Critical infrastructure: homeland security and emergency preparedness
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton, Florida
CRC Press, Taylor & Francis Group
2013
|
Ausgabe: | 3rd ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Klappentext |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XXVI, 257 S. |
ISBN: | 9781466503458 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV040944058 | ||
003 | DE-604 | ||
005 | 20240903 | ||
007 | t | ||
008 | 130415s2013 xxu |||| 00||| eng d | ||
010 | |a 2013004138 | ||
020 | |a 9781466503458 |c hbk. : alk. paper |9 978-1-4665-0345-8 | ||
035 | |a (OCoLC)856795876 | ||
035 | |a (DE-599)BVBBV040944058 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-703 | ||
050 | 0 | |a HC110.C3 | |
082 | 0 | |a 363.34/70973 | |
084 | |a MC 9000 |0 (DE-625)122476: |2 rvk | ||
084 | |a MG 70950 |0 (DE-625)122860:12227 |2 rvk | ||
100 | 1 | |a Radvanovsky, Robert |e Verfasser |0 (DE-588)1340869853 |4 aut | |
245 | 1 | 0 | |a Critical infrastructure |b homeland security and emergency preparedness |c Robert S. Radvanovsky, Allan McDougall |
250 | |a 3rd ed. | ||
264 | 1 | |a Boca Raton, Florida |b CRC Press, Taylor & Francis Group |c 2013 | |
300 | |a XXVI, 257 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Infrastructure (Economics) |x Security measures |z United States | |
650 | 4 | |a Civil defense |z United States | |
650 | 4 | |a War damage, Industrial |z United States | |
650 | 4 | |a Emergency management |z United States | |
650 | 0 | 7 | |a Zivilschutz |0 (DE-588)4067915-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Katastrophenschutz |0 (DE-588)4029932-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |2 gnd |9 rswk-swf |
651 | 4 | |a USA | |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | 1 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |D s |
689 | 0 | 2 | |a Zivilschutz |0 (DE-588)4067915-9 |D s |
689 | 0 | 3 | |a Katastrophenschutz |0 (DE-588)4029932-6 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a McDougall, Allan |e Sonstige |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Bayreuth |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025922754&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Bayreuth |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025922754&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025922754 |
Datensatz im Suchindex
_version_ | 1809222371128639488 |
---|---|
adam_text |
Contents
Preface
.xvii
Acknowledgments
.xxiii
About the Authors
.xxv
Chapter
1
Introduction to Critical Infrastructure Assurance and Protection
.1
1.1
Introduction
.1
1.2
What Is Critical Infrastructure?
.2
1.3
What Is the Private Sector?
.3
1.4
What Is the Public Sector?
.4
1.5
What Is
CIP?
.4
1.6
What Is CIA?
.5
1.7
What Are Public-Private Partnerships?
.7
1.8
Critical Infrastructure Functions
.7
1.9
Evolution of Critical Infrastructure
.8
Notes
.9
Chapter
2
Demand, Capacity, Fragility, and the Emergence of Networks
.11
2.1
Introduction
.11
2.2
What Are We Trying to Protect? The Concept of Capacity.
11
2.3
Demand: The Reason for Capacity
.12
2.3.1
The Concept of Performance
.12
2.3.2
Local Impact and the Influence on Capacity
.12
2.3.3
Results of a Local Impact in the Immediate Sense.
13
2.3.4
Relevance to
CIP
.13
2.3.5
Push, Pull, Lag, and Delay in the Network
Environment
.14
2.4
At the Regional (Small System) Level
.14
2.4.1
Influence at the Small System Level
.14
2.4.2
Current Efforts and Research
.15
2.4.3
The Interdependency Hydra
.15
2.4.4
Network Fragmentation and Dissolution
.16
2.5
Cyberterrorism
.17
2.5.1
The Pendulum of Convergence
.17
2.5.2
Convergence and the Understanding of Threat
.18
2.5.3
Setting the Stage for Fragility
.19
2.5.4
Fragility and Destabilization of Systems
.21
2.5.5
Fragmentation and Dissolution of Networks
.22
2.6
Dissolution and Convergence: An Emerging Risk
.23
VIII
Contents
2.6.1
Convergence, Network Expansion,
Open
Architecture,
and Common Criteria.
