You are previewing Wiley Handbook of Science and Technology for Homeland Security, 4 Volume Set.
O'Reilly logo
Wiley Handbook of Science and Technology for Homeland Security, 4 Volume Set

Book Description

The Wiley Handbook of Science and Technology for Homeland Security is an essential and timely collection of resources designed to support the effective communication of homeland security research across all disciplines and institutional boundaries. Truly a unique work this 4 volume set focuses on the science behind safety, security, and recovery from both man-made and natural disasters has a broad scope and international focus.

The Handbook:

  • Educates researchers in the critical needs of the homeland security and intelligence communities and the potential contributions of their own disciplines

  • Emphasizes the role of fundamental science in creating novel technological solutions

  • Details the international dimensions of homeland security and counterterrorism research

  • Provides guidance on technology diffusion from the laboratory to the field

  • Supports cross-disciplinary dialogue in this field between operational, R&D and consumer communities

Table of Contents

  1. Cover Page
  2. Volume 1
    1. Copyright
    2. CONTENTS
    3. PREFACE
    4. CONTRIBUTORS
    5. INTRODUCTION AND OVERVIEW
      1. POLICY DEVELOPMENT FOR HOMELAND SECURITY
      2. THREATS AND CHALLENGES TO HOMELAND SECURITY
      3. TERRORIST ORGANIZATIONS AND MODELING TRENDS
      4. RISK COMMUNICATION—AN OVERLOOKED TOOL IN COMBATING TERRORISM
    6. CROSS-CUTTING THEMES AND TECHNOLOGIES
      1. TERRORISM RISK: CHARACTERISTICS AND FEATURES
      2. RISK ANALYSIS FRAMEWORKS FOR COUNTERTERRORISM*
      3. RISK ANALYSIS AND MANAGEMENT FOR CRITICAL ASSET PROTECTION
      4. LOGIC TREES: FAULT, SUCCESS, ATTACK, EVENT, PROBABILITY, AND DECISION TREES
      5. BAYESIAN NETWORKS
      6. USING RISK ANALYSIS TO INFORM INTELLIGENCE ANALYSIS
      7. VULNERABILITY ASSESSMENT
      8. RISK COMMUNICATION
      9. PROBABILISTIC RISK ASSESSMENT (PRA)
      10. SCENARIO ANALYSIS, COGNITIVE MAPS, AND CONCEPT MAPS
      11. TIME-DOMAIN PROBABILISTIC RISK ASSESSMENT METHOD FOR INTERDEPENDENT INFRASTRUCTURE FAILURE AND RECOVERY MODELING
      12. RISK TRANSFER AND INSURANCE: INSURABILITY CONCEPTS AND PROGRAMS FOR COVERING EXTREME EVENTS
      13. QUANTITATIVE REPRESENTATION OF RISK
      14. QUALITATIVE REPRESENTATION OF RISK*
      15. TERRORISM RISK
      16. TERRORIST THREAT ANALYSIS
      17. RISK ANALYSIS METHODS FOR CYBER SECURITY
      18. DEFEATING SURPRISE THROUGH THREAT ANTICIPATION AND POSSIBILITY MANAGEMENT
      19. MEMETICS FOR THREAT REDUCTION IN RISK MANAGEMENT
      20. HIGH CONSEQUENCE THREATS: ELECTROMAGNETIC PULSE
      21. HIGH CONSEQUENCE THREATS: NUCLEAR
      22. MODELING POPULATION DYNAMICS FOR HOMELAND SECURITY APPLICATIONS
    7. SENSING AND DETECTION
