Cover image for Wiley handbook of science and technology for homeland security
Title:
Wiley handbook of science and technology for homeland security
Publication Information:
Hoboken, NJ : Wiley, 2010
Physical Description:
4 v. (xviii, 2888 p.) : ill., maps ; 27 cm.
ISBN:
9780471761303

9780470138465

9780470138489

9780470138496

9780470138519
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010253178 UA926 W55 2010 r v. 1 Reference Book Handbook
Searching...
Searching...
30000010253177 UA926 W55 2010 r v.2 Reference Book Handbook
Searching...
Searching...
30000010253176 UA926 W55 2010 r v.3 Reference Book Handbook
Searching...
Searching...
30000010253175 UA926 W55 2010 r v.4 Reference Book Handbook
Searching...

On Order

Summary

Summary

The Wiley Handbook of Science and Technology for Homeland Security is an essential and timely collection of resources designed to support the effective communication of homeland security research across all disciplines and institutional boundaries. Truly a unique work this 4 volume set focuses on the science behind safety, security, and recovery from both man-made and natural disasters has a broad scope and international focus.

The Handbook:

Educates researchers in the critical needs of the homeland security and intelligence communities and the potential contributions of their own disciplines Emphasizes the role of fundamental science in creating novel technological solutions Details the international dimensions of homeland security and counterterrorism research Provides guidance on technology diffusion from the laboratory to the field Supports cross-disciplinary dialogue in this field between operational, R&D and consumer communities


Author Notes

John Voeller worked at the Executive Office of the President as a senior analyst on homeland security and as a consultant for the Department of Homeland Security on all aspects of infrastructure protection. He is Senior Vice President, Chief Knowledge Officer and Chief Technology Officer at Black and Veatch, the largest privately held engineering company in the United States. He has served as Technical Leader, Chemical, for the Biological,
Radiological Technology Alliance (CBRTA), working on advanced technology to deal with terrorist threats with 13 major companies. He has also served as chairman of ASME's Critical Asset Protection Initiative, leading eight teams of world experts in developing industry's agenda for homeland security needs as well as planning first responder actions and risk analysis of terrorist and catastrophic incidents.


