Security of Flood Defenses /:
Addressing physical and cyber security issues in hazardous installations which could result in major loss of containment of hazardous materials which in turn can result in major fires, explosions, and dispersion of toxic materials. Integrity Security aims to analyze the physical and cyber vulnerabil...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin ; Boston :
De Gruyter,
[2019]
|
Schriftenreihe: | Integrated Security Science ;
2 |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Addressing physical and cyber security issues in hazardous installations which could result in major loss of containment of hazardous materials which in turn can result in major fires, explosions, and dispersion of toxic materials. Integrity Security aims to analyze the physical and cyber vulnerabilities taken advantage by adversaries, and also to provide measures for preventing or delaying intentional incidents and mitigating the consequences. |
Beschreibung: | 1 online resource (191 pages) |
ISBN: | 3110622572 9783110620719 3110620715 9783110622577 |
Internformat
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1110717297 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 190723s2019 gw fod z000 0 eng d | ||
040 | |a DEGRU |b eng |e rda |e pn |c DEGRU |d OH# |d N$T |d OCLCF |d UBY |d EBLCP |d OCLCQ |d OCLCO |d K6U |d OCLCQ |d OCLCO |d DEGRU |d OCLCL |d UKAHL | ||
020 | |a 3110622572 | ||
020 | |a 9783110620719 | ||
020 | |a 3110620715 | ||
020 | |a 9783110622577 |q (electronic bk.) | ||
024 | 7 | |a 10.1515/9783110622577 |2 doi | |
035 | |a (OCoLC)1110717297 | ||
050 | 4 | |a TC530 | |
072 | 7 | |a TEC009010 |2 bisacsh | |
082 | 7 | |a 363.34/936 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Lange, Jos de, |e author. | |
245 | 1 | 0 | |a Security of Flood Defenses / |c Jos de Lange. |
264 | 1 | |a Berlin ; |a Boston : |b De Gruyter, |c [2019] | |
264 | 4 | |c ©2019 | |
300 | |a 1 online resource (191 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | 0 | |a Integrated Security Science ; |v 2 | |
505 | 0 | 0 | |t Frontmatter -- |t Preface -- |t Contents -- |t 1. Introduction -- |t 2. Summary -- |t 3. History of flood defenses in the Low Countries -- |t 4. Delta Plan flood defense -- |t 5. Storm Surge Barriers -- |t 6. Flood barriers in defensive strategies -- |t 7. Flood defenses in offensive strategies -- |t 8. Systematic analysis of flood barrier technologies -- |t 9. Calculating security risks -- |t 10. Terrorism threat and flood defenses -- |t 11. Conclusions -- |t 12. Recommendations -- |t 13. Epilogue -- |t Appendix -- |t List of Figures -- |t List of Tables -- |t Bibliography -- |t Source account -- |t Index |
546 | |a In English. | ||
588 | 0 | |a Online resource; title from PDF title page (publisher's Web site, viewed 23. Jul 2019). | |
520 | |a Addressing physical and cyber security issues in hazardous installations which could result in major loss of containment of hazardous materials which in turn can result in major fires, explosions, and dispersion of toxic materials. Integrity Security aims to analyze the physical and cyber vulnerabilities taken advantage by adversaries, and also to provide measures for preventing or delaying intentional incidents and mitigating the consequences. | ||
650 | 0 | |a Flood control. |0 http://id.loc.gov/authorities/subjects/sh85049151 | |
650 | 0 | |a Flood damage prevention. |0 http://id.loc.gov/authorities/subjects/sh85049155 | |
650 | 0 | |a Rivers |x Regulation. |0 http://id.loc.gov/authorities/subjects/sh85114254 | |
650 | 6 | |a Inondations |x Maîtrise. | |
650 | 6 | |a Dommages causés par les inondations |x Prévention. | |
650 | 6 | |a Cours d'eau |x Régularisation. | |
650 | 7 | |a flood control. |2 aat | |
650 | 7 | |a Technology & Engineering |x Chemical & Biochemical. |2 bisacsh | |
650 | 7 | |a Flood control |2 fast | |
650 | 7 | |a Flood damage prevention |2 fast | |
650 | 7 | |a Rivers |x Regulation |2 fast | |
758 | |i has work: |a Security of Flood Defenses (Text) |1 https://id.oclc.org/worldcat/entity/E39PCYHXrYYypGbGw8X3cvBmq3 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |z 9783110620719 |
776 | 0 | 8 | |i Print version: |z 9783110620610 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2196941 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH42139631 | ||
938 | |a De Gruyter |b DEGR |n 9783110622577 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL5994722 | ||
938 | |a EBSCOhost |b EBSC |n 2196941 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1110717297 |
---|---|
_version_ | 1816882497555791872 |
adam_text | |
any_adam_object | |
author | Lange, Jos de |
author_facet | Lange, Jos de |
author_role | aut |
author_sort | Lange, Jos de |
author_variant | j d l jd jdl |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TC530 |
callnumber-raw | TC530 |
callnumber-search | TC530 |
callnumber-sort | TC 3530 |
callnumber-subject | TC - Hydraulic and Ocean Engineering |
collection | ZDB-4-EBA |
contents | Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Summary -- 3. History of flood defenses in the Low Countries -- 4. Delta Plan flood defense -- 5. Storm Surge Barriers -- 6. Flood barriers in defensive strategies -- 7. Flood defenses in offensive strategies -- 8. Systematic analysis of flood barrier technologies -- 9. Calculating security risks -- 10. Terrorism threat and flood defenses -- 11. Conclusions -- 12. Recommendations -- 13. Epilogue -- Appendix -- List of Figures -- List of Tables -- Bibliography -- Source account -- Index |
