Read more
Informationen zum Autor John Voeller worked at the Executive Office of the President as a senior analyst on homeland security and as a consultant for the Department of Homeland Security on all aspects of infrastructure protection. He is Senior Vice President, Chief Knowledge Officer and Chief Technology Officer at Black and Veatch, the largest privately held engineering company in the United States. He has served as Technical Leader, Chemical, for the Biological, Radiological Technology Alliance (CBRTA), working on advanced technology to deal with terrorist threats with 13 major companies. He has also served as chairman of ASME's Critical Asset Protection Initiative, leading eight teams of world experts in developing industry's agenda for homeland security needs as well as planning first responder actions and risk analysis of terrorist and catastrophic incidents. Klappentext The Wiley Handbook of Science and Technology for Homeland Security is an essential and timely collection of resources designed to support the effective communication of homeland security research across all disciplines and institutional boundaries. Truly a unique work this 4 volume set focuses on the science behind safety, security, and recovery from both man-made and natural disasters has a broad scope and international focus.The Handbook:* Educates researchers in the critical needs of the homeland security and intelligence communities and the potential contributions of their own disciplines* Emphasizes the role of fundamental science in creating novel technological solutions* Details the international dimensions of homeland security and counterterrorism research* Provides guidance on technology diffusion from the laboratory to the field* Supports cross-disciplinary dialogue in this field between operational, R&D and consumer communities Zusammenfassung The Wiley Handbook of Science and Technology for Homeland Security is an essential and timely collection of resources on every area of homeland security. Volumes will be available individually and as a complete set. Edited by the biggest names in their respective fields, each volume includes the latest information in this growing field. Inhaltsverzeichnis 1 INTRODUCTORY AND OVERVIEW. 2 CROSS-CUTTING THEMES AND TECHNOLOGIES. 2.1 Risk Modeling and Vulnerability Assessment. Terrorism Risk: Characteristics and Features. Risk Analysis Frameworks for Counterterrorism. Logic Trees: Fault, Success, Attack, Event, Probability, and Decision Trees. Bayesian Networks. Using Risk Analysis to Inform Intelligence Analysis. Vulnerability Assessment. Multi-objective Decision Analysis. Risk Communication. Experience with Expert Judgment: the TU Delft Expert Judgment Data. Probabilistic Risk Assessment (PRA). Deterrence: An Empirical Psychological Model. Scenario Analysis, Cognitive Maps, And Concept Maps. Policy Development. Consequence Mitigation: Current Research and Future Trends. Time-Domain Probabilistic Risk Assessment Method for Interdependent Infrastructure Failure and Recovery Modeling. Social and Psychological Aspects. Risk Transfer and Insurance: Insurability Concepts and Programs for Covering Extreme Events. Quantitative Representation of Risk. Qualitative Representation of Risk. Terrorist Organizations and Modeling Trends. Cyber-Security. Defeating Surprise Through Threat Anticipation and Possibility Management. Memetics for Threat Reduction in Risk Management. High Consequence Threats: Electromagnetic Pulse. High Consequence Events: Nuclear Explosions. Modeling Population Dynamics for Homeland Security Applications. 2.2 Sensing and Detection. Protecting Security Sensors and Systems. Threat Signatures of Explosive Materials. Radioactive Materials Sensors. Knowled...
List of contents
1 Introductory and Overview.
2 Cross-Cutting Themes and Technologies.
3 Key Application Areas.