Wiley Handbook of Science and Technology for Homeland Security, 1st Edition

  • John Voeller
  • Published By:
  • ISBN-10: 1444350110
  • ISBN-13: 9781444350111
  • DDC: 363.34
  • Grade Level Range: College Freshman - College Senior
  • 2888 Pages | eBook
  • Original Copyright 2010 | Published/Released May 2011
  • This publication's content originally published in print form: 2010

  • Price:  Sign in for price

About

Overview

The Wiley Handbook of Science and Technology for Homeland Security is an essential and timely collection of resources designed to support the effective communication of homeland security research across all disciplines and institutional boundaries. Truly a unique work this 4 volume set focuses on the science behind safety, security, and recovery from both man made and natural disasters has a broad scope and international focus. The Handbook: Educates researchers in the critical needs of the homeland security and intelligence communities and the potential contributions of their own disciplines; Emphasizes the role of fundamental science in creating novel technological solutions; Details the international dimensions of homeland security and counterterrorism research; Provides guidance on technology diffusion from the laboratory to the field; and Supports cross disciplinary dialogue in this field between operational, R&D and consumer communities.

Table of Contents

Front Cover.
Half Title Page.
Other Frontmatter.
Title Page.
Copyright Page.
Contents.
Preface.
Contributors.
1: Introduction and Overview.
2: Policy Development for Homeland Security.
3: Threats and Challenges to Homeland Security.
4: Terrorist Organizations and Modeling Trends.
5: Risk Communication—An Overlooked Tool in Combating Terrorism.
6: Cross-Cutting Themes and Technologies.
7: Risk Modeling and Vulnerability Assessment.
8: Terrorism Risk: Characteristics and Features.
9: Risk Analysis Frameworks for Counterterrorism.
10: Risk Analysis and Management for Critical Asset Protection.
11: Logic Trees: Fault, Success, Attack, Event, Probability, and Decision Trees.
12: Bayesian Networks.
13: Using Risk Analysis to Inform Intelligence Analysis.
14: Vulnerability Assessment.
15: Risk Communication.
16: Probabilistic Risk Assessment (PRA).
17: Scenario Analysis, Cognitive Maps, and Concept Maps.
18: Time-Domain Probabilistic Risk Assessment Method for Interdependent Infrastructure Failure and Recovery Modeling.
19: Risk Transfer and Insurance: Insurability Concepts and Programs for Covering Extreme Events.
20: Quantitative Representation of Risk.
21: Qualitative Representation of Risk.
22: Terrorism Risk.
23: Terrorist Threat Analysis.
24: Risk Analysis Methods for Cyber Security.
25: Defeating Surprise Through Threat Anticipation and Possibility Management.
26: Memetics for Threat Reduction in Risk Management.
27: High Consequence Threats: Electromagnetic Pulse.
28: High Consequence Threats: Nuclear.
29: Modeling Population Dynamics for Homeland Security Applications.
30: Sensing and Detection.
31: Protecting Security Sensors and Systems.
32: Threat Signatures of Explosive Materials.
33: Radioactive Materials Sensors.
34: Knowledge Extraction from Surveillance Sensors.
35: RADAR and LiDAR Perimeter Protection Sensors.
36: Design Considerations in Development and Application of Chemical and Biological Agent Detectors.
37: Sensing Dispersal of Chemical and Biological Agents in Urban Environments.
38: Sensing Releases of Highly Toxic and Extremely Toxic Compounds.
39: 2D-to-3D Face Recognition Systems.
40: Eye and Iris Sensors.
41: A Tandem Mobility Spectrometer for Chemical Agent and Toxic Industrial Chemical Monitoring.
42: Dynamic Load Balancing for Robust Distributed Computing in the Presence of Topological Impairments.
43: Passive Radio Frequency Identification (RFID) Chemical Sensors for Homeland Security Applications.
44: Protection, Prevention, Response and Recovery.
45: Protection and Prevention: An Overview.
46: Protection and Prevention: Threats and Challenges from a Homeland Defense Perspective.
47: Consequence Mitigation.
48: Security Assessment Methodologies for U.S. Ports and Waterways.
49: Defending Against Malevolent Insiders Using Access Control.
50: Less-Lethal Payloads for Robotic and Automated Response Systems.
51: Defending Against Directed Energy Weapons: RF Weapons and Lasers.
52: The Sensor Web: Advanced Technology for Situational Awareness.
53: Critical Information Infrastructure Protection.
54: Critical Information Infrastructure Protection, Overview.
55: Australia.
56: Austria.
57: Brazil.
58: Canada.
59: Estonia.