LEADER 02852nam 2200517 450 001 9910493194403321 005 20211005195524.0 010 $a3-8467-5651-2 024 7 $a10.30965/9783846756515 035 $a(CKB)4920000000126240 035 $z(OCoLC)74270018 035 $a(nllekb)BRILL9783846756515 035 $a(MiAaPQ)EBC6516483 035 $a(Au-PeEL)EBL6516483 035 $a(OCoLC)1243533860 035 $a(EXLCZ)994920000000126240 100 $a20191130d2013 uy 0 101 0 $aeng 135 $aurun| uuuua 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $2rdacarrier 200 10$aArchitektur und Atmosphäre /$fGernot Böhme 205 $a2nd ed. 210 1$aPaderborn :$cWilhelm Fink Verlag,$d2013. 215 $a1 online resource 311 $a3-7705-5651-8 327 $aPreliminary Material -- Vorwort -- Zur Einführung: Ästhetik der Atmosphären -- Leben mit Atmosphären -- Atmosphären im Bild -- Licht und Ton im Raum -- Atmosphären in der Architektur -- Kritische Perspektiven -- Danksagung -- Namensregister. 330 $aDas Buch konstatiert, dass mit und nach der Postmoderne etwas Grundsätzlicheres geschehen ist als nur eine Pluralisierung der Stile, ein Wiederzulassen des Ornamentes und des historischen Zitats. Der Autor spricht von einem Neuen Humanismus in der Architektur. Anders als bei Vitruv, bei dem der Mensch das Grundmaß für die Architektur abgab und insofern dessen Geometrie bestimmte, sei der Mensch heute als Benutzer, als jemand, der sich in und in der Umgebung von Gebäuden in bestimmter Weise befindet, zum Bezugspunkt des Bauens geworden. Das eigentliche Thema der Architektur, behauptet Böhme, ist der Raum und zwar der gestimmte Raum, also die Atmosphäre. Das Buch führt umfassend in die Ästhetik der Atmosphären ein, studiert die Rolle nicht-materieller Elemente, wie Licht und Ton, in der Architektur, problematisiert die traditionelle Auffassung von Architektur als einer visual art, führt das Atmosphärenkonzept in Fallstudien durch (z.B. Stadtplanung und Kirchenbau) und widmet sich schließlich den kritischen Aspekten einer Architektur der Atmosphären: der möglichen politischen und ökonomischen Manipulation durch eine Architektur, die zum Bühnenbild gerät. 606 $aArchitecture$xAesthetics 606 $aAesthetics, Modern 606 $aArchitecture and society 606 $aArt and society 608 $aElectronic books. 615 0$aArchitecture$xAesthetics. 615 0$aAesthetics, Modern. 615 0$aArchitecture and society. 615 0$aArt and society. 676 $a720.103 700 $aBöhme$b Gernot$0386480 801 0$bNL-LeKB 801 1$bNL-LeKB 906 $aBOOK 912 $a9910493194403321 996 $aArchitektur und Atmosphare$91082888 997 $aUNINA LEADER 11667nam 22005053 450 001 9911006655603321 005 20250910135226.0 010 $a9780323954082$b(electronic bk.) 010 $z9780323954099 035 $a(MiAaPQ)EBC31354283 035 $a(Au-PeEL)EBL31354283 035 $a(CKB)32154701500041 035 $a(Exl-AI)31354283 035 $a(EXLCZ)9932154701500041 100 $a20240528d2024 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecuring integrated transportation networks 205 $a1st ed. 210 1$aSan Diego :$cElsevier,$d2024. 210 4$d©2024. 215 $a1 online resource (436 pages) 311 08$aPrint version: Gordon, Gary A. Securing Integrated Transportation Networks San Diego : Elsevier,c2024 9780323954099 327 $aFront Cover -- SECURING INTEGRATED TRANSPORTATION NETWORKS -- SECURING INTEGRATED TRANSPORTATION NETWORKS -- Copyright -- Contents -- Foreword -- Acknowledgments -- I - The evolution of transportation security -- 1 - Overview of transportation and why we want to secure it? -- Prologue -- 1.1 What is transportation? -- 1.2 Freight transportation -- 1.2.1 International transportation -- 1.3 Moving people -- 1.4 Components of transportation -- 1.4.1 Rights of way -- 1.4.2 Vehicles -- 1.5 What is transportation infrastructure? -- 1.5.1 Infrastructure and operations -- 1.5.2 Scheduling: How it shapes operations -- 1.5.3 How operations shape it -- 1.5.4 Unique challenges of infrastructure -- 1.5.4.1 Useful life -- 1.5.4.2 Financial concerns -- 1.5.4.3 Safety and security -- 1.6 Evolution of transportation modes -- 1.7 Cybersystem dependence -- 1.8 Threats and vulnerabilities overview -- 1.8.1 Natural disasters -- 1.8.2 Manmade disasters -- 1.8.3 Combined threats -- 1.9 Securing transportation infrastructure and operations -- 1.9.1 Human impact (movement of people) -- 1.9.2 Economic impact (movement of goods) -- References -- 2 - Transportation security before and after 9/11 -- 2.1 Introduction -- 2.2 Transportation security: A little history -- 2.3 Protecting the railroads -- 2.3.1 Railroads in wartime -- 2.4 Shifts in modal preferences -- 2.5 Intermodalism -- 2.6 Protecting transportation infrastructure -- 2.6.1 Historical development -- 2.6.2 Terrorism and changing international trade forever -- 2.7 Enhancing initiatives with cross-sector alliances -- 2.7.1 Alliances, both public and private -- 2.7.2 Internationalization of trade alliances -- 2.7.3 Private-private alliances -- 2.8 Summary -- References -- 3 - Federal agencies-Regulation and the promotion of economic growth -- 3.1 Introduction -- 3.2 A complex evolution. 327 $a3.3 Railroads: Where it all began -- 3.3.1 Economic regulation -- 3.3.2 Safety regulation -- 3.3.3 Security regulation -- 3.4 Motor carriers: Protecting a nascent industry -- 3.4.1 Promoting highways -- 3.4.2 Economic regulation -- 3.4.3 Safety regulation -- 3.4.4 Security regulation -- 3.5 Transit: A formerly embedded activity -- 3.5.1 Deemphasizing the automobile -- 3.5.2 Safety regulation -- 3.5.3 Security regulation -- 3.6 Aviation: Bifurcation of economic and safety regulations -- 3.6.1 Economic regulation -- 3.6.2 Safety regulation -- 3.6.3 Security regulation -- 3.7 Ocean maritime shipping -- 3.7.1 Promotion of seaborne commerce -- 3.7.2 Economic regulation -- 3.7.3 Safety regulation -- 3.7.4 Security regulation -- 3.8 Inland maritime shipping -- 3.8.1 Economic regulation -- 3.8.2 Safety regulation -- 3.8.3 Security regulation -- 3.9 Pipelines -- 3.9.1 Economic regulation -- 3.9.2 Safety regulation -- 3.9.3 Security regulation -- 3.10 Let's not forget intermodal -- 3.11 Sorting out the federal agencies -- 3.12 Summary -- Appendix A: Compendium of federal transportation-related legislation-1800s -- Appendix B: Compendium of federal transportation-related legislation-1900-1950 -- Appendix C: Compendium of federal transportation-related legislation-1951-2000 -- Appendix D: Compendium of federal transportation-related legislation-2000+ -- References -- 4 - Who are the parties involved and what are their relationships?? -- 4.1 Introduction -- 4.1.1 Case scenario -- 4.2 Modal partners -- 4.2.1 Aviation -- 4.2.2 Bus and rail transit -- 4.2.3 Freight and passenger rail -- 4.2.4 Highway and motor carriers -- 4.2.4.1 Infrastructure ownership -- 4.2.5 Intermodal -- 4.2.6 Maritime -- 4.2.7 Pipelines -- 4.3 Cooperative and partnered security programs and initiatives -- 4.3.1 Cross-sector dependencies -- 4.3.2 Chemical sector. 