Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
31 Ergebnisse
Sortierung:
In: AWWA water science, Band 4, Heft 6
ISSN: 2577-8161
In: Journal of contingencies and crisis management, Band 8, Heft 2, S. 73-80
ISSN: 1468-5973
Terrorism in the United States was not considered a serious threat until the second half of the 1990s. However, recent attacks both at home and abroad have forced government planners to consider the possibility that critical elements of the U.S. infrastructure might in fact be vulnerable to terrorism. The potential for chemical or biological contamination of water supply systems exists along with the possibility that such systems might be sabotaged. This article reviews the threat of biological and chemical compounds in relation to the characteristics of water supply systems. Vulnerability of such systems to terrorist attacks is examined, as well as possible physical and chemical countermeasures that could be applied. A case study is presented of an accidental contamination event that illustrates the difficulty of tracking such events in a drinking water system. It can be concluded that municipal water supplies are vulnerable. However, appropriate physical planning of such systems, including contingency back‐up with separate water lines for emergencies, coupled with proactive monitoring, will significantly increase security in the face of possible terrorist attacks.
In: Journal of contingencies and crisis management, Band 8, Heft 2, S. 73-80
ISSN: 0966-0879
"Bridging the divide between theory and practice, William L. Mitchell and Robert M. Clark's Deception: Counterdeception and Counterintelligence provides a thorough overview of the principles of deception and its uses in intelligence operations. This masterful guide focuses on practical training in deception for both both operational planners and intelligence analysts using a case-based approach. By reading and working through the exercises in this text, operations planners will learn how to build and conduct a deception campaign; and intelligence analysts will develop the ability to recognize deception and support deception campaigns."--Provided by publisher
In Target-Centric Network Modeling: Case Studies in Analyzing Complex Intelligence Issues, authors Robert Clark and William Mitchell take an entirely new approach to teaching intelligence analysis. Unlike any other book on the market, it offers case study scenarios using actual intelligence reporting formats, along with a tested process that facilitates the production of a wide range of analytical products for civilian, military, and hybrid intelligence environments. Readers will learn how to perform the specific actions of problem definition modeling, target network modeling, and collaborative sharing in the process of creating a high-quality, actionable intelligence product. The case studies reflect the complexity of twenty-first century intelligence issues by dealing with multi-layered target networks that cut across political, economic, social, technological, and military issues. Working through these cases, students will learn to manage and evaluate realistic intelligence accounts.
In: AWWA water science, Band 2, Heft 1
ISSN: 2577-8161
AbstractMany small drinking water systems have faced, or are facing, difficulties in meeting U.S. Safe Drinking Water Act regulations. Aeration is a technology that could be effective in helping small systems meet trihalomethane standards, but its effectiveness is based on Henry's law. Henry's law governs the relationship between the concentration of a volatile organic chemical in liquid and the gas' vapor pressure over that liquid. The higher the Henry's‐law constant, the more readily the compound can be transferred from water to air. Henry's‐law constant is independent of flow rate but, as discussed in this article, is a function of temperature. This article provides information on the relationship of temperature to the value of Henry's‐law constants with the goal of assisting water system managers and operators in optimizing aeration for removing disinfection byproducts.
In: Water and environment journal, Band 31, Heft 2, S. 252-261
ISSN: 1747-6593
AbstractDisinfection of drinking water is one of the major responsibilities facing cities, towns and rural areas around the world. However, most disinfectants react with organic material in the water to produce a wide variety of by‐products. Halogenated methane compounds (THMs) are among these by‐products and have been linked to adverse health effects in humans. The human exposure pathway includes: ingestion, inhalation and dermal adsorption, and THM volatilisation plays a role in all three. This paper examines the volatilisation of four trihalomethane compounds and relates their volatilisation rate constants to temperature, concentration and solvent matrix. Volatilisation rate constants were incorporated into a first‐order model that will allow resulting THM exposure concentrations to be calculated for household uses that involve heating of drinking water. Utilisation of the THM volatilisation rate constants developed in this manuscript should improve future exposure estimates.
In: Growth and change: a journal of urban and regional policy, Band 12, Heft 3, S. 9-16
ISSN: 1468-2257
In: International Journal, Band 16, Heft 4, S. 444
In: Competitive Government: Public Private Partnerships
In: Springer eBook Collection
Chapter 1. Public Private Partnerships in Transportation: Airports, Water Ports, Rail, Buses, and Taxis- AN OVERVIEW -- Chapter 2. Evaluating The Viability of The Ghana Airport Cargo Centre as Publica-Private Partnership Project -- Chapter 3. The role of individual actors in public-private partnership (PPP) projects: Insights from Madinah Airport in Saudi Arabia -- Chapter 4. Models, Expectations, And Reality In Airport Public Private Partnerships -- Chapter 5. Airport Privatization in the United States -- Chapter 6. Legal Impediments to Airport P3s in the United States -- Chapter 7. Public-Private Partnerships in Port Areas: Lessons Learned from Case Studies in Antwerp and Rotterdam -- Chapter 8. Seaport PPPs in the EU: Policy, Regulatory and Contractual Issues -- Chapter 9. Sustainable Strategies for Mass Rapid Transit PPPs -- Chapter 10. Rational Inattention in Non-Profit Public-Private Partnerships: The Las Vegas Monorail Bankruptcy Case -- Chapter 11. Public -Private Partnerships in Denver, CO: Analysis of the Role of PPPs in the Financing and Construction of Transportation Infrastructure in the USA -- Chapter 12. Governance of Public Private Partnerships: Lessons from the Italian Experience in Transportation Projects -- Chapter 13. Developing Urban Rail Using Public Private Partnership – A Case Study of the Gold Coast Light Rail Project -- Chapter 14. For Hire Vehicle Regulation, misunderstanding, mismatch, control and capture: the case of Vehicles for Hire and PPP -- Chapter 15. Using History to Develop Future Regulation of TNCs and Autonomous Taxis -- Chapter 16. Distinguishing Between Demand-Risk And Availability-Payment Public-Private Partnerships.
In: Protecting Critical Infrastructure 2
In: Water and environment journal, Band 32, Heft 3, S. 384-391
ISSN: 1747-6593
AbstractRecent events have highlighted the need to address cybersecurity threats to systems supporting critical infrastructure and federal information systems which are evolving and growing. These threats have become ubiquitous in the United States, and throughout the world. Many information and communications technology (ICT) devices and other components are interdependent so that disruption of one component may have a negative, cascading effect on others. In the United States, the Federal role in cyber‐security has been debated for more than a decade but creating a policy is complicated because in the United States, State and local governments are the major institutions responsible for providing services to their populations. It is important that critical infrastructure such as Publically Owned Treatment Works (POTWs) and Public Water Systems (PWSs) adopt suitable countermeasures to prevent or minimise the consequences of cyber‐attacks. This paper discusses both technological and procedural techniques that can be used to protect against cyber‐threats.
In: McGraw-Hill's AccessEngineering
"This resource draws upon a team of internationally recognized experts selected for their extensive experience in the essential aspects of water supply systems." "Complete with case studies, the Urban Water Supply Handbook will prove to be an invaluable resource for consulting engineers, public works engineers and administrators, municipal engineers, and water managers worldwide involved with urban water systems."--Jacket.