Wiley Handbook of Science and Technology for Homeland Security: 4 Volume Set

Wiley Handbook of Science and Technology for Homeland Security: 4 Volume Set

By: John G. Voeller (editor)Hardback

Up to 2 WeeksUsually despatched within 2 weeks


The Wiley Handbook of Science and Technology for Homeland Security is an essential and timely collection of resources designed to support the effective communication of homeland security research across all disciplines and institutional boundaries. Truly a unique work this 4 volume set focuses on the science behind safety, security, and recovery from both man-made and natural disasters has a broad scope and international focus. The Handbook:* Educates researchers in the critical needs of the homeland security and intelligence communities and the potential contributions of their own disciplines* Emphasizes the role of fundamental science in creating novel technological solutions* Details the international dimensions of homeland security and counterterrorism research* Provides guidance on technology diffusion from the laboratory to the field* Supports cross-disciplinary dialogue in this field between operational, R&D and consumer communities

About Author

John Voeller worked at the Executive Office of the President as a senior analyst on homeland security and as a consultant for the Department of Homeland Security on all aspects of infrastructure protection. He is Senior Vice President, Chief Knowledge Officer and Chief Technology Officer at Black and Veatch, the largest privately held engineering company in the United States. He has served as Technical Leader, Chemical, for the Biological, Radiological Technology Alliance (CBRTA), working on advanced technology to deal with terrorist threats with 13 major companies. He has also served as chairman of ASME's Critical Asset Protection Initiative, leading eight teams of world experts in developing industry's agenda for homeland security needs as well as planning first responder actions and risk analysis of terrorist and catastrophic incidents.