327 $a4.3.3 Transportation dependencies -- 4.3.4 Visible Intermodal Prevention and Response -- 4.3.5 Container Security Initiative -- 4.3.6 Certified Cargo Screening Program -- 4.3.7 Customs Trade Partnership Against Terrorism -- 4.3.8 Private and public sector cooperation -- 4.4 Summary -- References -- 5 - Components and economics of transportation security -- 5.1 Introduction -- 5.1.1 Derived demand -- 5.1.2 Dual production -- 5.1.3 Spatial and temporal utility -- 5.1.4 Transit time -- 5.1.5 Complexity -- 5.1.6 A primer on protection -- 5.2 The nature of transportation infrastructure -- 5.2.1 Infrastructure specifics -- 5.3 Analysis of benefits -- 5.4 Dictated infrastructure -- 5.5 Safety and security -- 5.6 Transit time -- 5.7 Economic effects and goods -- 5.8 Total cost of ownership: Initial costs and ongoing maintenance expenses -- 5.9 Asset utilization -- 5.10 Mutual aid -- 5.11 Intermodal operations -- 5.12 Adding protective assets -- 5.13 The problem of scale -- 5.14 Determining probability -- 5.15 Summary -- References -- Suggested additional reference materials -- II - Exposure -- 6 - Nature of transported people and goods -- 6.1 Introduction -- 6.2 Transporting people -- 6.2.1 Transporting for employment -- 6.2.2 Transporting for nonvocational commercial activity -- 6.2.3 Transporting for social purposes -- 6.2.4 Transporting for and as entertainment -- 6.2.5 Secondary incidental purposes -- 6.3 Freight -- 6.3.1 Finished products -- 6.3.2 Semifinished products -- 6.3.3 Refined materials -- 6.3.4 Basic materials -- 6.4 Modal attributes -- 6.4.1 Accessibility -- 6.4.2 Capability -- 6.4.3 Ease of arrangement -- 6.4.4 Transit time -- 6.4.5 Reliability -- 6.4.6 Price and cost -- 6.4.7 Security -- 6.5 Security concerns according to supply chain tier -- 6.6 Summary -- References -- 7 - Threats, vulnerabilities, consequences, and risks. 327 $a7.1 Introduction -- 7.2 Definitions -- 7.2.1 Threats -- 7.2.1.1 Multiple threats -- 7.2.1.2 Scope -- 7.2.2 Vulnerabilities -- 7.2.3 Consequences -- 7.2.4 Risk -- 7.3 Transportation infrastructure -- 7.3.1 Railroads -- 7.3.1.1 Rights-of-way -- 7.3.1.2 Train robbery -- 7.3.1.3 Stations and terminals -- 7.3.1.4 Hazmat-loaded railcars -- 7.3.1.5 Explosive devices -- 7.3.1.6 Maintenance facilities -- 7.3.1.7 Cyberattacks -- 7.3.2 Motor carriers -- 7.3.2.1 Hijacking and cargo theft -- 7.3.2.2 Transporting illegal cargo -- 7.3.2.3 Destruction of vehicles -- 7.3.3 Ocean maritime -- 7.3.3.1 Cyberthreats -- 7.3.3.2 Hijacking and piracy (risks at sea) -- 7.3.3.3 Compromised cargo -- 7.3.3.4 Malfunctioning navigational systems -- 7.3.3.5 Risks in port -- 7.3.4 Inland maritime -- 7.3.5 Aviation -- 7.3.5.1 Passenger terminals -- 7.3.5.2 Airfreight -- 7.3.5.3 Aircraft -- 7.3.5.4 Cyberattacks -- 7.3.6 Pipelines -- 7.3.6.1 Rights-of-way -- 7.3.6.2 Storage facilities -- 7.3.6.3 Cyberattacks -- 7.3.7 Transit -- 7.3.7.1 Passengers -- 7.3.7.2 Vehicles -- 7.3.7.3 Transit personnel -- 7.3.7.4 Cyberattacks -- 7.3.8 Let's not forget intermodal -- 7.4 Summary -- References -- 8 - Natural versus manmade disasters -- 8.1 Introduction -- 8.2 All-hazards Approach -- 8.3 Developing a common lexicon -- 8.4 Phases of emergencies or incidents1 -- 8.4.1 Planning -- 8.4.2 Preparedness -- 8.4.3 Transition from preparedness to response -- 8.4.4 Response -- 8.4.5 Recovery -- 8.4.6 Mitigation -- 8.5 Agencies -- 8.5.1 Federal government agencies -- 8.5.2 State, territorial, and local government agencies -- 8.6 Stakeholders -- 8.7 What should transportation organizations and stakeholders do? -- 8.7.1 Planning -- 8.7.2 Preparedness -- 8.7.3 Response -- 8.7.4 Recovery -- 8.7.5 Mitigation -- 8.8 Continuous preparedness -- 8.9 Summary -- Appendix A: Short glossary of emergency management terms. 