Focused on reliability and safety engineering, this comprehensive guide offers practical methods for minimizing defects and failures in process design and operation. It caters to both beginners and experts, featuring tactics to navigate complexities and illustrative case studies for deeper insights. The author draws on over 40 years of experience, covering a range of topics including reliability parameters, cost-effective quality approaches, failure rate interpretation, and design assurance techniques, making it a valuable resource for professionals in the field.
David J. Smith Book order (chronological)






- 2021
- 2021
Basic Statistical Techniques for Medical and Other Professionals
A Course in Statistics to Assist in Interpreting Numerical Data
- 116 pages
- 5 hours of reading
Healthcare professionals navigate a constant influx of statistical data from various sources, including insurance companies and government agencies. This reliance on data is crucial for making informed decisions about medical service delivery, highlighting the importance of understanding and interpreting statistics in the healthcare field.
- 2020
Ashgate Historical Keyboard Series: Aspects of Early English Keyboard Music Before c.1630
- 246 pages
- 9 hours of reading
English keyboard music achieved remarkable sophistication in the late sixteenth and early seventeenth centuries, as organists like William Byrd elevated a genre typically associated with amateur performance to a level of seriousness akin to vocal music. This book compiles significant research on the music, its sources, and the instruments used. Two chapters focus on instruments: John Koster examines the harpsichord's role during this period, while Dominic Gwynn discusses the construction of Tudor-style organs based on existing evidence. This leads to a section on organ performance practice in liturgical settings, where John Harper analyzes the implications of organs pitched in F used alongside vocal polyphony, and Magnus Williamson investigates improvisational practices of the Tudor era. The next section addresses sources and repertoire, starting with Frauke Jörgensen and Rachelle Taylor's exploration of Clarifica me Pater settings, which ties back to improvisation. Further contributions delve into significant manuscript sources: Tihomir Popovic reevaluates My Ladye Nevells Booke in the context of aristocratic culture, and David J. Smith provides an in-depth study of the Fitzwilliam Virginal Book. The discussion expands with Pieter Dirksen's analysis of sources related to John Bull, closely linked to David Leadbetter's work on Gibbons, lute sources, and stylistic questions.
- 2020
This bestseller is newly revised with updated statistics, new activities and completely new material on food security, energy and health. By shrinking the planet down to a village of just 100 people, children will discover how to grow up global and establish their own place in the world village.
- 2007
Router Security Securing IP Network Traffic Planes offers a thorough approach to understanding and implementing IP traffic plane separation and protection on IP routers. It details the distinct traffic planes of IP networks and the advanced techniques needed to secure them operationally, covering the data, control, management, and services planes essential for IP networking. The initial section provides an overview of Internet Protocol components, leading to an understanding of defense in depth and breadth security principles as applied to IP traffic planes. The second section delves into techniques for securing the IP data plane, control plane, management plane, and services plane. The final section presents case studies from both enterprise and service provider perspectives, integrating the security techniques discussed earlier into a comprehensive defense strategy. Understanding and securing IP traffic planes is vital for the overall security of IP infrastructure. The techniques outlined enable operators to defend against attacks effectively. As the vulnerability economy evolves, collaboration between vendors and network providers to enhance IP infrastructure security becomes increasingly important. This book is part of the Cisco Press Networking Technology Series, aimed at helping networking professionals secure critical data and resources while building resilient networks.