ctrlnum | (OCoLC)1110717297 |
dewey-full | 363.34/936 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.34/936 |
dewey-search | 363.34/936 |
dewey-sort | 3363.34 3936 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03527cam a2200637Mi 4500</leader><controlfield tag="001">ZDB-4-EBA-on1110717297</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">190723s2019 gw fod z000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DEGRU</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">DEGRU</subfield><subfield code="d">OH#</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">UBY</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DEGRU</subfield><subfield code="d">OCLCL</subfield><subfield code="d">UKAHL</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3110622572</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110620719</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3110620715</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110622577</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9783110622577</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1110717297</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TC530</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC009010</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.34/936</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lange, Jos de,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security of Flood Defenses /</subfield><subfield code="c">Jos de Lange.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">De Gruyter,</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (191 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Integrated Security Science ;</subfield><subfield code="v">2</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter --</subfield><subfield code="t">Preface --</subfield><subfield code="t">Contents --</subfield><subfield code="t">1. Introduction --</subfield><subfield code="t">2. Summary --</subfield><subfield code="t">3. History of flood defenses in the Low Countries --</subfield><subfield code="t">4. Delta Plan flood defense --</subfield><subfield code="t">5. Storm Surge Barriers --</subfield><subfield code="t">6. Flood barriers in defensive strategies --</subfield><subfield code="t">7. Flood defenses in offensive strategies --</subfield><subfield code="t">8. Systematic analysis of flood barrier technologies --</subfield><subfield code="t">9. Calculating security risks --</subfield><subfield code="t">10. Terrorism threat and flood defenses --</subfield><subfield code="t">11. Conclusions --</subfield><subfield code="t">12. Recommendations --</subfield><subfield code="t">13. Epilogue --</subfield><subfield code="t">Appendix --</subfield><subfield code="t">List of Figures --</subfield><subfield code="t">List of Tables --</subfield><subfield code="t">Bibliography --</subfield><subfield code="t">Source account --</subfield><subfield code="t">Index</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from PDF title page (publisher's Web site, viewed 23. Jul 2019).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Addressing physical and cyber security issues in hazardous installations which could result in major loss of containment of hazardous materials which in turn can result in major fires, explosions, and dispersion of toxic materials. Integrity Security aims to analyze the physical and cyber vulnerabilities taken advantage by adversaries, and also to provide measures for preventing or delaying intentional incidents and mitigating the consequences.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Flood control.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85049151</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Flood damage prevention.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85049155</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Rivers</subfield><subfield code="x">Regulation.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85114254</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Inondations</subfield><subfield code="x">Maîtrise.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Dommages causés par les inondations</subfield><subfield code="x">Prévention.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cours d'eau</subfield><subfield code="x">Régularisation.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">flood control.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Technology & Engineering</subfield><subfield code="x">Chemical & Biochemical.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Flood control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Flood damage prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Rivers</subfield><subfield code="x">Regulation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Security of Flood Defenses (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCYHXrYYypGbGw8X3cvBmq3</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9783110620719</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9783110620610</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2196941</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH42139631</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">De Gruyter</subfield><subfield code="b">DEGR</subfield><subfield code="n">9783110622577</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL5994722</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2196941</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1110717297 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:29:33Z |
