process and reasons that increase the willingness of stakeholders to participate in the implementation of regulations. This book will be of interest to scholars and students interested in the management of the shipping industry as well as ship owners and managers who are charged with implementing maritime regulations.


Cartner on the International Law of the Shipmaster

Cartner on the International Law of the Shipmaster

Author: John A. C. Cartner

Publisher: Taylor & Francis

Published: 2022-07-07

Total Pages: 939

ISBN-13: 1317660242

DOWNLOAD EBOOK

This unique book rethinks and rewrites the previous edition. It categorises simply the nine interactive legal duties of the shipmaster, analysing and relating them to laws and conventions within a single volume. Cartner on the International Law of the Shipmaster contends that command depends on decision-making, and that shipmasters are not provided sufficient, timely, relevant, and pertinent information for command decisions. The book proposes voyage planning follow the spacecraft model of the USA's National Aeronautics and Space Administration, providing readers with a metric for command. It constructively criticises the conventions and management and is aimed at reducing catastrophes by focusing on the hitherto elusive human factor in the shipmaster. Cartner proposes that command at sea be its own profession and discipline with those called to it specifically trained in its intricacies; he argues that current ships are not designed to be command-worthy or security-worthy and that management should reorder its relationships with shipmasters as tactical managers afloat. The insights the book provides are an invaluable aid to decision making for the modern civil commander and anyone association with this pivotal and essential profession. This book is a necessary reference and guide for shipmasters, technologists, naval architects, regulators, underwriters, students, practitioners and courts of maritime law and command worldwide.