Books > Social sciences > Warfare & defence
|
Buy Now
Risk Assessment for Water Infrastructure Safety and Security (Paperback)
Loot Price: R2,043
Discovery Miles 20 430
|
|
Risk Assessment for Water Infrastructure Safety and Security (Paperback)
Expected to ship within 12 - 17 working days
|
One of the seventeen critical infrastructures vital to the security
of the United States, the water supply system remains largely
unprotected from the threat of terrorism, including possible
revenge by Al Qaeda over the killing of Osama Bin Laden.
Recognizing and identifying prospective events of terrorism against
the water infrastructure is critical to the protection of the
nation, as the consequences triggered by a terrorist attack on the
water supply would be devastating. Risk Assessment for Water
Infrastructure: Safety and Security provides a unique quantitative
risk assessment methodology for protection and security against
terrorist contamination, vandalism, attacks against dams, and other
threats to water supply systems. Focusing on the human safety,
environmental, and economic consequences triggered by potential
terrorist attacks and other threats, the book presents: The
development of an integrated approach of risk assessment based upon
the cumulative prospect theory The qualitative/quantitative
processes and models for security and safe facility operations as
required by EPA, DHS, and other governmental and regulatory
agencies The application of an integrated model to the risk
assessment of surface water, dams, wells, wastewater treatment
facilities, reservoirs, and aqueducts of large urban regions The
development of intelligence analysis incorporating risk assessment
for terrorism prevention Finally, the book presents the legal and
regulatory requirements and policy related to the protection and
security of water infrastructure from terrorism and natural hazards
to both human health and the environment. By analyzing potential
terrorist risks against the water supply, strategic improvements in
U.S. water infrastructure security may be achieved, including
changes in policy, incorporation of intrusion detection technology,
increased surveillance, and increased intelligence. More
information can be found on the author's website.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.