      1. PROTECTING SECURITY SENSORS AND SYSTEMS
      2. THREAT SIGNATURES OF EXPLOSIVE MATERIALS
      3. RADIOACTIVE MATERIALS SENSORS
      4. KNOWLEDGE EXTRACTION FROM SURVEILLANCE SENSORS
      5. RADAR AND LiDAR PERIMETER PROTECTION SENSORS
      6. DESIGN CONSIDERATIONS IN DEVELOPMENT AND APPLICATION OF CHEMICAL AND BIOLOGICAL AGENT DETECTORS
      7. SENSING DISPERSAL OF CHEMICAL AND BIOLOGICAL AGENTS IN URBAN ENVIRONMENTS
      8. SENSING RELEASES OF HIGHLY TOXIC AND EXTREMELY TOXIC COMPOUNDS
      9. 2D-TO-3D FACE RECOGNITION SYSTEMS
      10. EYE AND IRIS SENSORS
      11. A TANDEM MOBILITY SPECTROMETER FOR CHEMICAL AGENT AND TOXIC INDUSTRIAL CHEMICAL MONITORING
      12. DYNAMIC LOAD BALANCING FOR ROBUST DISTRIBUTED COMPUTING IN THE PRESENCE OF TOPOLOGICAL IMPAIRMENTS
      13. PASSIVE RADIO FREQUENCY IDENTIFICATION (RFID) CHEMICAL SENSORS FOR HOMELAND SECURITY APPLICATIONS
    8. PROTECTION, PREVENTION, RESPONSE AND RECOVERY
      1. PROTECTION AND PREVENTION: AN OVERVIEW
      2. PROTECTION AND PREVENTION: THREATS AND CHALLENGES FROM A HOMELAND DEFENSE PERSPECTIVE
      3. CONSEQUENCE MITIGATION
      4. SECURITY ASSESSMENT METHODOLOGIES FOR U.S. PORTS AND WATERWAYS
      5. DEFENDING AGAINST MALEVOLENT INSIDERS USING ACCESS CONTROL
      6. LESS-LETHAL PAYLOADS FOR ROBOTIC AND AUTOMATED RESPONSE SYSTEMS
      7. DEFENDING AGAINST DIRECTED ENERGY WEAPONS: RF WEAPONS AND LASERS
      8. THE SENSOR WEB: ADVANCED TECHNOLOGY FOR SITUATIONAL AWARENESS
    9. Critical Information Infrastructure Protection
      1. CRITICAL INFORMATION INFRASTRUCTURE PROTECTION, OVERVIEW
      2. AUSTRALIA
      3. AUSTRIA
      4. BRAZIL
      5. CANADA
      6. ESTONIA
  3. Volume 2
    1. Copyright
    2. CONTENTS
    3. CONTRIBUTORS
    4. FINLAND
    5. FRANCE
    6. GERMANY
    7. HUNGARY
    8. INDIA
    9. ITALY
    10. JAPAN
    11. REPUBLIC OF KOREA*
    12. MALAYSIA
    13. THE NETHERLANDS*
    14. NEW ZEALAND*
    15. NORWAY*
    16. POLAND*
    17. RUSSIA
    18. SINGAPORE
    19. SPAIN
    20. SWEDEN
    21. SWITZERLAND
    22. UNITED KINGDOM
    23. UNITED STATES
    24. EUROPEAN UNION (EU)
    25. THE FORUM OF INCIDENT RESPONSE AND SECURITY TEAMS (FIRST)
    26. GROUP OF EIGHT (G8)*
    27. NORTH ATLANTIC TREATY ORGANIZATION (NATO)
    28. ORGANIZATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT (OECD)*
    29. UNITED NATIONS (UN)
    30. THE WORLD BANK GROUP
    31. CYBER SECURITY
      1. CLASSES OF VULNERABILITIES AND ATTACKS
      2. AUTHENTICATION, AUTHORIZATION, ACCESS CONTROL, AND PRIVILEGE MANAGEMENT
      3. ADVANCED ATTACKER DETECTION AND UNDERSTANDING WITH EMERGING HONEYNET TECHNOLOGIES
      4. DETECTION OF HIDDEN INFORMATION, COVERT CHANNELS, AND INFORMATION FLOWS
      5. ATTACK TRACEBACK AND ATTRIBUTION
      6. CYBER FORENSICS
      7. CYBER SECURITY POLICY SPECIFICATION AND MANAGEMENT
