Book description
The Wiley Handbook of Science and Technology for Homeland Security is an essential and timely collection of resources designed to support the effective communication of homeland security research across all disciplines and institutional boundaries. Truly a unique work this 4 volume set focuses on the science behind safety, security, and recovery from both man-made and natural disasters has a broad scope and international focus.
The Handbook:
Educates researchers in the critical needs of the homeland security and intelligence communities and the potential contributions of their own disciplines
Emphasizes the role of fundamental science in creating novel technological solutions
Details the international dimensions of homeland security and counterterrorism research
Provides guidance on technology diffusion from the laboratory to the field
Supports cross-disciplinary dialogue in this field between operational, R&D and consumer communities
Table of contents
- Cover Page
-
Volume 1
- Copyright
- CONTENTS
- PREFACE
- CONTRIBUTORS
- INTRODUCTION AND OVERVIEW
-
CROSS-CUTTING THEMES AND TECHNOLOGIES
- TERRORISM RISK: CHARACTERISTICS AND FEATURES
- RISK ANALYSIS FRAMEWORKS FOR COUNTERTERRORISM*
- RISK ANALYSIS AND MANAGEMENT FOR CRITICAL ASSET PROTECTION
- LOGIC TREES: FAULT, SUCCESS, ATTACK, EVENT, PROBABILITY, AND DECISION TREES
- BAYESIAN NETWORKS
- USING RISK ANALYSIS TO INFORM INTELLIGENCE ANALYSIS
- VULNERABILITY ASSESSMENT
- RISK COMMUNICATION
- PROBABILISTIC RISK ASSESSMENT (PRA)
- SCENARIO ANALYSIS, COGNITIVE MAPS, AND CONCEPT MAPS
- TIME-DOMAIN PROBABILISTIC RISK ASSESSMENT METHOD FOR INTERDEPENDENT INFRASTRUCTURE FAILURE AND RECOVERY MODELING
- RISK TRANSFER AND INSURANCE: INSURABILITY CONCEPTS AND PROGRAMS FOR COVERING EXTREME EVENTS
- QUANTITATIVE REPRESENTATION OF RISK
- QUALITATIVE REPRESENTATION OF RISK*
- TERRORISM RISK
- TERRORIST THREAT ANALYSIS
- RISK ANALYSIS METHODS FOR CYBER SECURITY
- DEFEATING SURPRISE THROUGH THREAT ANTICIPATION AND POSSIBILITY MANAGEMENT
- MEMETICS FOR THREAT REDUCTION IN RISK MANAGEMENT
- HIGH CONSEQUENCE THREATS: ELECTROMAGNETIC PULSE
- HIGH CONSEQUENCE THREATS: NUCLEAR
- MODELING POPULATION DYNAMICS FOR HOMELAND SECURITY APPLICATIONS
-
SENSING AND DETECTION
- PROTECTING SECURITY SENSORS AND SYSTEMS
- THREAT SIGNATURES OF EXPLOSIVE MATERIALS
- RADIOACTIVE MATERIALS SENSORS
- KNOWLEDGE EXTRACTION FROM SURVEILLANCE SENSORS
- RADAR AND LiDAR PERIMETER PROTECTION SENSORS
- DESIGN CONSIDERATIONS IN DEVELOPMENT AND APPLICATION OF CHEMICAL AND BIOLOGICAL AGENT DETECTORS