Table of Contents

1 Introductory And Overview
2 Cross-Cutting Themes And Technologies
2.1 Risk Modeling and Vulnerability Assessment
Terrorism Risk: Characteristics and Features
Risk Analysis Frameworks for Counterterrorism
Logic Trees: Fault, Success, Attack, Event, Probability, and Decision Trees
Bayesian Networks
Using Risk Analysis to Inform Intelligence Analysis
Vulnerability Assessment
Multi-objective Decision Analysis
Risk Communication
Experience with Expert Judgment: the TU Delft Expert Judgment Data
Probabilistic Risk Assessment (PRA)
Deterrence: An Empirical Psychological Model
Scenario Analysis, Cognitive Maps, And Concept Maps
Policy Development
Consequence Mitigation: Current Research and Future Trends
Time-Domain Probabilistic Risk Assessment Method for Interdependent Infrastructure Failure and Recovery Modeling
Social and Psychological Aspects
Risk Transfer and Insurance: Insurability Concepts and Programs for Covering Extreme Events
Quantitative Representation of Risk
Qualitative Representation of Risk
Terrorist Organizations and Modeling Trends
Cyber-Security
Defeating Surprise Through Threat Anticipation and Possibility Management
Memetics for Threat Reduction in Risk Management
High Consequence Threats: Electromagnetic Pulse
High Consequence Events: Nuclear Explosions
Modeling Population Dynamics for Homeland Security Applications
2.2 Sensing and Detection
Protecting Security Sensors and Systems
Threat Signatures of Explosive Materials
Radioactive Materials Sensors
Knowledge Extraction from Surveillance Sensors
Sensing Dispersal of Chemical and Biological Agents in Urban Environments
Sensing Releases of Highly Toxic and Extremely Toxic Compounds
2D-to-3D Face Recognition Systems
Eye and Iris Sensors
Dynamic Load Balancing for Robust Distributed Computing in the Presence of Topological Impairments
2.3 Cyber Security
Advanced Attacker Detection and Understanding with Emerging Honeynet Technologies
Attack Traceback and Attribution
Authentication, Authorization, Access Control, and Privilege Management
Classes of Vulnerabilities and Attacks
Cyber Forensics
Cyber Security for the Banking and Finance Sector
Cyber Security Policy Specification and Management
Cyber Security Standards
Cyber Security Technology Usability and Management
Detection of hidden information, covert channels and information flows
High Assurance: Provably Secure Systems and Architectures
Industrial Process Control System Security
Multilevel Security
Security of Distributed, Ubiquitous, and Embedded Computing Platforms
Trusted Platforms: The Root of Security
2.4 Protection and Prevention
Protection and Prevention: an Overview
Less-Lethal Payloads for Robotic and Automated Response Systems
Protection and Prevention: Security Assessment Methodologies for US Ports and Waterways
Homeland Security Perspective on Threats and Challenges
The Sensor Web: Advanced Technology for Situational Awareness
Defending Against Directed Energy Weapons: RF Weapons and Lasers
The Forum of Incident Response and Security Teams (FIRST)
Critical Information Infrastructure Protection, Overview
Critical Information Infrastructure Protection, Australia
Critical Information Infrastructure Protection, Austria
Critical Information Infrastructure Protection, Brazil
Critical Information Infrastructure Protection, Canada
Critical Information Infrastructure Protection, Estonia
Critical Information Infrastructure Protection, Finland
Critical Information Infrastructure Protection, France
Critical Information Infrastructure Protection, Germany
Critical Information Infrastructure Protection, Hungary
Critical Information Infrastructure Protection, India
Critical Information Infrastructure Protection, Italy
Critical Information Infrastructure Protection, Japan
Critical Information Infrastructure Protection, Malaysia
Critical Information Infrastructure Protection, New Zealand
Critical Information Infrastructure Protection, Norway
Critical Information Infrastructure Protection, Poland
Critical Information Infrastructure Protection, Republic of Korea
Critical Information Infrastructure Protection, Russia
Critical Information Infrastructure Protection, Singapore
Critical Information Infrastructure Protection, Spain
Critical Information Infrastructure Protection, Sweden
Critical Information Infrastructure Protection, Switzerland
Critical Information Infrastructure Protection, the Netherlands
Critical Information Infrastructure Protection, United Kingdom
Critical Information Infrastructure Protection, United Nations
Critical Information Infrastructure Protection, United States
Critical Information Infrastructure Protection, the World Bank Group
Critical Information Infrastructure Protection, European Union
Critical Information Infrastructure Protection, NATO
Critical Information Infrastructure Protection, Group of Eight (G8)
Organisation for Economic Co-Operation and Development (OECD)
2.5 Human Social and Behavioral Research
Audience sensing and tailoring for preferred and forced decision style
Behavioral screening
Biometrics Sensors
Consequence attribution (forward and reverse)
Deception detection, tools for counterterrorism and homeland security
Human behavior and how it adjusts our actions in complex events in both positive and negative ways
Human emotion and its involvement in overt events for both observer and victim
Human perception and attention in information-rich and event-overloa situations
Information analysis and distillation under time constraints
Information Collection and presentation in high data volume and multiple timescale situations
Information repurposing and fusion