1 INTRODUCTORY AND OVERVIEW. 2 CROSS-CUTTING THEMES AND TECHNOLOGIES. 2.1 Risk Modeling and Vulnerability Assessment. Terrorism Risk: Characteristics and Features. Risk Analysis Frameworks for Counterterrorism. Logic Trees: Fault, Success, Attack, Event, Probability, andDecision Trees. Bayesian Networks. Using Risk Analysis to Inform Intelligence Analysis. Vulnerability Assessment. Multi-objective Decision Analysis. Risk Communication. Experience with Expert Judgment: the TU Delft Expert JudgmentData. Probabilistic Risk Assessment (PRA). Deterrence: An Empirical Psychological Model. Scenario Analysis, Cognitive Maps, And Concept Maps. Policy Development. Consequence Mitigation: Current Research and Future Trends. Time-Domain Probabilistic Risk Assessment Method for InterdependentInfrastructure Failure and Recovery Modeling. Social and Psychological Aspects. Risk Transfer and Insurance: Insurability Concepts and Programs forCovering Extreme Events. Quantitative Representation of Risk. Qualitative Representation of Risk. Terrorist Organizations and Modeling Trends. Cyber-Security. Defeating Surprise Through Threat Anticipation and PossibilityManagement. Memetics for Threat Reduction in Risk Management. High Consequence Threats: Electromagnetic Pulse. High Consequence Events: Nuclear Explosions. Modeling Population Dynamics for Homeland SecurityApplications. 2.2 Sensing and Detection. Protecting Security Sensors and Systems. Threat Signatures of Explosive Materials. Radioactive Materials Sensors. Knowledge Extraction from Surveillance Sensors. Sensing Dispersal of Chemical and Biological Agents in UrbanEnvironments. Sensing Releases of Highly Toxic and Extremely ToxicCompounds. 2D-to-3D Face Recognition Systems. Eye and Iris Sensors. Dynamic Load Balancing for Robust Distributed Computing in thePresence of Topological Impairments. 2.3 Cyber Security. Advanced Attacker Detection and Understanding with EmergingHoneynet Technologies. Attack Traceback and Attribution. Authentication, Authorization, Access Control, and PrivilegeManagement. Classes of Vulnerabilities and Attacks. Cyber Forensics. Cyber Security for the Banking and Finance Sector. Cyber Security Policy Specification and Management. Cyber Security Standards. Cyber Security Technology Usability and Management. Detection of hidden information, covert channels and informationflows. High Assurance: Provably Secure Systems and Architectures. Industrial Process Control System Security. Multilevel Security. Security of Distributed, Ubiquitous, and Embedded ComputingPlatforms. Trusted Platforms: The Root of Security. 2.4 Protection and Prevention. Protection and Prevention: an Overview. Less-Lethal Payloads for Robotic and Automated ResponseSystems. Protection and Prevention: Security Assessment Methodologies for USPorts and Waterways. Homeland Security Perspective on Threats and Challenges. The Sensor Web: Advanced Technology for SituationalAwareness. Defending Against Directed Energy Weapons: RF Weapons andLasers. The Forum of Incident Response and Security Teams (FIRST). Critical Information Infrastructure Protection, Overview. Critical Information Infrastructure Protection, Australia. Critical Information Infrastructure Protection, Austria. Critical Information Infrastructure Protection, Brazil. Critical Information Infrastructure Protection, Canada. Critical Information Infrastructure Protection, Estonia. Critical Information Infrastructure Protection, Finland. Critical Information Infrastructure Protection, France. Critical Information Infrastructure Protection, Germany. Critical Information Infrastructure Protection, Hungary. Critical Information Infrastructure Protection, India. Critical Information Infrastructure Protection, Italy. Critical Information Infrastructure Protection, Japan. Critical Information Infrastructure Protection, Malaysia. Critical Information Infrastructure Protection, New Zealand. Critical Information Infrastructure Protection, Norway. Critical Information Infrastructure Protection, Poland. Critical Information Infrastructure Protection, Republic ofKorea. Critical Information Infrastructure Protection, Russia. Critical Information Infrastructure Protection, Singapore. Critical Information Infrastructure Protection, Spain. Critical Information Infrastructure Protection, Sweden. Critical Information Infrastructure Protection, Switzerland. Critical Information Infrastructure Protection, theNetherlands. Critical Information Infrastructure Protection, UnitedKingdom. Critical Information Infrastructure Protection, UnitedNations. Critical Information Infrastructure Protection, UnitedStates. Critical Information Infrastructure Protection, the World BankGroup. Critical Information Infrastructure Protection, EuropeanUnion. Critical Information Infrastructure Protection, NATO. Critical Information Infrastructure Protection, Group of Eight(G8). Organisation for Economic Co-Operation and Development (OECD). 2.5 Human Social and Behavioral Research. Audience sensing and tailoring for preferred and forced decisionstyle. Behavioral screening. Biometrics Sensors. Consequence attribution (forward and reverse). Deception detection, tools for counterterrorism and homelandsecurity. Human behavior and how it adjusts our actions in complex events inboth positive and negative ways. Human emotion and its involvement in overt events for both observerand victim. Human perception and attention in information-rich andevent-overloa situations. Information analysis and distillation under time constraints. Information Collection and presentation in high data volume andmultiple timescale situations. Information repurposing and fusion. Temporal analysis and synchronization for proper understanding ofreal event sequences. 