      8. MULTILEVEL SECURITY
      9. CYBER SECURITY STANDARDS
      10. CYBER SECURITY METRICS AND MEASURES
      11. TRUSTED PLATFORMS: THE ROOT OF SECURITY
      12. HIGH ASSURANCE: PROVABLY SECURE SYSTEMS AND ARCHITECTURES
      13. SECURITY OF DISTRIBUTED, UBIQUITOUS, AND EMBEDDED COMPUTING PLATFORMS
      14. SECURITY OF WEB APPLICATION AND SERVICES AND SERVICE-ORIENTED ARCHITECTURES
      15. CYBER SECURITY TECHNOLOGY USABILITY AND MANAGEMENT
      16. CYBER SECURITY EDUCATION, TRAINING, AND AWARENESS
      17. INDUSTRIAL PROCESS CONTROL SYSTEM SECURITY
      18. CYBER SECURITY FOR THE BANKING AND FINANCE SECTOR
    32. SYSTEM AND SECTOR INTERDEPENDENCIES
      1. SYSTEM AND SECTOR INTERDEPENDENCIES: AN OVERVIEW
      2. SYSTEM AND SECTOR INTERDEPENDENCIES: AN OVERVIEW OF RESEARCH AND DEVELOPMENT
      3. PRESIDENT’S COMMISSION ON CRITICAL INFRASTRUCTURE PROTECTION
      4. INPUT–OUTPUT MODELING FOR INTERDEPENDENT INFRASTRUCTURE SECTORS
      5. APPLICATION OF A CONDITIONAL RISK ASSESSMENT METHODOLOGY FOR PRIORITIZATION OF CRITICAL INFRASTRUCTURE
      6. CRITICAL INFRASTRUCTURES AT RISK: A EUROPEAN PERSPECTIVE
      7. VULNERABILITY ASSESSMENT METHODOLOGIES FOR INTERDEPENDENT SYSTEMS
      8. ROBUSTNESS, RESILIENCE, AND SECURITY OF NATIONAL CRITICAL INFRASTRUCTURE SYSTEMS
      9. INHERENTLY SECURE NEXT-GENERATION COMPUTING AND COMMUNICATION NETWORKS FOR REDUCING CASCADING IMPACTS
      10. IMPLICATIONS OF REGULATION ON THE PROTECTION OF CRITICAL INFRASTRUCTURES
      11. CHARACTERIZING INFRASTRUCTURE FAILURE INTERDEPENDENCIES TO INFORM SYSTEMIC RISK
      12. MANAGING CRITICAL INFRASTRUCTURE INTERDEPENDENCIES: THE ONTARIO APPROACH
      13. ANALYSIS OF CASCADING INFRASTRUCTURE FAILURES
      14. WATER INFRASTRUCTURE INTERDEPENDENCIES
      15. INFRASTRUCTURE DEPENDENCY INDICATORS
      16. OBJECT-ORIENTED APPROACHES FOR INTEGRATED ANALYSIS OF INTERDEPENDENT ENERGY NETWORKS
      17. GEOSPATIAL DATA SUPPORT FOR INFRASTRUCTURE INTERDEPENDENCIES ANALYSIS
      18. THE MILITARY ROOTS OF CRITICAL INFRASTRUCTURE ANALYSIS AND ATTACK
      19. NETWORK FLOW APPROACHES FOR ANALYZING AND MANAGING DISRUPTIONS TO INTERDEPENDENT INFRASTRUCTURE SYSTEMS
  4. Volume 3
    1. Copyright
    2. CONTENTS
    3. CONTRIBUTORS
    4. SOCIAL AND BEHAVIORAL RESEARCH
      1. SOCIAL AND PSYCHOLOGICAL ASPECTS OF TERRORISM
      2. HUMAN SENSATION AND PERCEPTION
      3. HUMAN BEHAVIOR AND DECEPTION DETECTION
      4. SPEECH AND VIDEO PROCESSING FOR HOMELAND SECURITY
      5. TRAINING AND LEARNING DEVELOPMENT FOR HOMELAND SECURITY
      6. TRAINING FOR INDIVIDUAL DIFFERENCES IN LIE DETECTION ABILITY
      7. DETERRENCE: AN EMPIRICAL PSYCHOLOGICAL MODEL
    5. DECISION SUPPORT SYSTEMS
      1. TECHNOLOGIES FOR REAL-TIME DATA ACQUISITION, INTEGRATION, AND TRANSMISSION
      2. MULTI-OBJECTIVE DECISION ANALYSIS
      3. NATURALISTIC DECISION MAKING, EXPERTISE, AND HOMELAND SECURITY