23
2.7
Marking the Journey
.23
2.7.1
Overview
.24
2.7.2
Legislation: 107th Congress
(2001-2002).24
2.7.3
Legislation: 108th Congress to 109th Congress
.24
2.7.4
The State Today: A Recap
.25
2.7.5
Research and Understanding
.25
2.8
Authors' Notes
.26
Notes
.26
Chapter
3
Beyond National Frameworks
.29
3.1
Introduction
.29
3.2
Meeting the Dragons on the Map
.29
3.3
Who Owns the Treasure?
.30
3.4
What Value?
.31
3.5
Target Audiences
.31
3.6
Applying the NRF to National Response Efforts
.33
3.7
How Does the NRF Tie in with Local Activities?
.36
3.8
Areas of Potential Risk or Concern
.37
Notes
.38
Chapter
4
Public-Private Partnerships
.39
4.1
Introduction
.39
4.2
What Is a Public-Private Partnership (P3)?
.39
4.3
The P3 Spectrum
.40
4.4
Establishment of New Capacity
.41
4.5
Maintenance of Existing Capacity
.42
4.6
Networked User Fees and the Need for Oversight
.42
4.7
Other Forms of Public-Private Cooperation and the
Erosion of Governance
.44
4.8
Balancing Points
.45
4.9
Authors' Notes
.47
Notes
.47
Chapter
5
The Reinvention
ofinformation
Sharing and Intelligence
.49
5.1
Introduction
.49
5.2
Data vs. Information vs. Intelligence
.49
5.3
The Importance of Background to Context
.50
5.4
Context Affecting Sensitivity
.52
5.5
Enter the Cloud
.53
5.6
The Cloud as an Amplifier
.54
5.7
Clouds and Concealed Conduits
.55
Contents
¡x
5.8
Linking
the Trusted Computing Base and User
Communities
.57
5.9
Barriers to Information Sharing
.60
5.10
The Rise of Open Sources
.61
5.11
Open-Source Information and Intelligence
.61
5.12
An Approach to Information Sharing
—
The
Consequence-Benefit Ratio
.62
Chapter
6
Emergency Preparedness and Readiness
.63
6.1
Introduction
.63
6.2
The Rise of Core Offices
.63
6.3
First
Responder
.64
6.4
First
Responder
Classifications
.64
6.5
Guideline Classifications
.65
6.6
Example: North American Emergency Response
Guidebook
.66
6.7
Awareness-Level Guidelines
.66
6.7.1
Recognize Incidents
.67
6.7.2
Basic Protocols
.67
6.7.3
Know Self-Protection Measures
.68
6.7.4
Know Procedures for Protecting Incident Scenes
.69
6.7.5
Know Scene Security and Control Procedures
.69
6.7.6
Know How to Use Equipment Properly
.70
6.8
Performance-Level Guidelines
.71
6.9
Operational Levels Defined
.71
6.10
Level A: Operations Level
.72
6.10.1
Have Successfully Completed Awareness-Level
Training
.72
6.10.2
Know
ICS
Awareness Procedures
.72
6.10.3
Know Self-Protection and Rescue Measures
.74
6.11
Level B: Technician Level
.75
6.11.1
Know WMD Procedures
.75
6.11.2
Have Successfully Completed Awareness and
Performance-Level Training
.75
6.11.3
Know Self-Protection, Rescue, and Evacuation
Procedures
.76
6.11.4
Know and Follow Procedures for Performing
Specialized Tasks
.77
6.11.5
Know
ICS
Performance Procedures
.79
6.11.6
Planning and Management-Level Guidelines
.80
6.11.7
Successfully Completed Awareness,
Performance, and Management Training
.81
6.11.8
Know
ICS
Management Procedures
.81
6.12
Know Protocols to Secure, Mitigate, and Remove
HAZMAT
.82
x