- SENSING DISPERSAL OF CHEMICAL AND BIOLOGICAL AGENTS IN URBAN ENVIRONMENTS
- SENSING RELEASES OF HIGHLY TOXIC AND EXTREMELY TOXIC COMPOUNDS
- 2D-TO-3D FACE RECOGNITION SYSTEMS
- EYE AND IRIS SENSORS
- A TANDEM MOBILITY SPECTROMETER FOR CHEMICAL AGENT AND TOXIC INDUSTRIAL CHEMICAL MONITORING
- DYNAMIC LOAD BALANCING FOR ROBUST DISTRIBUTED COMPUTING IN THE PRESENCE OF TOPOLOGICAL IMPAIRMENTS
- PASSIVE RADIO FREQUENCY IDENTIFICATION (RFID) CHEMICAL SENSORS FOR HOMELAND SECURITY APPLICATIONS
-
PROTECTION, PREVENTION, RESPONSE AND RECOVERY
- PROTECTION AND PREVENTION: AN OVERVIEW
- PROTECTION AND PREVENTION: THREATS AND CHALLENGES FROM A HOMELAND DEFENSE PERSPECTIVE
- CONSEQUENCE MITIGATION
- SECURITY ASSESSMENT METHODOLOGIES FOR U.S. PORTS AND WATERWAYS
- DEFENDING AGAINST MALEVOLENT INSIDERS USING ACCESS CONTROL
- LESS-LETHAL PAYLOADS FOR ROBOTIC AND AUTOMATED RESPONSE SYSTEMS
- DEFENDING AGAINST DIRECTED ENERGY WEAPONS: RF WEAPONS AND LASERS
- THE SENSOR WEB: ADVANCED TECHNOLOGY FOR SITUATIONAL AWARENESS
- Critical Information Infrastructure Protection
-
Volume 2
- Copyright
- CONTENTS
- CONTRIBUTORS
- FINLAND
- FRANCE
- GERMANY
- HUNGARY
- INDIA
- ITALY
- JAPAN
- REPUBLIC OF KOREA*
- MALAYSIA
- THE NETHERLANDS*
- NEW ZEALAND*
- NORWAY*
- POLAND*
- RUSSIA
- SINGAPORE
- SPAIN
- SWEDEN
- SWITZERLAND
- UNITED KINGDOM
- UNITED STATES
- EUROPEAN UNION (EU)
- THE FORUM OF INCIDENT RESPONSE AND SECURITY TEAMS (FIRST)
- GROUP OF EIGHT (G8)*
- NORTH ATLANTIC TREATY ORGANIZATION (NATO)
- ORGANIZATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT (OECD)*
- UNITED NATIONS (UN)
- THE WORLD BANK GROUP
-
CYBER SECURITY
- CLASSES OF VULNERABILITIES AND ATTACKS
- AUTHENTICATION, AUTHORIZATION, ACCESS CONTROL, AND PRIVILEGE MANAGEMENT
- ADVANCED ATTACKER DETECTION AND UNDERSTANDING WITH EMERGING HONEYNET TECHNOLOGIES
- DETECTION OF HIDDEN INFORMATION, COVERT CHANNELS, AND INFORMATION FLOWS
- ATTACK TRACEBACK AND ATTRIBUTION
- CYBER FORENSICS
- CYBER SECURITY POLICY SPECIFICATION AND MANAGEMENT
- MULTILEVEL SECURITY
- CYBER SECURITY STANDARDS
- CYBER SECURITY METRICS AND MEASURES
- TRUSTED PLATFORMS: THE ROOT OF SECURITY
- HIGH ASSURANCE: PROVABLY SECURE SYSTEMS AND ARCHITECTURES
- SECURITY OF DISTRIBUTED, UBIQUITOUS, AND EMBEDDED COMPUTING PLATFORMS
- SECURITY OF WEB APPLICATION AND SERVICES AND SERVICE-ORIENTED ARCHITECTURES
- CYBER SECURITY TECHNOLOGY USABILITY AND MANAGEMENT
- CYBER SECURITY EDUCATION, TRAINING, AND AWARENESS
- INDUSTRIAL PROCESS CONTROL SYSTEM SECURITY