      4. CLASSIFICATION AND CLUSTERING FOR HOMELAND SECURITY APPLICATIONS
      5. EXPERIENCE WITH EXPERT JUDGMENT: THE TU DELFT EXPERT JUDGMENT DATA
      6. SECURITY AND SAFETY SYNERGY
      7. CRITICAL INFRASTRUCTURE PROTECTION DECISION MAKING
      8. THE USE OF THREAT, VULNERABILITY, AND CONSEQUENCE (TVC) ANALYSIS FOR DECISION MAKING ON THE DEPLOYMENT OF LIMITED SECURITY RESOURCES
    6. KEY APPLICATION AREAS
      1. VULNERABILITY OF THE DOMESTIC FOOD SUPPLY CHAIN
      2. THE GLOBAL FOOD SUPPLY CHAIN
      3. ECONOMIC IMPACT OF A LIVESTOCK ATTACK
      4. SOCIAL, PSYCHOLOGICAL, AND COMMUNICATION IMPACTS OF AN AGROTERRORISM ATTACK
      5. FOREIGN ANIMAL DISEASES AND FOOD SYSTEM SECURITY
      6. INSECTS AS VECTORS OF FOODBORNE PATHOGENS
      7. FARM LEVEL CONTROL OF FOREIGN ANIMAL DISEASE AND FOOD-BORNE PATHOGENS
      8. RISK ASSESSMENT, RISK MANAGEMENT, AND PREVENTIVE BEST PRACTICES FOR RETAILERS AND FOODSERVICE ESTABLISHMENTS
      9. RISK ASSESSMENT AND SAFETY OF THE FOOD SUPPLY
      10. MICROBIOLOGICAL DETECTORS FOR FOOD SAFETY APPLICATIONS
      11. GENERAL DETECTOR CAPABILITIES FOR FOOD SAFETY APPLICATIONS
      12. MITIGATING PUBLIC HEALTH RISKS FROM AN AGROTERROR ATTACK
      13. PROCESSING AND PACKAGING THAT PROTECTS THE FOOD SUPPLY AGAINST INTENTIONAL CONTAMINATION
      14. EARLY DETECTION AND DIAGNOSIS OF HIGH-CONSEQUENCE PLANT PESTS IN THE UNITED STATES
      15. MITIGATING CONSEQUENCES OF PATHOGEN INOCULATION INTO PROCESSED FOOD
      16. MICROBIAL FORENSICS AND PLANT PATHOGENS: ATTRIBUTION OF AGRICULTURAL CRIME
      17. POTENTIAL FOR HUMAN ILLNESS FROM ANIMAL TRANSMISSION OR FOOD-BORNE PATHOGENS
      18. LIVESTOCK AGROTERRORISM AND THE POTENTIAL PUBLIC HEALTH RISK
      19. THE ROLE OF FOOD SAFETY IN FOOD SECURITY
      20. CARVER + SHOCK: FOOD DEFENSE SOFTWARE DECISION SUPPORT TOOL
      21. THE EDEN HOMELAND SECURITY PROJECT: EDUCATIONAL OPPORTUNITIES IN FOOD AND AGROSECURITY
      22. DECONTAMINATION AND DISPOSAL OF CONTAMINATED FOODS
      23. CARCASS DISPOSAL OPTIONS
      24. OPTIMAL INVESTMENTS IN MITIGATING AGROTERRORISM RISKS
      25. MID-INFRARED SENSORS FOR THE RAPID ANALYSIS OF SELECT MICROBIAL FOOD BORNE PATHOGENS
      26. PULSENET: A PROGRAM TO DETECT AND TRACK FOOD CONTAMINATION EVENTS
      27. DEVELOPING RISK METRICS TO ESTIMATE RISKS OF CATASTROPHIC BIOLOGICAL AND BIOTERRORIST EVENTS: APPLICATIONS TO THE FOOD INDUSTRY
    7. WATER
      1. WATER INFRASTRUCTURE AND WATER USE IN THE UNITED STATES
      2. PROTECTING WATER INFRASTRUCTURE IN THE UNITED STATES
      3. DRINKING WATER SUPPLY, TREATMENT, AND DISTRIBUTION PRACTICE IN THE UNITED STATES*
      4. HOMELAND SECURITY AND WASTEWATER TREATMENT
  5. Volume 4
    1. Copyright
    2. CONTENTS
    3. CONTRIBUTORS
    4. WATER SUPPLY AND WASTEWATER MANAGEMENT REGULATIONS, STANDARDS, AND GUIDANCE