Contents
6.13
Additional Protective Measures
.83
6.14
Understand the Development of the IAP
.84
6.15
Know and Follow Procedures for Protecting a Potential
Crime Scene
.85
6.16
Know Department Protocols for Medical Response
Personnel
.85
6.17
National Fire Prevention Association
472.86
6.18 OSHA
Hazardous Waste Operations and Emergency
Response
.86
6.19
Skilled Support Personnel
.87
6.20
Specialist Employee
.87
6.21
DOT HAZMAT Classifications
.87
6.21.1
DOT HAZMAT Class
1:
Explosives
.88
6.21.2
DOT HAZMAT Class
2:
Gases
.88
6.21.3
DOT HAZMAT Class
3:
Flammable Liquids
.88
6.21.4
DOT HAZMAT Class
4:
Flammable Solids
.88
6.21.5
DOT HAZMAT Class
5:
Oxidizers
.88
6.21.6
DOT HAZMAT Class
6:
Toxic Materials
.89
6.21.7
DOT HAZMAT Class
7:
Radioactive Materials
.89
6.21.8
DOT HAZMAT Class
8:
Corrosive Materials
.89
6.22
Importance of Implementing an Emergency Response
Plan
.89
6.23
Authors* Notes
.90
Notes
.90
Chapter
7
Security Vulnerability Assessment
.93
7.1
Introduction
.93
7.2
What Is a Risk Assessment?
.93
7.2.1
Identify Known, Apparent, or Evident Threats
.93
7.2.2
Estimate Threat Occurrences
.94
7.2.3
Identify and Rank Value, Sensitivity, and
Criticality of Operations Affected
.94
7.2.4
Estimate the Losses Should the Threat Occur
.94
7.2.5
Build the Threat Scenario
.95
7.2.6
Identify, Analyze, and Assess Vulnerabilities
.95
7.2.7
Identify Actions to Mitigate or Remove the Risk
.96
7.2.8
Document, Document, Document
.97
7.3
Methods of Assessing Risk
.97
7.4
Threat Risk Equations
.98
7.5
Comparison of Quantitative vs. Qualitative Risk
Assessments
.99
7.6
Challenges Associated with Assessing Risk
.100
7.7
Other Factors to Consider When Assessing Risk
.100
7.8
What Is an
SVA?
.100
7.8.1
Network-Based Vulnerability Assessment
.101
Contents
x¡
7.8.2 Computer-Based
Vulnerability Assessment
.101
7.8.3
Software-Based Vulnerability Assessment
.101
7.8.4
Physical-Based Vulnerability Assessment
.101
7.8.5
Protocol Assessment
.101
7.9
Reasons for Having an
SVA
.101
7.10
What Is a Threat?
.102
7.11
What Is Vulnerability?
.103
7.12
Countermeasures
.103
7.13
Vulnerability Assessment Framework
.104
7.14
Reasons for Using the VAF
.104
7.15
Federal Information Systems Control Auditing Manual
.105
7.16
General Methodologies of FISCAM Auditing
.106
7.17
What Are General Controls?
.107
7.18
What Are Application Controls?
.107
7.19
Caveats with Using an
SVA
.107
7.20
How the
SVA
Is Used
.108
7.21
Audience of an
SVA
.108
7.22
Initial
SVA
Plan
.109
7.23
Necessary Steps of an
SVA
.109
7.24
Critical Success Factors
.110
7.25
VAF Methodology
.
Ill
7.26
Initial Steps of the VAF
.112
7.27
VAF Step
1:
Establish the Organization
MEI
.112
7.27.1
Strategic-Level
MEI
.113
7.27.2
Tactical-Level
MEI
. 113
7.27.3
Resource Elements Comprising an
MEI
.114
7.27.4
Defining Team Composition
.114
7.27.5
Identifying Threat Awareness
.115
7.27.6
Potential Threat Sources
.115
7.27.7
Potential Threat Motivation
. 116
7.28
VAF Step
2:
Gather Data to Identify
MEI
Vulnerabilities.
