LEADER 03221nam 2200589 a 450 001 9910144333003321 005 20170815115819.0 010 $a1-281-03221-2 010 $a9786611032210 010 $a1-61344-910-0 010 $a0-470-22837-7 010 $a0-470-22836-9 035 $a(CKB)1000000000376208 035 $a(EBL)316209 035 $a(OCoLC)476106680 035 $a(SSID)ssj0000252202 035 $a(PQKBManifestationID)11200386 035 $a(PQKBTitleCode)TC0000252202 035 $a(PQKBWorkID)10180093 035 $a(PQKB)10370218 035 $a(MiAaPQ)EBC316209 035 $a(EXLCZ)991000000000376208 100 $a20070625d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aStrategies for protecting national critical infrastructure assets$b[electronic resource] $ea focus on problem-solving /$fJohn Sullivant 210 $aHoboken, NJ $cWiley-Interscience$dc2007 215 $a1 online resource (646 p.) 300 $aIncludes index. 311 $a0-471-79926-2 327 $aIntroduction -- Environments that influence the security assessment : threats, western values, and the national critical infrastructure sectors -- The security assessment : what, why, and when -- A proven security assessment methodology -- Task 1: Project strategic planning : understanding service requirements -- Task 1: Critical assessment : understanding the service environment -- Task 3: Identify and characterize : threats to the service environment -- Task 4: Evaluate program effectiveness -- Task 5: Program analyses -- Reporting security assessment results -- The water sector -- The energy sector -- The transportation sector -- The chemical and hazardous materials sector -- The agriculture and food sector -- The banking and finance sector -- The telecommunications sector -- 330 $aStrategies for Protecting National Critical Infrastructure Assets eases the research burden, develops investigative protocols, and pulls together data into a comprehensive and practical guide, to help the serious reader understand advanced concepts and techniques of risk assessment with an emphasis on meeting the security needs of the critical national infrastructure. The text is divided into five major sections, which are further broken down by individual chapters, each addressing one element of risk assessment as well as focusing attention on applying the risk assessment methodology t 606 $aInfrastructure (Economics)$xSecurity measures$zUnited States 606 $aInfrastructure (Economics)$xRisk assessment$zUnited States 606 $aTerrorism$zUnited States$xPrevention 608 $aElectronic books. 615 0$aInfrastructure (Economics)$xSecurity measures 615 0$aInfrastructure (Economics)$xRisk assessment 615 0$aTerrorism$xPrevention. 676 $a005.80973 676 $a332/.0971 700 $aSullivant$b John$0959769 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910144333003321 996 $aStrategies for protecting national critical infrastructure assets$92175042 997 $aUNINA