Engineering risk management

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Meyer, Thierry 1961- (VerfasserIn), Reniers, Genserik 1974- (VerfasserIn)
Format: Buch
Sprache:English
Veröffentlicht: Berlin ; Munich ; Boston de Gruyter [2016]
Ausgabe:2nd edition
Schriftenreihe:De Gruyter Graduate
Schlagworte:
Online-Zugang:Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV043634598
003 DE-604
005 20171106
007 t|
008 160621s2016 xx a||| |||| 00||| eng d
020 |a 9783110418033  |9 978-3-11-041803-3 
035 |a (OCoLC)952069997 
035 |a (DE-599)BVBBV043634598 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-1050  |a DE-703  |a DE-859  |a DE-1043  |a DE-19  |a DE-83  |a DE-12  |a DE-92  |a DE-573  |a DE-862 
082 0 |a 621.86068  |2 22//ger 
084 |a VB 4150  |0 (DE-625)147054:253  |2 rvk 
084 |a ZG 9200  |0 (DE-625)156049:  |2 rvk 
084 |a ZG 9270  |0 (DE-625)156055:  |2 rvk 
100 1 |a Meyer, Thierry  |d 1961-  |e Verfasser  |0 (DE-588)129958530  |4 aut 
245 1 0 |a Engineering risk management  |c Thierry Meyer, Genserik Reniers 
250 |a 2nd edition 
264 1 |a Berlin ; Munich ; Boston  |b de Gruyter  |c [2016] 
300 |a xii, 339 Seiten  |b Illustrationen, Diagramme 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 0 |a De Gruyter Graduate 
650 0 7 |a Technische Sicherheit  |0 (DE-588)4059233-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Sicherheitsanalyse  |0 (DE-588)4684292-5  |2 gnd  |9 rswk-swf 
650 0 7 |a Fehlerverhütung  |0 (DE-588)4276213-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Risikomanagement  |0 (DE-588)4121590-4  |2 gnd  |9 rswk-swf 
650 0 7 |a Technisches System  |0 (DE-588)4126276-1  |2 gnd  |9 rswk-swf 
689 0 0 |a Technisches System  |0 (DE-588)4126276-1  |D s 
689 0 1 |a Technische Sicherheit  |0 (DE-588)4059233-9  |D s 
689 0 2 |a Fehlerverhütung  |0 (DE-588)4276213-3  |D s 
689 0 3 |a Sicherheitsanalyse  |0 (DE-588)4684292-5  |D s 
689 0 4 |a Risikomanagement  |0 (DE-588)4121590-4  |D s 
689 0 |5 DE-604 
700 1 |a Reniers, Genserik  |d 1974-  |e Verfasser  |0 (DE-588)1035380528  |4 aut 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe, EPUB  |z 978-3-11-042355-6 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe, PDF  |z 978-3-11-041804-0 
856 4 2 |m DNB Datenaustausch  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029048556&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
943 1 |a oai:aleph.bib-bvb.de:BVB01-029048556 

Datensatz im Suchindex

DE-19_call_number 0001/8 16-12530
DE-19_location 0
DE-BY-UBM_katkey 5319366
DE-BY-UBM_media_number 41631738270019
_version_ 1823055967375327232
