Nuclear Infrastructure Protection and Homeland Security
- Authors:
- |
- Publisher:
- 2011
Summary
Experts agree, though it is already important, nuclear power will soon be critical to the maintenance of contemporary society. With the heightened importance of nuclear energy comes a heightened threat of terrorism. The possibility of nuclear energy infrastructure terrorism-that is, the use of weapons to cause damage to the nuclear energy industrial sector, which would have widespread, devastating effects-is very real. In Nuclear Infrastructure Protection and Homeland Security, authors Frank R. Spellman and Melissa L. Stoudt present all the information needed for nuclear infrastructure employers and employees to handle security threats they must be prepared to meet. The book focuses on three interrelated nuclear energy infrastructure segments: nuclear reactors, radioactive materials, and nuclear waste. It presents common-sense methodologies in a straightforward manner, so the text is accessible even to those with little experience with nuclear energy who are nonetheless concerned about the protection of our nuclear infrastructure. Important safety and security principles are outlined, along with security measures that can be implemented to ensure the safety of nuclear facilities.
Search publication
Bibliographic data
- Copyright year
- 2011
- ISBN-Print
- 978-1-60590-713-0
- ISBN-Online
- 978-1-60590-714-7
- Publisher
- Government Institutes, Lanham
- Language
- English
- Pages
- 284
- Product type
- Book Titles
Table of contents
- Contents No access
- Preface No access
- Prologue: A Trip to Town No access Pages 1 - 2
- Chapter 01. Introduction No access Pages 3 - 40
- Chapter 02. Critical Infrastructure No access Pages 41 - 48
- Chapter 03. U.S. Nuclear Power Sector No access Pages 49 - 72
- Chapter 04. Nuclear Power Sector Security No access Pages 73 - 84
- Chapter 05. Vulnerability Assessment (VA) No access Pages 85 - 106
- Chapter 06. Preparation: Security Assessment No access Pages 107 - 122
- Chapter 07. Cyber Security No access Pages 123 - 164
- Chapter 08. SCADA No access Pages 165 - 188
- Chapter 09. Security Techniques and Hardware No access Pages 189 - 256
- Chapter 10. Emergency Response No access Pages 257 - 264
- Epilogue: The Paradigm Shift No access Pages 265 - 274
- Index No access Pages 275 - 282
- About the Authors No access Pages 283 - 284