116
7.28.1
Areas of Control
.117
7.28.2
Areas of Potential Compromise
.
1
17
7.28.3
Areas of Concern Using the Framework
.118
7.28.4
Control Objectives Used in the Framework
.118
7.28.4.1
Risk Management
.119
7.28.5
Data Classification
.120
7.29
VAF Step
3:
Analyze, Classify, and Prioritize
Vulnerabilities
.'20
7.30
Authors' Notes
.121
Notes
.121
Chapters Regulations
.'25
8.1
Introduction
.'25
8.2
The Role of Oversight
.125
x¡¡
Contents
8.3
The Effect of Globalization
.126
8.4
Conventions, Laws, and Regulations
.128
8.5
Guidance and Best Practices
.129
8.6
Prescriptive vs. Performance Based
.130
8.7
Impact on Criminal, Administrative, and Civil Law
.131
8.8
Potential Abuses of Authority and Credibility
.132
8.9
Government vs. Industry Self-Regulation
.133
8.10
Knowledge Gaps Arising from Performance-Based
Regulation
.134
8.11
Predictability in Prescriptive Systems: A Systemic
Vulnerability
.134
8.12
Authors' Notes
.134
Notes
.135
Chapter
9
Information Sharing and Analysis Centers
.137
9.1
Introduction
.137
9.2
What Is a Critical Infrastructure Asset?
.137
9.3
What Is an ISAC?
.138
9.4
Advantages of Belonging to an ISAC
.138
9.5
Access to ISAC Information
.138
9.6
Expanded ISAC Services
.139
9.7
Surface Transportation ISAC
.139
9.8
Supply Chain ISAC
.140
9.9
Public Transit ISAC
.140
9.10
American Public Transportation Association
.141
9.11
Association of American Railroads
.141
9.12
Transportation Technology Center,
Inc
.141
9.13
Railinc
.141
9.14
Water ISAC
.142
9.15
Association of State Drinking Water Administrators
.143
9.16
Water Environment Research Foundation
.143
9.17
Association of Metropolitan Water Agencies
.144
9.18
Association of Metropolitan Sewage Agencies
.144
9.19
National Association of Water Companies
.145
9.20
American Water Works Association
.145
9.21
AWWA Research Foundation
.145
9.22
Financial Services ISAC
.145
9.23
Science Applications International Corporation
.146
9.24
Electricity Sector ISAC
.146
9.25
Emergency Management and Response ISAC
.148
9.26
Information Technology ISAC
.149
9.27
National Coordinating Center for Telecommunications
.150
9.28
Communications Resource Information Sharing
.150
9.29
Government Emergency Telecommunications Service
.151
930
Telecommunications Service Priority
.153
Contents
xi¡¡
9.31
Shared
Resources
High Frequency
Radio Program.154
9.32 Network
Reliability and Interoperability
Council.155
9.33 National
Security Telecommunications Advisory
Committee
.155
9.34
Wireless Priority Services
.157
9.35
Alerting and Coordination Network
.160
9.36
Energy ISAC
.160
9.37
Energy Sector Security Consortium
.161
9.38
Chemical Sector ISAC
.161
9.39
Chemical Transportation Emergency Center
(CHEMTREC®)
.162
9.40
Healthcare Services ISAC
.162
9.41
Highway ISAC
.162
9.42
Cargo Theft Information Processing System
.163
9.43
American Trucking Associations
.163
9.44
HighwayWatch®
.163
9.45
Food and Agriculture ISAC
.164
9.46
FoodSHIELD
.165
9.47
Food Marketing Institute
.166
9.48
Multistate ISAC
.166
9.49
ISAC Council
.167
9.50
Worldwide ISAC
.167
9.51
Real Estate ISAC
.167
9.52
The Real Estate Roundtable
.168
9.53
Research and Educational Networking ISAC
.168
9.54
Biotechnology and Pharmaceutical ISAC
.168
9.55
Maritime ISAC
.168
9.56
Maritime Security Council
.169
9.57
Marine Transportation System National Advisory
Council
.170
9.58
Authors' Notes
.171
Notes
.171
Chapter
10
Supervisory Control and Data Acquisition
.181
10.1
Introduction
.181
10.2
What Are Control Systems?