adam_text CONTENTS ABOUT THE AUTHORS * V 1 RISK MANAGEMENT IS NOT ONLY A MATTER OFFINANCIAL *I S K _ L REFERENCES * 7 2 INTRODUCTION TO ENGINEERING AND MANAGING *I S K S _ * 2.1 MANAGING RISKS AND UNCERTAINTIES * AN INTRODUCTION _ 9 2.2 THE COMPLEXITY OF RISKS AND UNCERTAINTIES * 13 2.3 HAZARDS AND RISKS * 17 * 2.4 SIMPIMED INTERPRETATION OF (NEGATIVE) RISK * 19 2.5 HAZARD AND RISK MAPPING * 22 2.6 RISK PERCEPTION AND RISK ATTITUDE * 25 2.7 ERM-M A IN STEPS * 27 2.8 OBJECTIVES AND IMPORTANCE OF ERM * 33 2.9 THE BLACK SWAN (TYPE III EVENTS) * 34 9 10 CONCLUSIONS * 36 REFERENCES * 36 3 RISKMANAGEMENT PRINCIPLES * 3* 3.1 INTRODUCTION TO RISKMANAGEMENT * 39 3.2 INTEGRATED RISK MANAGEMENT * 41 3.3 RISK MANAGEMENT MODELS * 43 3.3.1 MODEL OF THE ACCIDENT PYRAMID * 4* 3.3.2 THE *2* MODEL * 46 3.3.3 THE SWISS CHEESE MODEL AND THE DOMINO THEORY* 46 3.4 THE ANATOMY OF AN ACCIDENT: SIFS AND SILS * 49 3.5 INDIVIDUAL RISK, SOCIETAL RISK, PHYSICAL DESCRIPTION OF *I S K _ 57 3.5.1 LOCATION-BASED (INDIVIDUAL) RISK* 57 3.5.2 SOCIETAL RISK OR GROUP RISK * 58 3.5.3 PHYSICAL DESCRIPTION OF RISK _ 62 3.5.3.1 STATIC MODEL OF AN ACCIDENT * 64 3.5.3.2 DYNAMIC MODEL OF AN ACCIDENT * 64 3.6 SAFETY CULTURE AND SAFETY CLIMATE * 66 3.6.1 ORGANIZATIONAL CULTURE AND CLIMATE * 66 3.6.2 SAFETY CULTURE MODELS * 68 3.6.3 THE *2* MODEL REVISITED AND APPLIED TO SAFETY AND SECURITY CULTURE * 71 3.6.4 THE EGG AGGREGATED MODEL (TEAM) OF SAFETY CULTURE * 73 3.7 STRATEGIC MANAGEMENT CONCERNING RISKS AND CONTINUOUS IMPROVEMENT * 75 3.8 THELDEALS&SMODEL ** 3.8.1 PERFORMANCE INDICATORS * 82 3.9 CONTINUOUS IMPROVEMENT OF ORGANIZATIONAL CULTURE * 86 3.10 HIGH RELIABILITY ORGANIZATIONS AND SYSTEMIC **S K S _ 8 8 3.10.1 SYSTEMS THINKING * 88 3.10.1.1 REACTION * ME OR RETARDANT EFFECT * 88 3.10.1.2 LAWOFCOMMUNLCATINGVESSELS * 88 3.10.1.3 NON-LINEAR CAUSALITIES * 89 * * 10-1 4 LONG-TERM VISION * 89 3.10.1.5 SYSTEMS THINKING CONCLUSIONS * 89 3.10.2 NORMAL ACCIDENT THEORY (NAT) AND HIGH RELIABILITY THEORY (HRT) * 90 3.10.3 HIGH RELIABILITY ORGANZATION (HRO) PRINCIPLES * 92 3.10.3.1 HRO PRINCIPLE 1: TARGETED AT DISTURBANCES * 93 3.10.3.2 HRO PRINCIPLE 2: RELUCTANT FOR SIMPLIFICATION * 93 3.10.3.3 HRO PRINCIPLE 3 : SENSITIVE TOWARDS IMPLEMENTATION * 93 3.10.3.4 HRO PRINCIPLE 4 * DEVOTED TO RESILIENCY * 94 3.10.3.5 HRO PRINCIPIE 5: RESPECTFUL FOR EXPERTISE * 94 3.10.4 RISKAND RELIABILITY * 94 3.11 ACCIDENT REPOTING * 96 3.12 CONCLUSIONS * 98 REFERENCES * ** 4 RISKDIAGNOSTIC AND ANALYSIS * 103 4.1 INTRODUCTION TO RISKASSESSM ENTTECHNIQUES_103 4.1.1 INDUCT*VE AND DEDUCTIVE APPROACHES.