2.6 System and Sector Interdependencies. System and Sector Interdependencies: An Overview. The Genesis of Interdependencies Concepts. Analysis of Cascading Infrastructure Failures. Characterizing Infrastructure Failure Interdependencies to InformSystemic Risk. Critical Infrastructure Protection Decision Making. Cyber Security Metrics and Measures. Geospatial Data Support for Infrastructure InterdependenciesAnalysis. Implications of Regulation on the Protection of CriticalInfrastructures. Infrastructure Dependency Indicators. Inherently Secure Next-Generation Computing and CommunicationNetworks for Reducing Cascading Impacts. Input-Output Modeling for Interdependent InfrastructureSectors. Interdependent Energy Infrastructure Simulation System. Managing Critical Infrastructure Interdependencies: The OntarioApproach. Network Flow Approaches for Analyzing and Managing Disruptions toInterdependent Infrastructure Systems. Object-Oriented Approaches for Integrated Analysis ofInterdependent Energy Networks. President's Commission on Critical Infrastructure Protection andPresidential Decision Directive 63. Vulnerability Assessment Methodologies for InterdependentSystems. Water Infrastructure Interdependencies. 2.7 Human Information Systems. Human Sensation and Perception. Naturalistic Decision Making, Expertise, and HomelandSecurity. Security and Safety Synergy: Advancing Security with Human FactorsKnowledge. Human Behavior and Deception Detection. Speech and Video Processing for Homeland Security. Classification and Clustering for Homeland SecurityApplications. Training and Learning Development for Homeland Security. 3 KEY APPLICATION AREAS. 3.1 Agriculture and Food Supply. Carcass Disposal Options. Decontamination and Disposal of Contaminated Foods. Developing Risk Metrics to Estimate Risks of CatastrophicBiological and Bioterrorist Events: Applications to the FoodIndustry. Early Detection and Diagnosis of High-Consequence Plant Pests inthe United States. Insects As Vectors Of Foodborne Pathogens. Livestock Agroterrorism and the Potential Public Health Risk. Microbial Forensics and Plant Pathogens: Attribution ofAgricultural Crime. Mid-Infrared Sensors for The Rapid Analysis of Select MicrobialFood Borne Pathogens. Mitigating Consequences of Pathogen Inoculation into ProcessedFood. Mitigating Public Health Risks from an Agroterror Attack. Optimal Investments in Mitigating Agroterrorism Risks. Potential for Human Illness from Animal Transmission or Food-BornePathogens. Pulsenet: A Program to Detect and Track Food ContaminationEvents. Risk Assessment, Risk Management, and Preventive Best Practices forRetailers and Foodservice Establishments. Risk Communication: An Overlooked Tool in CombatingTerrorism. Social, Psychological, and Communication Impacts of anAgroterrorism Attack. The EDEN Homeland Security Project: Educational Opportunities inFood and Agrosecurity. The Global Food Supply Chain. The Role of Food Safety in Food Security/Defense. The Use of Threat, Vulnerability, and Consequence (TVC) Analysisfor Decision Making on The Deployment of Limited SecurityResources. Vulnerability of the Domestic Food Supply Chain. 3.2 Water. Decontamination methods for drinking water treatment anddistribution systems. Decontamination Methods for Wastewater and Stormwater Collectionand Treatment Systems. Designing an Optimum Water Monitoring System. Drinking Water Supply, Treatment and Distribution Practice in theUnited States. Emergency response planning for drinking water systems. Health Risk Assessment for Radiological, Chemical, and BiologicalAttacks. Homeland Security and Wastewater Treatment. Protecting Water Infrastructure in the United States? SettingPriorities, Conducting Research, and Sharing Results. Roles of Federal, State, and Local Authorities in WaterInfrastructure Security. Surveillance Methods and Technologies for Water and WastewaterSystems. Treatability of Contaminants in Conventional Systems. Understanding the Implications of Critical InfrastructureInterdependencies for Water. Water Infrastructure and Water Use in the United States. Water Supply and Wastewater Management Regulations, Standards, andGuidance. 3.3 Communications and Information Infrastructure. Wireless Security. Critical Infrastructure Protection: Telecommunication. 3.4 Energy Systems. Comparative Risk Assessment for Energy Systems: A Tool forComprehensive Assessment of Energy Security. Large-Scale Electricity Transmission Grids: Lessons Learned fromthe European Electricity Blackouts. 3.5 Public Health. Biodefense Priorities in Life-science Research: Chemical ThreatAgents. Biodefense Workforce. Biosurveillance Tradecraft. Developing a Threat List--Emerging Infectious Diseases. Development of Radiation Countermeasures. Farm Level Control of Foreign Animal Disease and Food-BornePathogens. Importation of Foreign Dengue Virus Presents Low Risk to USHomeland; Spread Will Not Parallel that of West Nile Virus. North Carolina Biosurveillance System. Practical Systems for Biosurveillance: The Military Perspective andEssence. 3.6 Transportation Security. Harden Security of High-Risk and Critical Supply Chains. Population Evacuations. Roles and Implications of Transportation Systems in HomelandSecurity. The Nation's Transportation System as a Security Challenge. Transportation Operations and Control. Transportation Security Performance Measures. 3.7 Intelligence Systems. Craniofacial Aging. File Forensics and Conversion. Finding Inadvertent Release of Information. Nano-Enabled Power Sources. New Approaches to IRIS Recognition: One-DimensionalAlgorithms. Spectrally Adaptive Nanoscale Quantum Dot Sensors.

Product Details

  • ISBN13: 9780471761303
  • Format: Hardback
  • Number Of Pages: 2888
  • ID: 9780471761303
  • weight: 7310
  • ISBN10: 0471761303

Delivery Information

  • Saver Delivery: Yes
  • 1st Class Delivery: Yes
  • Courier Delivery: Yes
  • Store Delivery: Yes

Prices are for internet purchases only. Prices and availability in WHSmith Stores may vary significantly