.181
10.3
Types of Control Systems
.182
10.4
Components of Control Systems
.182
10.5
Vulnerability Concerns about Control Systems
.183
10.6
Adoption of Standardized Technologies with Known
Vulnerabilities
.184
10.7
Connectivity of Control Systems to Unsecured Networks.
184
10.8
Implementation Constraints of Existing Security
Technologies
.184
10.9
Insecure Connectivity to Control Systems
.185
xiv
Contents
10.10
Publicly Available Information about Control Systems
.185
10.11
Control Systems May Be Vulnerable to Attack
.186
10.12
Consequences Resulting from Control System
Compromises
.187
10.13
Wardialing
.187
10.13.1
Goals of Wardialing
.188
10.13.2
Threats Resulting from Wardialing
.188
10.14
Wardriving
.189
10.15
Warwalking
.189
10.16
Threats Resulting from Control System Attacks
.189
10.17
Issues in Securing Control Systems
.190
10.18
Methods of Securing Control Systems
.191
10.19
Technology Research Initiatives of Control Systems
.192
10.20
Security Awareness and Information Sharing Initiatives
.193
10.21
Process and Security Control Initiatives
.194
10.22
Securing Control Systems
.196
10.23
Implement Auditing Controls
.196
10.24
Develop Policy Management and Control Mechanisms
.196
10.25
Control Systems Architecture Development
.197
10.26
Segment Networks between Control Systems and
Corporate Enterprise
.197
10.27
Develop Methodologies for Exception Tracking
.197
10.28
Define an Incident Response Plan
.198
10.29
Similarities between Sectors
.198
10.30
U.S. Computer Emergency Readiness Team CSSP
.198
10.31
Control Systems Cyber Security Evaluation Tool (CSET).200
10.32
SCADA
Community Challenges
.201
10.33
The Future of
SCADA
.202
10.34
SCADA
Resources
.203
10.34.1
Blogs
.203
10.34.2
SCADASEC Mailing List
.203
10.34.3
Online
SCADA
and
SCADA
Security Resources
.204
10.35
Authors'Notes
.204
Notes
.204
Chapter
11
Critical Infrastructure Information
.207
11.1
Introduction
.207
11.2
What Is Critical Infrastructure Information?
.207
11.3
How Does the Government Interpret
СИ?
.209
11.4
Exemption
3
of the
FOI A
.209
11.5
Exemption
4
of the
FOIA
.210
11.6
Section
214
of the Homeland Security Act
.211
11.7
Enforcement of Section
214
of the Homeland Security
Act
.212
11.8
What Does "Sensitive but Unclassified" Mean?
.213
Contents xv
11.9 Information
Handling Procedures
.214
11.10
Freedom
ofinformation
Act
.214
11.11
Need to Know
.215
11.12
"For Official Use Only"
.216
11.13
Enforcement of FOUO Information
.217
11.14
Reviewing Web Site Content
.217
11.15
Export-Controlled Information
.219
11.16
Enforcement of Export-Controlled Information
.220
11.17
Source Selection Data
.220
11.18
Enforcement of Source Selection Data
.220
11.19
Privacy Information
.221
11.20
Enforcement of Privacy Information
.221
11.21
Unclassified Controlled Nuclear Information
.222
11.22
Enforcement of UCNI
.222
11.23
Critical Energy Infrastructure Information
.222
11.24
Enforcement of
СЕН
.223
11.25
Controlled Unclassified Information
.223
11.26
Lessons Learned Programs
.224
11.27
InfraGard
.225
11.28
Sensitive Unclassified Nonsafeguards Information
(SUNSI)
.225
11.29
Safeguards Information (SGI)
.226
11.30
Authors' Notes
.226
Notes
.226
Glossary
.235
Appendix
.241
Index
.245
DISASTER PLANNING
&
RECOVERY
Critical Infrastructure
»«■
Homeland Security and Emergency Preparedness
Since the initial inception of this book, there have been significant strides to safeguard
the operations of our worlds infrastructures. In recent years, there has also been
a shift to more fluid postures associated with resilience and the establishment of
redundant infrastructure. In keeping with the fast-changing nature of this field.