* 104 4.1.2 GENERAL METHODS FOR RISK ANALYSIS * 105 4.1.3 GENERAL PROCEDURE * 111 4.1.4 GENERAL PROCESS FOR A* ANALYSIS TECHNIQUES * 113 *9 SWOT* 114 4.3 PRELIMINARY HAZARD ANALYSIS117* * 4.4 CHECKLIST * 119 4.4.1 METHODOLOGY * 119 4.4.2 E X A M P LE _ 1 2 0 4.4.2.1 STEP LA: CRITICAL DIFFERENCE, EFFECT OF ENERGIES FAILURES * 121 4.4.2.2 STEP LB : CRITICAL DIFFERENCE * DEVIATION FROM THE OPERATING PROCEDURE * 121 4.4.2.3 STEP 2: ESTABLISH THE RISK CATALOGUE * 122 4.4.2.4 STEP 3* RISK MITIGATION 123* * 4.4.3 CONCLUSION * 123 4.5 HAZOP * 123 4.5.1 HAZOP INPUTS AND OUTPUTS * 124 4.5.2 HAZOP PROCESS * 125 4.5.3 EXAMPLE * 126 4.5.4 CONCLUSIONS * 128 4.6 FMECA * 131 4.6.1 FMECA INPUTS AND OUTPUTS * 132 4.6.2 FMECA PROCESS * 132 4.6.2.1 STEP 1: ELABORATION OF THE HIERARCHICAL MODEL, FUNCTIONAL ANALYSIS * 1 4 * 4.6.2.2 STEP 2: FAILURE MODE DETERMINATION* 135* 4.6.2.3 STEP 3: THE CRITICALITY DETERMINATION * 136 4.6.3 EXAMPLE * 137 4.6.4 CONCLUSIONS * 140 4.7 FAULT TREE ANALYSIS AND 4.7.1 FAULT TREE ANALYSIS * 141 4.7.2 EVENT TREE ANALYSIS * 146 4.7.3 CAUSE-CONSEQUENCE-ANALYSIS (CCA): A COMBINATION OF FA AND ETA * W 4.8 THE RISK MATRIX* 151 4.9 QUANTITATIVE RISK ASSESSMENT (QRA) * 156 4.10 LAYEROFPROTECTION ANALYSIS * 158 * 11 BAYESIAN NETWORKS * 161 *19 CONCLUSION * 165 REFERENCES * 166 5 RISK TREATMENT/REDUCTION * 169 5.1 INTRODUCTION * 169 5.2 PREVENTION * 174 5.2.1 SEVESO DIRECTIVE AS PREVENTIONS^ 5.2.2 SEVESO COMPANY TIERS * 179 5.3 PROTECTION AND MITIGATION * 180 5.4 RISK TREATMENT * 184 5.5 RISK CONTROL * 189 5.6 STOP PRINCIPLE * 192 5.7 RESILIENCE* 195 5.8 CONCLUSION* 198 REFERENCES * *** 6 EVENT ANALYSIS * 201 6.1 TRADITIONAL ANALYTICAL TECHNIQUES * 202 6.1.1 SEQUENCE OF EVENTS * 203 6.1.2 MULTILINEAR EVENTS SEQUENCING * 203 6.1.3 ROOT CAUSE ANALYSIS I* 204 6.2 CAUSAL TREE ANALYSIS * 205 6.2.1 METHOD DESCRIPTION * 205 6.2.2 COUECTING FACTS * 207 6.2.3 EVENT INVESTIGATION GOOD PRACTICE * 209 6 .2 .4 R IIIIH IN G TH P TRP P * ,9 1 * 6.2.5 EXAMPLE * 213 6.2.6 BUILDING AN ACTION PLAN * 214 6.37 IMPLEMENTING SOLUTIONS AND FOLLOW-UP * 215 6.3 CONCLUSIONS * 215 REFERENCES * 216 * MAJOR INDUSTRIAL ACCIDENTS AND LEARNING FROM ACCIDENTS * 217 7.1 LINK BETWEEN MAJOR ACCIDENTS AND LEGISLATION * 217 7.2 MAJOR INDUSTRIALACCIDENTS* EXAMPLES * 219 7.2.1 FEYZIN, FRANCE, JANUARY 1966 * 219 7.2.2 FLIXBOROUGH. UK, JUNE 1974 * 220 7.2.3 SEVESO, ITALY, JULY 1976 * 221 7.2.4 LOS ALFAQUES, SPAIN. JULY 1978 * 221 7.2.5 MEXICO CITY, MEXICO, NOVEMBER 1984 * 222 7.2.6 BHOPAL, INDIA, DECEMBER 1984 * 222 7 9 7 CHERNOBYL, UKRAINE, APRIL 1986 ^ 223 7.2.8 PIPER ALPHA, NORTH SEA, JULY 1988* 1223 7.2.9 PASAHPNA ***** *]** N RTN H P RIQ R Q * 7.2.10 ENSCHEDE, THE NETHERLANDS, MAY 2000 * 224 7.2.11 TOULOUSE, FRANCE, SEPTEMBER 2001 * 224 7.2.12 ATH. BELGIUM, JULY 2004 * 225 7.2.13 HOUSTON, TEXAS, USA, MARCH 2005 * 225 7.2.14 ST LOUIS,MISSOURI,USA.JUNE 2005 * 225 7.2.15 BUNCEFIELD, UK, DECEMBER 2005 * 226 7.2.16 PORT WENWORTH, GEORGIA. USA, FEBRUARY 2008 * 226 7.2.17 NPPPWATPR HNRI7NN * FIIIIFNFMPYIRNR APRIL 9*1* * 7** 7.2.18 FUKUSHIMA. JAPAN. MARCH 2011 * 227 7.2.19 WEST * TEXAS, USA, APRIL. 