Transportation protection and homeland security /
"In Transportation Protection and Homeland Security, Frank Spellman--the author of over 100 books on safety, occupational health, and natural and environmental sciences--examines the state of our transportation protection readiness"--Provided by publisher.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Lanham, Maryland :
Bernan Press,
[2017]
|
Colección: | Critical Infrastructure And Homeland Security
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Introduction: Natural versus intentional disasters
- References and recommended reading
- The language of transportation: Terms and units of measurement
- Key terms
- Units of transportation measurement
- Cross-sector dependencies
- References and recommended reading
- The transportation sector: Transportation sector profile goals
- Transportation system sector modes
- Aviation transportation mode: an overview
- Maritime transportation mode: an overview
- Mass transit and passenger rail: an overview
- Highway infrastructure & motor carrier mode: an overview
- Freight rail mode: an overview
- Pipeline mode: an overview
- Postal and shipping mode: an overview
- References and recommended reading
- The calculus and language of terrorism: Genesis of modern day terrorism
- Assess + guess = prevention + resilience
- Vocabulary of hate
- References and recommended reading
- Bridge and tunnel security: Bridges and tunnels: attractive targets
- Bridges and tunnels prioritization, risk assessment and threats
- Bridges and their critical components
- Tunnel vulnerability
- Bridge and tunnel mitigation, control and retrofit measures
- References and recommended reading
- Vulnerability assessment: Introduction
- Vulnerability
- Insider threat vulnerability
- Vulnerability assessment (VA)
- Vulnerability assessment methodology
- Vulnerability assessment procedures
- References and recommended reading
- Supervisory control and data acquisition (SCADA):
- The transportation sector and cyberspace
- What is SCADA?
- SCADA systems used in pipeline operations
- SCADA vulnerabilities
- Examples of SCADA accidents
- Steps to improve SCADA security
- References and recommended reading
- Preparation: when is enough, enough?: Introduction
- Threats and incidents
- References and recommended reading
- Security techniques and hardware: Build a fence around it
- Security hardware devices
- Petrochemical and waste monitoring devices
- Communication integration
- Cyber protection devices
- References and recommended reading.