    5. ROLES OF FEDERAL, STATE, AND LOCAL AUTHORITIES IN WATER INFRASTRUCTURE SECURITY
    6. POTENTIAL CONTAMINATION AGENTS OF INTEREST
    7. UNDERSTANDING THE IMPLICATIONS OF CRITICAL INFRASTRUCTURE INTERDEPENDENCIES FOR WATER
    8. SURVEILLANCE METHODS AND TECHNOLOGIES FOR WATER AND WASTEWATER SYSTEMS
    9. DESIGNING AN OPTIMUM WATER MONITORING SYSTEM
    10. EMERGENCY RESPONSE PLANNING FOR DRINKING WATER SYSTEMS
    11. TREATABILITY OF CONTAMINANTS IN CONVENTIONAL SYSTEMS
    12. DECONTAMINATION METHODS FOR DRINKING WATER TREATMENT AND DISTRIBUTION SYSTEMS
    13. DECONTAMINATION METHODS FOR WASTEWATER AND STORMWATER COLLECTION AND TREATMENT SYSTEMS
    14. PREVENTION OF CONTAMINATION OF DRINKING WATER IN BUILDINGS AND LARGE VENUES
    15. COMMUNICATIONS AND INFORMATION INFRASTRUCTURE
      1. CRITICAL INFRASTRUCTURE PROTECTION: TELECOMMUNICATION
      2. STRATEGIES FOR PROTECTING THE TELECOMMUNICATIONS SECTOR
      3. WIRELESS SECURITY
    16. ENERGY SYSTEMS
      1. COMPARATIVE RISK ASSESSMENT FOR ENERGY SYSTEMS: A TOOL FOR COMPREHENSIVE ASSESSMENT OF ENERGY SECURITY
      2. LESSONS LEARNED FOR REGIONAL AND GLOBAL ENERGY SECURITY
      3. LARGE-SCALE ELECTRICITY TRANSMISSION GRIDS: LESSONS LEARNED FROM THE EUROPEAN ELECTRICITY BLACKOUTS
      4. INTERDEPENDENT ENERGY INFRASTRUCTURE SIMULATION SYSTEM
      5. SELF-HEALING AND RESILIENT ENERGY SYSTEMS
      6. NANO-ENABLED POWER SOURCES
    17. PUBLIC HEALTH
      1. THREAT FROM EMERGING INFECTIOUS DISEASES
      2. FOREIGN DENGUE VIRUS PRESENTS A LOW RISK TO U.S. HOMELAND
      3. DATA SOURCES FOR BIOSURVEILLANCE
      4. BIOSURVEILLANCE TRADECRAFT
      5. THE NORTH CAROLINA BIOSURVEILLANCE SYSTEM
      6. ESSENCE: A PRACTICAL SYSTEMS FOR BIOSURVEILLANCE
      7. BIODEFENSE PRIORITIES IN LIFE-SCIENCE RESEARCH: CHEMICAL THREAT AGENTS
      8. DEVELOPMENT OF RADIATION COUNTERMEASURES
      9. CHALLENGES TO MEDICAL COUNTERMEASURES AGAINST CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR (CBRN) AGENTS
      10. MEDICAL COUNTERMEASURES AGAINST EMERGING THREAT AGENTS
      11. BIODEFENSE WORKFORCE
      12. HEALTH RISK ASSESSMENT FOR RADIOLOGICAL, CHEMICAL, AND BIOLOGICAL ATTACKS*
    18. TRANSPORTATION SECURITY
      1. ROLES AND IMPLICATIONS OF TRANSPORTATION SYSTEMS IN HOMELAND SECURITY
      2. TRANSPORTATION SYSTEM AS A SECURITY CHALLENGE
      3. POPULATION EVACUATIONS
      4. EMERGENCY TRANSPORTATION OPERATIONS AND CONTROL
      5. ULTRA-SCALE COMPUTING FOR EMERGENCY EVACUATION
      6. HARDEN SECURITY OF HIGH-RISK AND CRITICAL SUPPLY CHAINS
      7. TRANSPORTATION SECURITY PERFORMANCE MEASURES
    19. INTELLIGENCE SYSTEMS
      1. FILE FORENSICS AND CONVERSION
      2. CRANIOFACIAL AGING
      3. NEW APPROACHES TO IRIS RECOGNITION: ONE-DIMENSIONAL ALGORITHMS
      4. SPECTRALLY ADAPTIVE NANOSCALE QUANTUM DOT SENSORS
      5. FINDING INADVERTENT RELEASE OF INFORMATION
  6. Contents
  7. Contributors
  8. Index