2013 _ 228 7.2.20 LA PORTE, TEXAS, USA, NOVEMBER * 2014 * 228 7.2.21 TIANJIN, CHINA. AUGUST * 2015 * 229 7.3 LEARNING FROM ACCIDENTS * 229 7.4 CONCLUSIONS * 232 REFERENCES * 232 8 CRISS MANAGEMENT * 235 8.1 INTRODUCTION * 236 8.2 THE STEPS OF CRISIS MANAGEMENT * 238 8.2.1 WHAT TO DO WHEN A DISRUPTION OCCURS * 239 8.2.2 BUSINESS CONTINUITY PLAN * 244 8.3 CRISIS EVOLUTION * 245 8.3.1 THE PRE-CRISIS STAGE OR CREEPING CRISIS * 246 8.3.2 THE ACUTE-CRISIS STAGE * 247 8.3.3 THE POST-CRISIS STAGE * 247 8.3.4 ILLUSTRATIVE EXAMPLE OF A CRISIS EVOLUTION * 247 8.4 PROACTIVE OR REACTIVE CRISIS MANAGEMENT * 249 8.5 CRISIS COMMUNICATION * 250 8.6 CONCLUSIONS * 251 REFERENCES * 252 9 ECONOMIE ISSUES OF SAFETY * 253 9.1 ACCIDENT COSTS AND HYPOTHETICAL BENEFITS* 255 * 9.2 PREVENTION COSTS * 259 9.3 PREVENTION B E N E F*TS _ 2 6 0 9.4 THE DEGREE OF SAFETY AND THE MINIMUM TOTAL COST POINT** 261 9.5 SAFETY ECONOMICS AND THE TWO DIFFERENT TYPES OF RISKS * 262 9.6 COST-EFFECTIVENESS ANALYSIS AND COST-BENEFIT ANALYSIS FOR OCCUPATIONAL (TYPE *) ACCIDENTS * 264 9.6.1 COST-EFFECTIVENESS ANALYSIS * 264 9.6.2 COST-BENEFIT ANALYSIS * 265 9.6.2.1 DEDSION RULE, PRESENT VALUES AND DISCOUNT RATE * 267 9.6.2.2 DISPROPORTION FACTOR*. 270 9.6.2.3 DIFFERENT COST-BENEFIT RATIOS * 271 9.6.2.4 COST-BENEFIT ANALYSIS FOR SAFETY MEASURES * 271 9.6.3 R*SK ACCEPTABILITY * 272 9.6.4 USING THE EVENT TREE TO DECIDE ABOUT SAFETY INVESTMENTS * 276 9.6.5 ADVANTAGES AND DISADVANTAGES OF ANALYSES BASED ON COSTS AND BENEFITS * 277 9.7 OPTIMAL ALLOCATION STRATEGY FOR THE SAFETY BUDGET * 278 9.8 LOSS AVERSION AND SAFETY INVESTMENTS - SAFETY AS ECONOMIC VALUE * 279 *Q CONCLUSIONS * 280 REFERENCES * 280 10 RISK GOVERNANCE * 283 10.1 INTRODUCTION** 283 10.2 RISK MANAGEMENT SYSTEM * 285 10.3 A FRAMEWORK FOR RISKAND UNCERTAINTY GOVERNANCE* -2 9 0 10.4 THE RISK GOVERNANCE MODEL (RGM) * 296 10.4.1 THE * CONSIDERING?* *AYER OF THE RISK GOVERNANCE MODEL * 297 10.4.2 THE * RESULTS?* LAYER OF THE RISK GOVERNANCE MODEL * 299 10.4.3 THE RISK GOVERNANCE MODEL * 299 10.5 A RISK GOVERNANCE PDCA * 300 10.6 R ISKGOVERNANCEDEFICITS_302 10.7 CONCLUSIONS * 304 REFERENCES * 305 I I EXAMPLES OF PRACTICAL IMPLEMENTATION OF RISKMANAGEMENT * 307 I I I THE MCE CONCEPT * 308 11.1.1 THE MANAGEMENT STEP * 309 11.1.2 THE INFORMATION AND EDUCATION STEP * 309 11.1.3 THECONTROLSTEP * 310 11.1.4 THE EMERGENCY STEP * 310 11.2 APPLICATION TO CHEMISTRY RESEARCH AND CHEMICAL HAZARDS * 310 11.3 APPLICATION TO PHYSICS RESEARCH AND PHYSICS HAZARDS * 312 11.3.1 HAZARDS OF *QUID CRYOGEN 11 * * ASPHYXIATION * 316 11.4 APPLICATION TO EMERGING TECHNOLOGIES * 317 11.4.1 NANOTECHNOLOGIES AS ILLUSTRATIVE EXAMPLE * 320 11 * CONCLUSIONS * 323 REFERENCES * 325 12 CONCLUDING REMARKS * 327 INDEX* 331
any_adam_object 1
author Meyer, Thierry 1961-
Reniers, Genserik 1974-
author_GND (DE-588)129958530