institution | BVB |
isbn | 3110622572 9783110620719 3110620715 9783110622577 |
language | English |
oclc_num | 1110717297 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (191 pages) |
psigel | ZDB-4-EBA |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | De Gruyter, |
record_format | marc |
series2 | Integrated Security Science ; |
spelling | Lange, Jos de, author. Security of Flood Defenses / Jos de Lange. Berlin ; Boston : De Gruyter, [2019] ©2019 1 online resource (191 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Integrated Security Science ; 2 Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Summary -- 3. History of flood defenses in the Low Countries -- 4. Delta Plan flood defense -- 5. Storm Surge Barriers -- 6. Flood barriers in defensive strategies -- 7. Flood defenses in offensive strategies -- 8. Systematic analysis of flood barrier technologies -- 9. Calculating security risks -- 10. Terrorism threat and flood defenses -- 11. Conclusions -- 12. Recommendations -- 13. Epilogue -- Appendix -- List of Figures -- List of Tables -- Bibliography -- Source account -- Index In English. Online resource; title from PDF title page (publisher's Web site, viewed 23. Jul 2019). Addressing physical and cyber security issues in hazardous installations which could result in major loss of containment of hazardous materials which in turn can result in major fires, explosions, and dispersion of toxic materials. Integrity Security aims to analyze the physical and cyber vulnerabilities taken advantage by adversaries, and also to provide measures for preventing or delaying intentional incidents and mitigating the consequences. Flood control. http://id.loc.gov/authorities/subjects/sh85049151 Flood damage prevention. http://id.loc.gov/authorities/subjects/sh85049155 Rivers Regulation. http://id.loc.gov/authorities/subjects/sh85114254 Inondations Maîtrise. Dommages causés par les inondations Prévention. Cours d'eau Régularisation. flood control. aat Technology & Engineering Chemical & Biochemical. bisacsh Flood control fast Flood damage prevention fast Rivers Regulation fast has work: Security of Flood Defenses (Text) https://id.oclc.org/worldcat/entity/E39PCYHXrYYypGbGw8X3cvBmq3 https://id.oclc.org/worldcat/ontology/hasWork Print version: 9783110620719 Print version: 9783110620610 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2196941 Volltext |
spellingShingle | Lange, Jos de Security of Flood Defenses / Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Summary -- 3. History of flood defenses in the Low Countries -- 4. Delta Plan flood defense -- 5. Storm Surge Barriers -- 6. Flood barriers in defensive strategies -- 7. Flood defenses in offensive strategies -- 8. Systematic analysis of flood barrier technologies -- 9. Calculating security risks -- 10. Terrorism threat and flood defenses -- 11. Conclusions -- 12. Recommendations -- 13. Epilogue -- Appendix -- List of Figures -- List of Tables -- Bibliography -- Source account -- Index Flood control. http://id.loc.gov/authorities/subjects/sh85049151 Flood damage prevention. http://id.loc.gov/authorities/subjects/sh85049155 Rivers Regulation. http://id.loc.gov/authorities/subjects/sh85114254 Inondations Maîtrise. Dommages causés par les inondations Prévention. Cours d'eau Régularisation. flood control. aat Technology & Engineering Chemical & Biochemical. bisacsh Flood control fast Flood damage prevention fast Rivers Regulation fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85049151 http://id.loc.gov/authorities/subjects/sh85049155 http://id.loc.gov/authorities/subjects/sh85114254 |
title | Security of Flood Defenses / |
title_alt | Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Summary -- 3. History of flood defenses in the Low Countries -- 4. Delta Plan flood defense -- 5. Storm Surge Barriers -- 6. Flood barriers in defensive strategies -- 7. Flood defenses in offensive strategies -- 8. Systematic analysis of flood barrier technologies -- 9. Calculating security risks -- 10. Terrorism threat and flood defenses -- 11. Conclusions -- 12. Recommendations -- 13. Epilogue -- Appendix -- List of Figures -- List of Tables -- Bibliography -- Source account -- Index |
title_auth | Security of Flood Defenses / |
title_exact_search | Security of Flood Defenses / |
title_full | Security of Flood Defenses / Jos de Lange. |
title_fullStr | Security of Flood Defenses / Jos de Lange. |
title_full_unstemmed | Security of Flood Defenses / Jos de Lange. |
title_short | Security of Flood Defenses / |
title_sort | security of flood defenses |
topic | Flood control. http://id.loc.gov/authorities/subjects/sh85049151 Flood damage prevention. http://id.loc.gov/authorities/subjects/sh85049155 Rivers Regulation. http://id.loc.gov/authorities/subjects/sh85114254 Inondations Maîtrise. Dommages causés par les inondations Prévention. Cours d'eau Régularisation. flood control. aat Technology & Engineering Chemical & Biochemical. bisacsh Flood control fast Flood damage prevention fast Rivers Regulation fast |
topic_facet | Flood control. Flood damage prevention. Rivers Regulation. Inondations Maîtrise. Dommages causés par les inondations Prévention. Cours d'eau Régularisation. flood control. Technology & Engineering Chemical & Biochemical. Flood control Flood damage prevention Rivers Regulation |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2196941 |
work_keys_str_mv | AT langejosde securityofflooddefenses |