- CYBER SECURITY FOR THE BANKING AND FINANCE SECTOR
-
SYSTEM AND SECTOR INTERDEPENDENCIES
- SYSTEM AND SECTOR INTERDEPENDENCIES: AN OVERVIEW
- SYSTEM AND SECTOR INTERDEPENDENCIES: AN OVERVIEW OF RESEARCH AND DEVELOPMENT
- PRESIDENT’S COMMISSION ON CRITICAL INFRASTRUCTURE PROTECTION
- INPUT–OUTPUT MODELING FOR INTERDEPENDENT INFRASTRUCTURE SECTORS
- APPLICATION OF A CONDITIONAL RISK ASSESSMENT METHODOLOGY FOR PRIORITIZATION OF CRITICAL INFRASTRUCTURE
- CRITICAL INFRASTRUCTURES AT RISK: A EUROPEAN PERSPECTIVE
- VULNERABILITY ASSESSMENT METHODOLOGIES FOR INTERDEPENDENT SYSTEMS
- ROBUSTNESS, RESILIENCE, AND SECURITY OF NATIONAL CRITICAL INFRASTRUCTURE SYSTEMS
- INHERENTLY SECURE NEXT-GENERATION COMPUTING AND COMMUNICATION NETWORKS FOR REDUCING CASCADING IMPACTS
- IMPLICATIONS OF REGULATION ON THE PROTECTION OF CRITICAL INFRASTRUCTURES
- CHARACTERIZING INFRASTRUCTURE FAILURE INTERDEPENDENCIES TO INFORM SYSTEMIC RISK
- MANAGING CRITICAL INFRASTRUCTURE INTERDEPENDENCIES: THE ONTARIO APPROACH
- ANALYSIS OF CASCADING INFRASTRUCTURE FAILURES
- WATER INFRASTRUCTURE INTERDEPENDENCIES
- INFRASTRUCTURE DEPENDENCY INDICATORS
- OBJECT-ORIENTED APPROACHES FOR INTEGRATED ANALYSIS OF INTERDEPENDENT ENERGY NETWORKS
- GEOSPATIAL DATA SUPPORT FOR INFRASTRUCTURE INTERDEPENDENCIES ANALYSIS
- THE MILITARY ROOTS OF CRITICAL INFRASTRUCTURE ANALYSIS AND ATTACK
- NETWORK FLOW APPROACHES FOR ANALYZING AND MANAGING DISRUPTIONS TO INTERDEPENDENT INFRASTRUCTURE SYSTEMS
-
Volume 3
- Copyright
- CONTENTS
- CONTRIBUTORS
-
SOCIAL AND BEHAVIORAL RESEARCH
- SOCIAL AND PSYCHOLOGICAL ASPECTS OF TERRORISM
- HUMAN SENSATION AND PERCEPTION
- HUMAN BEHAVIOR AND DECEPTION DETECTION
- SPEECH AND VIDEO PROCESSING FOR HOMELAND SECURITY
- TRAINING AND LEARNING DEVELOPMENT FOR HOMELAND SECURITY
- TRAINING FOR INDIVIDUAL DIFFERENCES IN LIE DETECTION ABILITY
- DETERRENCE: AN EMPIRICAL PSYCHOLOGICAL MODEL
-
DECISION SUPPORT SYSTEMS
- TECHNOLOGIES FOR REAL-TIME DATA ACQUISITION, INTEGRATION, AND TRANSMISSION
- MULTI-OBJECTIVE DECISION ANALYSIS
- NATURALISTIC DECISION MAKING, EXPERTISE, AND HOMELAND SECURITY
- CLASSIFICATION AND CLUSTERING FOR HOMELAND SECURITY APPLICATIONS
- EXPERIENCE WITH EXPERT JUDGMENT: THE TU DELFT EXPERT JUDGMENT DATA
- SECURITY AND SAFETY SYNERGY
- CRITICAL INFRASTRUCTURE PROTECTION DECISION MAKING
- THE USE OF THREAT, VULNERABILITY, AND CONSEQUENCE (TVC) ANALYSIS FOR DECISION MAKING ON THE DEPLOYMENT OF LIMITED SECURITY RESOURCES
-
KEY APPLICATION AREAS
- VULNERABILITY OF THE DOMESTIC FOOD SUPPLY CHAIN