(DE-588)1035380528
author_facet Meyer, Thierry 1961-
Reniers, Genserik 1974-
author_role aut
aut
author_sort Meyer, Thierry 1961-
author_variant t m tm
g r gr
building Verbundindex
bvnumber BV043634598
classification_rvk VB 4150
ZG 9200
ZG 9270
ctrlnum (OCoLC)952069997
(DE-599)BVBBV043634598
dewey-full 621.86068
dewey-hundreds 600 - Technology (Applied sciences)
dewey-ones 621 - Applied physics
dewey-raw 621.86068
dewey-search 621.86068
dewey-sort 3621.86068
dewey-tens 620 - Engineering and allied operations
discipline Maschinenbau / Maschinenwesen
Chemie / Pharmazie
Technik
edition 2nd edition
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02211nam a2200505 c 4500</leader><controlfield tag="001">BV043634598</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20171106 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">160621s2016 xx a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110418033</subfield><subfield code="9">978-3-11-041803-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)952069997</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043634598</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-862</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.86068</subfield><subfield code="2">22//ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">VB 4150</subfield><subfield code="0">(DE-625)147054:253</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZG 9200</subfield><subfield code="0">(DE-625)156049:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZG 9270</subfield><subfield code="0">(DE-625)156055:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Meyer, Thierry</subfield><subfield code="d">1961-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)129958530</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Engineering risk management</subfield><subfield code="c">Thierry Meyer, Genserik Reniers</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Munich ; Boston</subfield><subfield code="b">de Gruyter</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xii, 339 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">De Gruyter Graduate</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Technische Sicherheit</subfield><subfield code="0">(DE-588)4059233-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsanalyse</subfield><subfield code="0">(DE-588)4684292-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Fehlerverhütung</subfield><subfield code="0">(DE-588)4276213-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Technisches System</subfield><subfield code="0">(DE-588)4126276-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Technisches System</subfield><subfield code="0">(DE-588)4126276-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Technische