+612 9045 4394
Wiley Handbook of Science and Technology for Homeland Security, Volume 2 - John G. Voeller

Wiley Handbook of Science and Technology for Homeland Security, Volume 2

Sorry, the book that you are looking for is not available right now.

We did a search for other books with a similar title, however there were no matches. You can try selecting from a similar category, click on the author's name, or use the search box above to find your book.

Share This Book:

This reference work will meet a recognized need in homeland security research by promoting effective collaboration between research scientists, funding agencies, and the homeland security community.

Part of the 15-volume series The Wiley Handbook of Science and Technology for Homeland Security, Risk Analysis includes over 55 articles by international contributors on vulnerability assessment and risk modeling.

Selected Table of Contents:

  • Terrorism risk: characteristics and features
  • Risk analysis framework for counterterrorism
  • Risk analysis and management for critical asset protection
  • Logic trees: event, fault, success, attack, probability, and decision trees
  • Bayesian networks
  • Threat analysis
  • Vulnerability assesssment
  • Consequence analysis
  • Infrastructure interdependencies
  • Multi-objective decision analysis
  • Risk communication
  • Terrorism databases and trends
  • Legal aspects of information security
  • Expert opinion elicitation
  • Uncertainty modeling and analysis
  • Systems analysis
  • Deterrence
  • Gaming
  • Policy development
  • Consequence mitigation
  • Countermeasures
  • Regulations and standards
  • Probabilistic risk assessment (PRA)
  • Scenario analysis, cognitive maps and concept maps
  • Bioterrorism risk analysis









Republic of Korea.


The Netherlands.

New Zealand.








United Kingdom.

United States.

European Union (EU).

The Forum of Incident Response and Security Teams (FIRST).

Group of Eight (G8).

North Atlantic Treaty Organization (NATO).

Organization for Economic Co-Operation and Development (OECD).

United Nations (UN).

The World Bank Group.

Cyber Security.

Classes of Vulnerabilities and Attacks.

Authentication, Authorization, Access Control, and Privilege Management.

Advanced Attacker Detection and Understanding with Emerging Honeynut Technologies.

Detection of Hidden Information, Covert Channels, and Information Flows.

Attack Traceback and Attribution.

Cyber Forensics.

Cyber Security Policy Specification and Management.

Multilevel Security.

Cyber Security Standards.

Cyber Security Metrics and Measures.

Trusted Platforms: The Root of Security.

High Assurance: Provably Secure Systems and Architectures.

Security of Distributed, Ubiquitous, and Embedded Computing Platforms.

Security of Web Application and Services and Service-Oriented Architectures.

Cyber Security Technology Usability and Management.

Cyber Security Education, Training, and Awareness.

Industrial Process Control System Security.

Cyber Security for the Banking and Finance Sector.

System and Sector Interdependencies.

System and Sector Interdependencies: An Overview.

System and Sector Interdependencies: An Overview of Research and Development.

President?s Commission on Critical Infrastructure Protection.

Input-Output Modeling for Interdependent Infrastructure Sectors.

Application of a Conditional Risk Assessment Methodology for Prioritization of Critical Infrastructure.

Critical Infrastructure at Risk: A European Perspective.

Vulnerability Assessment Methodologies for Interdependent Systems.

Robustness, Resilience, and Security of National Critical Infrastructure Systems.

Inherently Secure Next-Generation Computing and Communication.

Networks for Reducing Cascading Impacts.

Implications of Regulation on the Protection of Critical Infrastructures.

Characterizing Infrastructure Failure Interdependencies to Inform Systemic Risk.

Managing Critical Infrastructure Interdependencies: The Ontario Approach.

Analysis of Cascading Infrastructure Failures.

Water Infrastructure Interdependencies.

Infrastructure Dependency Indicators.

Object-Oriented Approaches for Integrated Analysis of Interdependent Energy Networks.

Geospatial Data Support for Infrastructure Interdependencies Analysis.

The Military Roots of Critical Infrastructure Analysis and Attack.

Network Flow Approaches for Analyzing and Managing Disruptions to Interdependent Infrastructure Systems. 

ISBN: 9780470138489
ISBN-10: 0470138483
Audience: Professional
Format: Hardcover
Language: English
Number Of Pages: 4992
Published: 8th February 2010
Country of Publication: US
Dimensions (cm): 26.16 x 18.54  x 3.96
Weight (kg): 1.69
Edition Number: 1