- THE GLOBAL FOOD SUPPLY CHAIN
- ECONOMIC IMPACT OF A LIVESTOCK ATTACK
- SOCIAL, PSYCHOLOGICAL, AND COMMUNICATION IMPACTS OF AN AGROTERRORISM ATTACK
- FOREIGN ANIMAL DISEASES AND FOOD SYSTEM SECURITY
- INSECTS AS VECTORS OF FOODBORNE PATHOGENS
- FARM LEVEL CONTROL OF FOREIGN ANIMAL DISEASE AND FOOD-BORNE PATHOGENS
- RISK ASSESSMENT, RISK MANAGEMENT, AND PREVENTIVE BEST PRACTICES FOR RETAILERS AND FOODSERVICE ESTABLISHMENTS
- RISK ASSESSMENT AND SAFETY OF THE FOOD SUPPLY
- MICROBIOLOGICAL DETECTORS FOR FOOD SAFETY APPLICATIONS
- GENERAL DETECTOR CAPABILITIES FOR FOOD SAFETY APPLICATIONS
- MITIGATING PUBLIC HEALTH RISKS FROM AN AGROTERROR ATTACK
- PROCESSING AND PACKAGING THAT PROTECTS THE FOOD SUPPLY AGAINST INTENTIONAL CONTAMINATION
- EARLY DETECTION AND DIAGNOSIS OF HIGH-CONSEQUENCE PLANT PESTS IN THE UNITED STATES
- MITIGATING CONSEQUENCES OF PATHOGEN INOCULATION INTO PROCESSED FOOD
- MICROBIAL FORENSICS AND PLANT PATHOGENS: ATTRIBUTION OF AGRICULTURAL CRIME
- POTENTIAL FOR HUMAN ILLNESS FROM ANIMAL TRANSMISSION OR FOOD-BORNE PATHOGENS
- LIVESTOCK AGROTERRORISM AND THE POTENTIAL PUBLIC HEALTH RISK
- THE ROLE OF FOOD SAFETY IN FOOD SECURITY
- CARVER + SHOCK: FOOD DEFENSE SOFTWARE DECISION SUPPORT TOOL
- THE EDEN HOMELAND SECURITY PROJECT: EDUCATIONAL OPPORTUNITIES IN FOOD AND AGROSECURITY
- DECONTAMINATION AND DISPOSAL OF CONTAMINATED FOODS
- CARCASS DISPOSAL OPTIONS
- OPTIMAL INVESTMENTS IN MITIGATING AGROTERRORISM RISKS
- MID-INFRARED SENSORS FOR THE RAPID ANALYSIS OF SELECT MICROBIAL FOOD BORNE PATHOGENS
- PULSENET: A PROGRAM TO DETECT AND TRACK FOOD CONTAMINATION EVENTS
- DEVELOPING RISK METRICS TO ESTIMATE RISKS OF CATASTROPHIC BIOLOGICAL AND BIOTERRORIST EVENTS: APPLICATIONS TO THE FOOD INDUSTRY
- WATER
-
Volume 4
- Copyright
- CONTENTS
- CONTRIBUTORS
- WATER SUPPLY AND WASTEWATER MANAGEMENT REGULATIONS, STANDARDS, AND GUIDANCE
- ROLES OF FEDERAL, STATE, AND LOCAL AUTHORITIES IN WATER INFRASTRUCTURE SECURITY
- POTENTIAL CONTAMINATION AGENTS OF INTEREST
- UNDERSTANDING THE IMPLICATIONS OF CRITICAL INFRASTRUCTURE INTERDEPENDENCIES FOR WATER
- SURVEILLANCE METHODS AND TECHNOLOGIES FOR WATER AND WASTEWATER SYSTEMS
- DESIGNING AN OPTIMUM WATER MONITORING SYSTEM
- EMERGENCY RESPONSE PLANNING FOR DRINKING WATER SYSTEMS
- TREATABILITY OF CONTAMINANTS IN CONVENTIONAL SYSTEMS
- DECONTAMINATION METHODS FOR DRINKING WATER TREATMENT AND DISTRIBUTION SYSTEMS
- DECONTAMINATION METHODS FOR WASTEWATER AND STORMWATER COLLECTION AND TREATMENT SYSTEMS
