|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBSCO_on1110717297 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
190723s2019 gw fod z000 0 eng d |
040 |
|
|
|a DEGRU
|b eng
|e rda
|e pn
|c DEGRU
|d OH#
|d N$T
|d OCLCF
|d UBY
|d EBLCP
|d OCLCQ
|d OCLCO
|d K6U
|d OCLCQ
|d OCLCO
|d DEGRU
|
020 |
|
|
|a 3110622572
|
020 |
|
|
|a 9783110620719
|
020 |
|
|
|a 3110620715
|
020 |
|
|
|a 9783110622577
|q (electronic bk.)
|
024 |
7 |
|
|a 10.1515/9783110622577
|2 doi
|
035 |
|
|
|a (OCoLC)1110717297
|
050 |
|
4 |
|a TC530
|
072 |
|
7 |
|a TEC009010
|2 bisacsh
|
082 |
0 |
4 |
|a 363.34/936
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Lange, Jos de,
|e author.
|
245 |
1 |
0 |
|a Security of Flood Defenses /
|c Jos de Lange.
|
264 |
|
1 |
|a Berlin ;
|a Boston :
|b De Gruyter,
|c [2019]
|
264 |
|
4 |
|c ©2019
|
300 |
|
|
|a 1 online resource (191 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
0 |
|
|a Integrated Security Science ;
|v 2
|
505 |
0 |
0 |
|t Frontmatter --
|t Preface --
|t Contents --
|t 1. Introduction --
|t 2. Summary --
|t 3. History of flood defenses in the Low Countries --
|t 4. Delta Plan flood defense --
|t 5. Storm Surge Barriers --
|t 6. Flood barriers in defensive strategies --
|t 7. Flood defenses in offensive strategies --
|t 8. Systematic analysis of flood barrier technologies --
|t 9. Calculating security risks --
|t 10. Terrorism threat and flood defenses --
|t 11. Conclusions --
|t 12. Recommendations --
|t 13. Epilogue --
|t Appendix --
|t List of Figures --
|t List of Tables --
|t Bibliography --
|t Source account --
|t Index
|
546 |
|
|
|a In English.
|
588 |
0 |
|
|a Online resource; title from PDF title page (publisher's Web site, viewed 23. Jul 2019).
|
520 |
|
|
|a Addressing physical and cyber security issues in hazardous installations which could result in major loss of containment of hazardous materials which in turn can result in major fires, explosions, and dispersion of toxic materials. Integrity Security aims to analyze the physical and cyber vulnerabilities taken advantage by adversaries, and also to provide measures for preventing or delaying intentional incidents and mitigating the consequences.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Flood control.
|
650 |
|
0 |
|a Flood damage prevention.
|
650 |
|
0 |
|a Rivers
|x Regulation.
|
650 |
|
6 |
|a Inondations
|x Maîtrise.
|
650 |
|
6 |
|a Dommages causés par les inondations
|x Prévention.
|
650 |
|
6 |
|a Cours d'eau
|x Régularisation.
|
650 |
|
7 |
|a flood control.
|2 aat
|
650 |
|
7 |
|a Technology & Engineering
|x Chemical & Biochemical.
|2 bisacsh
|
650 |
|
7 |
|a Flood control
|2 fast
|
650 |
|
7 |
|a Flood damage prevention
|2 fast
|
650 |
|
7 |
|a Rivers
|x Regulation
|2 fast
|
776 |
0 |
8 |
|i Print version:
|z 9783110620719
|
776 |
0 |
8 |
|i Print version:
|z 9783110620610
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2196941
|z Texto completo
|
938 |
|
|
|a De Gruyter
|b DEGR
|n 9783110622577
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5994722
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2196941
|
994 |
|
|
|a 92
|b IZTAP
|