Sicherheit</subfield><subfield code="0">(DE-588)4059233-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Fehlerverhütung</subfield><subfield code="0">(DE-588)4276213-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Sicherheitsanalyse</subfield><subfield code="0">(DE-588)4684292-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Reniers, Genserik</subfield><subfield code="d">1974-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1035380528</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, EPUB</subfield><subfield code="z">978-3-11-042355-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, PDF</subfield><subfield code="z">978-3-11-041804-0</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=029048556&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029048556</subfield></datafield></record></collection>
id DE-604.BV043634598
illustrated Illustrated
indexdate 2025-02-03T17:41:49Z
institution BVB
isbn 9783110418033
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-029048556
oclc_num 952069997
open_access_boolean
owner DE-1050
DE-703
DE-859
DE-1043
DE-19
DE-BY-UBM
DE-83
DE-12
DE-92
DE-573
DE-862
DE-BY-FWS
owner_facet DE-1050
DE-703
DE-859
DE-1043
DE-19
DE-BY-UBM
DE-83
DE-12
DE-92
DE-573
DE-862
DE-BY-FWS
physical xii, 339 Seiten Illustrationen, Diagramme
publishDate 2016
publishDateSearch 2016
publishDateSort 2016
publisher de Gruyter
record_format marc
series2 De Gruyter Graduate
spellingShingle Meyer, Thierry 1961-
Reniers, Genserik 1974-
Engineering risk management
Technische Sicherheit (DE-588)4059233-9 gnd
Sicherheitsanalyse (DE-588)4684292-5 gnd
Fehlerverhütung (DE-588)4276213-3 gnd
Risikomanagement (DE-588)4121590-4 gnd
Technisches System (DE-588)4126276-1 gnd
subject_GND (DE-588)4059233-9
(DE-588)4684292-5
(DE-588)4276213-3
(DE-588)4121590-4
(DE-588)4126276-1
title Engineering risk management
title_auth Engineering risk management
title_exact_search Engineering risk management
title_full Engineering risk management Thierry Meyer, Genserik Reniers
title_fullStr Engineering risk management Thierry Meyer, Genserik Reniers
title_full_unstemmed Engineering risk management Thierry Meyer, Genserik Reniers
title_short Engineering risk management
title_sort engineering risk management
topic Technische Sicherheit (DE-588)4059233-9 gnd
Sicherheitsanalyse (DE-588)4684292-5 gnd
Fehlerverhütung (DE-588)4276213-3 gnd
Risikomanagement (DE-588)4121590-4 gnd
Technisches System (DE-588)4126276-1 gnd
topic_facet Technische Sicherheit
Sicherheitsanalyse
Fehlerverhütung
Risikomanagement
Technisches System
url http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029048556&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
work_keys_str_mv AT meyerthierry engineeringriskmanagement
AT reniersgenserik engineeringriskmanagement