Critical Infrastructure: Homeland Security and Emergency Preparedness,
Third Edition has been revised and updated to reflect this shift in focus and to
incorporate the latest developments.
The book begins with the historical background of critical infrastructure and why
it is important to society. It then explores the current trend in understanding the
infrastructure's sensitivity to impacts that flow through its networked environment.
Embracing an 'all-hazards approach' to homeland security, critical infrastructure
protection and assurance, and emergency management, the authors examine:
•
The National Response Framework (NRF) and how it can be applied globally
•
The relationships between the public and private sectors, and the growing
concept of public-private partnerships
•
The shift from the need-to-know paradigm to one based on information sharing,
and the nature of necessary controls as this shift continues
•
The need for organizations to adopt resilient planning, implementation,
and decision-making processes in order to respond to changes within the
threat environment
•
What, where, why. and how risk assessments are to be performed, and why they
are needed
>
The impact of new regulation, individually applied self-regulation, industry and
government regulation, and law enforcement
In the final chapters, the book discusses current information sharing and analysis
centers (ISACs). distributed control systems, and supervisory control and data
acquisition
(SCADA)
systems and their challenges. It concludes by exploring current
challenges associated with establishing a trusted network across various sectors-
demonstrating how models of information can be categorized and communicated
within trusted communities to better assure the public-private relationship.
/—
f-i
/^*
Π
ì
6000
Broken
Sound
Parkv.
.
СК^ Г Г6ЅЅ
Suite il».
Boca
Raton,
f L
»487
Taylor
&
Francis Croup Mird Avenue
New York, NY
10017
an
informa
Dusmess
2
Park Square. MBuii Park
www.Uvtorandlranosqroup.com Abingdon, Oxon OX14 4RN, UK WWW. |
any_adam_object | 1 |
author | Radvanovsky, Robert |
author_GND | (DE-588)1340869853 |
author_facet | Radvanovsky, Robert |
author_role | aut |
author_sort | Radvanovsky, Robert |
author_variant | r r rr |
building | Verbundindex |
bvnumber | BV040944058 |
callnumber-first | H - Social Science |
callnumber-label | HC110 |
callnumber-raw | HC110.C3 |
callnumber-search | HC110.C3 |
callnumber-sort | HC 3110 C3 |
callnumber-subject | HC - Economic History and Conditions |
classification_rvk | MC 9000 MG 70950 |
ctrlnum | (OCoLC)856795876 (DE-599)BVBBV040944058 |
dewey-full | 363.34/70973 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.34/70973 |
dewey-search | 363.34/70973 |
dewey-sort | 3363.34 570973 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie Politologie |
edition | 3rd ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV040944058</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240903</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">130415s2013 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2013004138</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466503458</subfield><subfield code="c">hbk. : alk. paper</subfield><subfield code="9">978-1-4665-0345-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)856795876</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040944058</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HC110.C3</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.34/70973</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MC 9000</subfield><subfield code="0">(DE-625)122476:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MG 70950</subfield><subfield code="0">(DE-625)122860:12227</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Radvanovsky, Robert</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1340869853</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Critical infrastructure</subfield><subfield code="b">homeland security and emergency preparedness</subfield><subfield code="c">Robert S. Radvanovsky, Allan McDougall</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">3rd ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, Florida</subfield><subfield code="b">CRC Press, Taylor & Francis Group</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXVI, 257 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infrastructure (Economics)</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Civil defense</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">War damage, Industrial</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Emergency