Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (1)
  • 2010-2014  (1)
  • 2011  (1)
  • Hakim, Simon
  • Political science  (1)
  • 1
    Online Resource
    Online Resource
    New York, NY : Springer Science+Business Media, LLC
    ISBN: 9781461401896 , 9781283351935
    Language: English
    Pages: Online-Ressource , v.: digital
    Edition: Online-Ausg. Springer eBook Collection. Humanities, Social Science and Law Electronic reproduction; Available via World Wide Web
    Series Statement: Protecting Critical Infrastructure 2
    DDC: 363.6/1
    Keywords: Social sciences ; Hydraulic engineering ; Industrial management ; Political science
    Abstract: Avi Ostfeld
    Abstract: Following the events of 9/11, the Administrator of the US Environmental Protection Agency created the Water Protection Task Force (WPTF), which identified water and wastewater systems as a major area of vulnerability to deliberate attack. The WPTF suggested that there are steps that can be taken to reduce these vulnerabilities and to make it as difficult as possible for potential saboteurs to succeed. The WPTF recommended that be scrutinized with renewed vigor to secure water and wastewater systems against these possible threats. It also recommended that water and wastewater systems have a res
    Description / Table of Contents: Acknowledgement; Contents; Contributors; 1 Securing Water and Wastewater Systems: An Overview; 1.1 Introduction; 1.2 History of Water Supply Vulnerability; 1.3 Threats from Earthquakes; 1.3.1 The Loma Prieta Earthquake; 1.3.2 The Northridge Earthquake; 1.3.3 Kobe City Earthquake; 1.3.4 Technological and Institutional Adaptation; 1.3.4.1 Technological Adaptations; 1.3.4.2 Institutional Adaptations; 1.4 Vulnerable Characteristics of US Water Supply Systems; 1.5 The Threat of Terrorism to Urban Water Systems; 1.5.1 Bioterrorism and Chemical Contamination; 1.6 Countermeasures Against Terrorism
    Description / Table of Contents: 1.6.1 Physical Countermeasures1.6.2 Sensor Networks; 1.7 Cyber Security; 1.7.1 Laws and Regulations Governing the Internet; 1.7.2 Internet Recovery; 1.7.3 Examples of Internet Interruption; 1.7.3.1 Case Study -- The Slammer Worm; 1.7.3.2 Case Study -- A Root Server Attack; 1.7.3.3 Case Study -- The Baltimore Train Tunnel Fire; 1.7.3.4 Case Study -- The September 11, 2001, Terrorist Attack on the World Trade Center; 1.7.3.5 Case Study -- Hurricane Katrina; 1.7.4 Cyber Attacks in the Public Sector; 1.7.4.1 The ''Stuxnet'' Virus; 1.8 Material to Be Included in This Book
    Description / Table of Contents: 1.8.1 Current State of Water Supply and Wastewater Systems Security: An Overview1.8.2 Characteristics of Water and Wastewater Systems in the United States; 1.8.3 Chemical and Microbiological Threats for Water System Contamination; 1.8.4 Monitoring for Natural and Manmade Threats in Water and Wastewater Systems; 1.8.5 Modeling Contaminant Propagation and Contaminant Threats; 1.8.6 Case Study Applications; 1.8.7 Distribution System Modeling, SCADA Systems, Security and Surveillance Systems; 1.8.8 Institutional and Management Issues in Responding to Natural and Manmade Threats
    Description / Table of Contents: 1.8.9 Developing Techniques and Approaches for Natural and Manmade Threat Response1.9 Summary and Conclusions; References; 2 Water/Wastewater Infrastructure Security: Threats and Vulnerabilities; 2.1 Introduction; 2.2 Why Secure Water Infrastructure?; 2.3 Threats to Water Systems; 2.3.1 Evolving Threat Environment; 2.3.1.1 September 11 Terrorist Attacks; 2.3.1.2 Hurricane Katrina; 2.3.2 Threat Assessments; 2.3.3 Natural Disasters; 2.3.3.1 Human-Caused Incidents; 2.3.3.2 External Threats; 2.3.3.3 Internal Threats; 2.3.3.4 Cyber Threats; 2.3.4 Design Basis Threat
    Description / Table of Contents: 2.3.5 Continuity Threats to Workforce and Infrastructure2.3.5.1 The Dual Threat: Aging Infrastructure and Aging Workforce; 2.3.5.2 Aging Infrastructure; 2.3.5.3 Interdependent Infrastructure Failures; 2.3.5.4 Workforce Illness; 2.4 Water System Vulnerabilities; 2.4.1 Above-Ground Structures; 2.4.2 Below-Ground Structures; 2.4.3 SCADA and Cyber Systems; 2.4.4 Vulnerability Assessments; References; 3 EPA Drinking Water Security Research Program; 3.1 Background; 3.2 Research Drivers; 3.3 Objectives and Desired Outcomes; 3.4 Water Security Research; 3.4.1 Protection and Prevention
    Description / Table of Contents: 3.4.1.1 Blast Vulnerability Assessment Tool
    Note: Includes bibliographical references and indexes , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...