- PREVENTION OF CONTAMINATION OF DRINKING WATER IN BUILDINGS AND LARGE VENUES
- COMMUNICATIONS AND INFORMATION INFRASTRUCTURE
-
ENERGY SYSTEMS
- COMPARATIVE RISK ASSESSMENT FOR ENERGY SYSTEMS: A TOOL FOR COMPREHENSIVE ASSESSMENT OF ENERGY SECURITY
- LESSONS LEARNED FOR REGIONAL AND GLOBAL ENERGY SECURITY
- LARGE-SCALE ELECTRICITY TRANSMISSION GRIDS: LESSONS LEARNED FROM THE EUROPEAN ELECTRICITY BLACKOUTS
- INTERDEPENDENT ENERGY INFRASTRUCTURE SIMULATION SYSTEM
- SELF-HEALING AND RESILIENT ENERGY SYSTEMS
- NANO-ENABLED POWER SOURCES
-
PUBLIC HEALTH
- THREAT FROM EMERGING INFECTIOUS DISEASES
- FOREIGN DENGUE VIRUS PRESENTS A LOW RISK TO U.S. HOMELAND
- DATA SOURCES FOR BIOSURVEILLANCE
- BIOSURVEILLANCE TRADECRAFT
- THE NORTH CAROLINA BIOSURVEILLANCE SYSTEM
- ESSENCE: A PRACTICAL SYSTEMS FOR BIOSURVEILLANCE
- BIODEFENSE PRIORITIES IN LIFE-SCIENCE RESEARCH: CHEMICAL THREAT AGENTS
- DEVELOPMENT OF RADIATION COUNTERMEASURES
- CHALLENGES TO MEDICAL COUNTERMEASURES AGAINST CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR (CBRN) AGENTS
- MEDICAL COUNTERMEASURES AGAINST EMERGING THREAT AGENTS
- BIODEFENSE WORKFORCE
- HEALTH RISK ASSESSMENT FOR RADIOLOGICAL, CHEMICAL, AND BIOLOGICAL ATTACKS*
-
TRANSPORTATION SECURITY
- ROLES AND IMPLICATIONS OF TRANSPORTATION SYSTEMS IN HOMELAND SECURITY
- TRANSPORTATION SYSTEM AS A SECURITY CHALLENGE
- POPULATION EVACUATIONS
- EMERGENCY TRANSPORTATION OPERATIONS AND CONTROL
- ULTRA-SCALE COMPUTING FOR EMERGENCY EVACUATION
- HARDEN SECURITY OF HIGH-RISK AND CRITICAL SUPPLY CHAINS
- TRANSPORTATION SECURITY PERFORMANCE MEASURES
- INTELLIGENCE SYSTEMS
- Contents
- Contributors
- Index
Product information
- Title: Wiley Handbook of Science and Technology for Homeland Security, 4 Volume Set
- Author(s):
- Release date: April 2010
- Publisher(s): Wiley
- ISBN: 9780471761303
You might also like
book
Radio over Fiber for Wireless Communications: From Fundamentals to Advanced Topics
A comprehensive evaluation of Fi-Wi, enabling readers to design links using channel estimation and equalization algorithms …
book
Local Networks and the Internet: From Protocols to Interconnection
This title covers the most commonly used elements of Internet and Intranet technology and their development. …
book
Perdue Farms: A Vertically Integrated Supply Chain
This new case study examines the remarkable vertically integrated supply chain built by Perdue Farms, which …
audiobook
Transformed
Help transform your business and innovate like the world's top tech companies! Transformed: Moving to the …