327 $aReferences -- 9 - Assessing risk -- 9.1 Introduction -- 9.2 What are the risks to transportation systems? -- 9.2.1 Railroads -- 9.2.2 Transit -- 9.2.3 Highway/motor carriers -- 9.2.4 Pipelines -- 9.2.5 Aviation -- 9.2.6 Maritime operations -- 9.3 Assessing risk -- 9.3.1 Qualitatively assessing risk -- 9.3.1.1 Modified CARVER model -- 9.3.2 Quantitatively assessing risk -- 9.3.2.1 Blue Ribbon panel method -- 9.3.2.2 TSA risk management analysis tool -- 9.3.2.3 Rail corridor risk assessment system -- 9.3.2.4 Maritime security risk assessment method -- 9.3.2.5 Pipeline risk assessment models -- 9.3.2.6 Transit risk assessments -- 9.3.2.7 Risk assessment similarities and differences -- 9.4 Future assessment needs -- References -- 10 - Cyber threats and risks -- 10.1 Introduction to cybersecurity threats and transportation -- 10.1.1 Overview -- 10.1.2 Outsider versus insider threats -- 10.1.3 What are the objectives? -- 10.2 How we got to where we are -- 10.2.1 Some working definitions -- 10.2.2 IT and OT convergence -- 10.3 Modal-specific IT and OT systems -- 10.3.1 Aviation -- 10.3.1.1 Segment overview -- 10.3.1.2 Some key risks and vulnerabilities -- 10.3.2 Maritime transportation -- 10.3.2.1 Seagoing maritime transportation -- 10.3.2.2 Cyber risk for seagoing maritime transportation -- 10.3.2.3 Inland maritime transportation -- 10.3.2.4 Cyber risk for inland maritime transportation -- 10.3.3 Railroad transportation -- 10.3.3.1 Cyber risk for railroad transportation -- 10.3.4 Highway transportation -- 10.3.4.1 Cyber risk for highway transportation -- 10.3.5 Rail and bus transit -- 10.3.6 Pipeline transportation -- 10.3.6.1 Cyber risk for pipeline transportation -- 10.4 Common threads means common threats -- 10.5 Generic means of protecting from cyberattacks -- 10.5.1 Cybersecurity policies -- 10.5.2 Early detection processes. 327 $a10.5.3 Responses to cyberattack. 330 $aThis book, 'Securing Integrated Networks,' delves into the complexities of ensuring security across various transportation networks, including freight, passenger, and intermodal systems. Authored by experts in civil and environmental engineering and business, it examines the evolution of security practices, particularly post-9/11, highlighting the interconnectedness of cybersystems and physical security measures. The text covers a wide array of topics such as federal regulations, the role of different transportation modes, and the threats they face. It emphasizes the importance of collaboration between public and private sectors and the need for continuous preparedness against both natural and manmade disasters. The book is intended for professionals and researchers in transportation security, providing insights into best practices and emerging challenges in the field.$7Generated by AI. 606 $aTransportation$7Generated by AI 606 $aComputer security$7Generated by AI 615 0$aTransportation 615 0$aComputer security 700 $aGordon$b Gary A$012299 701 $aYoung$b Richard R.$f1946-$01846149 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9911006655603321 996 $aSecuring integrated transportation networks$94430252 997 $aUNINA