management</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zivilschutz</subfield><subfield code="0">(DE-588)4067915-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Katastrophenschutz</subfield><subfield code="0">(DE-588)4029932-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Zivilschutz</subfield><subfield code="0">(DE-588)4067915-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Katastrophenschutz</subfield><subfield code="0">(DE-588)4029932-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McDougall, Allan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bayreuth</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025922754&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bayreuth</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025922754&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025922754</subfield></datafield></record></collection> |
geographic | USA USA (DE-588)4078704-7 gnd |
geographic_facet | USA |
id | DE-604.BV040944058 |
illustrated | Not Illustrated |
indexdate | 2024-09-04T00:15:07Z |
institution | BVB |
isbn | 9781466503458 |
language | English |
lccn | 2013004138 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025922754 |
oclc_num | 856795876 |
open_access_boolean | |
owner | DE-703 |
owner_facet | DE-703 |
physical | XXVI, 257 S. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | CRC Press, Taylor & Francis Group |
record_format | marc |
spelling | Radvanovsky, Robert Verfasser (DE-588)1340869853 aut Critical infrastructure homeland security and emergency preparedness Robert S. Radvanovsky, Allan McDougall 3rd ed. Boca Raton, Florida CRC Press, Taylor & Francis Group 2013 XXVI, 257 S. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Infrastructure (Economics) Security measures United States Civil defense United States War damage, Industrial United States Emergency management United States Zivilschutz (DE-588)4067915-9 gnd rswk-swf Katastrophenschutz (DE-588)4029932-6 gnd rswk-swf Sicherheitspolitik (DE-588)4116489-1 gnd rswk-swf USA USA (DE-588)4078704-7 gnd rswk-swf USA (DE-588)4078704-7 g Sicherheitspolitik (DE-588)4116489-1 s Zivilschutz (DE-588)4067915-9 s Katastrophenschutz (DE-588)4029932-6 s DE-604 McDougall, Allan Sonstige oth Digitalisierung UB Bayreuth application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025922754&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Bayreuth application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025922754&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext |
spellingShingle | Radvanovsky, Robert Critical infrastructure homeland security and emergency preparedness Infrastructure (Economics) Security measures United States Civil defense United States War damage, Industrial United States Emergency management United States Zivilschutz (DE-588)4067915-9 gnd Katastrophenschutz (DE-588)4029932-6 gnd Sicherheitspolitik (DE-588)4116489-1 gnd |
subject_GND | (DE-588)4067915-9 (DE-588)4029932-6 (DE-588)4116489-1 (DE-588)4078704-7 |
title | Critical infrastructure homeland security and emergency preparedness |
title_auth | Critical infrastructure homeland security and emergency preparedness |
title_exact_search | Critical infrastructure homeland security and emergency preparedness |
title_full | Critical infrastructure homeland security and emergency preparedness Robert S. Radvanovsky, Allan McDougall |
title_fullStr | Critical infrastructure homeland security and emergency preparedness Robert S. Radvanovsky, Allan McDougall |
title_full_unstemmed | Critical infrastructure homeland security and emergency preparedness Robert S. Radvanovsky, Allan McDougall |
title_short | Critical infrastructure |
title_sort | critical infrastructure homeland security and emergency preparedness |
title_sub | homeland security and emergency preparedness |
topic | Infrastructure (Economics) Security measures United States Civil defense United States War damage, Industrial United States Emergency management United States Zivilschutz (DE-588)4067915-9 gnd Katastrophenschutz (DE-588)4029932-6 gnd Sicherheitspolitik (DE-588)4116489-1 gnd |
topic_facet | Infrastructure (Economics) Security measures United States Civil defense United States War damage, Industrial United States Emergency management United States Zivilschutz Katastrophenschutz Sicherheitspolitik USA |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025922754&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025922754&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT radvanovskyrobert criticalinfrastructurehomelandsecurityandemergencypreparedness AT mcdougallallan criticalinfrastructurehomelandsecurityandemergencypreparedness |