Temporal analysis and synchronization for proper understanding of real event sequences
2.6 System and Sector Interdependencies
System and Sector Interdependencies: An Overview
The Genesis of Interdependencies Concepts
Analysis of Cascading Infrastructure Failures
Characterizing Infrastructure Failure Interdependencies to Inform Systemic Risk
Critical Infrastructure Protection Decision Making
Cyber Security Metrics and Measures
Geospatial Data Support for Infrastructure Interdependencies Analysis
Implications of Regulation on the Protection of Critical Infrastructures
Infrastructure Dependency Indicators
Inherently Secure Next-Generation Computing and Communication Networks for Reducing Cascading Impacts
Input-Output Modeling for Interdependent Infrastructure Sectors
Interdependent Energy Infrastructure Simulation System
Managing Critical Infrastructure Interdependencies: The Ontario Approach
Network Flow Approaches for Analyzing and Managing Disruptions to Interdependent Infrastructure Systems
Object-Oriented Approaches for Integrated Analysis of Interdependent Energy Networks
President's Commission on Critical Infrastructure Protection and Presidential Decision Directive 63
Vulnerability Assessment Methodologies for Interdependent Systems
Water Infrastructure Interdependencies
2.7 Human Information Systems
Human Sensation and Perception
Naturalistic Decision Making, Expertise, and Homeland Security
Security and Safety Synergy: Advancing Security with Human Factors Knowledge
Human Behavior and Deception Detection
Speech and Video Processing for Homeland Security
Classification and Clustering for Homeland Security Applications
Training and Learning Development for Homeland Security
3 Key Application Areas
3.1 Agriculture and Food Supply
Carcass Disposal Options
Decontamination and Disposal of Contaminated Foods
Developing Risk Metrics to Estimate Risks of Catastrophic Biological and Bioterrorist Events: Applications to the Food Industry
Early Detection and Diagnosis of High-Consequence Plant Pests in the United States
Insects As Vectors Of Foodborne Pathogens
Livestock Agroterrorism and the Potential Public Health Risk
Microbial Forensics and Plant Pathogens: Attribution of Agricultural Crime
Mid-Infrared Sensors for The Rapid Analysis of Select Microbial Food Borne Pathogens
Mitigating Consequences of Pathogen Inoculation into Processed Food
Mitigating Public Health Risks from an Agroterror Attack
Optimal Investments in Mitigating Agroterrorism Risks
Potential for Human Illness from Animal Transmission or Food-Borne Pathogens
Pulsenet: A Program to Detect and Track Food Contamination Events
Risk Assessment, Risk Management, and Preventive Best Practices for Retailers and Foodservice Establishments
Risk Communication: An Overlooked Tool in Combating Terrorism
Social, Psychological, and Communication Impacts of an Agroterrorism Attack
The EDEN Homeland Security Project: Educational Opportunities in Food and Agrosecurity
The Global Food Supply Chain
The Role of Food Safety in Food Security/Defense
The Use of Threat, Vulnerability, and Consequence (TVC) Analysis for Decision Making on The Deployment of Limited Security Resources
Vulnerability of the Domestic Food Supply Chain
3.2 Water
Decontamination methods for drinking water treatment and distribution systems
Decontamination Methods for Wastewater and Stormwater Collection and Treatment Systems
Designing an Optimum Water Monitoring System
Drinking Water Supply, Treatment and Distribution Practice in the United States
Emergency response planning for drinking water systems
Health Risk Assessment for Radiological, Chemical, and Biological Attacks
Homeland Security and Wastewater Treatment
Protecting Water Infrastructure in the United States? Setting Priorities, Conducting Research, and Sharing Results
Roles of Federal, State, and Local Authorities in Water Infrastructure Security
Surveillance Methods and Technologies for Water and Wastewater Systems
Treatability of Contaminants in Conventional Systems
Understanding the Implications of Critical Infrastructure Interdependencies for Water
Water Infrastructure and Water Use in the United States
Water Supply and Wastewater Management Regulations, Standards, and Guidance
3.3 Communications and Information Infrastructure
Wireless Security
Critical Infrastructure Protection: Telecommunication
3.4 Energy Systems
Comparative Risk Assessment for Energy Systems: A Tool for Comprehensive Assessment of Energy Security
Large-Scale Electricity Transmission Grids: Lessons Learned from the European Electricity Blackouts
3.5 Public Health
Biodefense Priorities in Life-science Research: Chemical Threat Agents
Biodefense Workforce
Biosurveillance Tradecraft
Developing a Threat List--Emerging Infectious Diseases
Development of Radiation Countermeasures
Farm Level Control of Foreign Animal Disease and Food-Borne Pathogens
Importation of Foreign Dengue Virus Presents Low Risk to US Homeland
Spread Will Not Parallel that of West Nile Virus
North Carolina Biosurveillance System
Practical Systems for Biosurveillance: The Military Perspective and Essence
3.6 Transportation Security
Harden Security of High-Risk and Critical Supply Chains
Population Evacuations
Roles and Implications of Transportation Systems in Homeland Security
The Nation's Transportation System as a Security Challenge
Transportation Operations and Control
Transportation Security Performance Measures
3.7 Intelligence Systems
Craniofacial Aging
File Forensics and Conversion
Finding Inadvertent Release of Information
Nano-Enabled Power Sources
New Approaches to IRIS Recognition: One-Dimensional Algorithms
Spectrally Adaptive Nanoscale Quantum Dot Sensors