LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Physical Security in the Process Industry: Theory with Applications deals with physical security in the field of critical infrastructures where hazardous materials are a factor, a… Read more
LIMITED OFFER
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Physical Security in the Process Industry: Theory with Applications deals with physical security in the field of critical infrastructures where hazardous materials are a factor, along with the state-of-the-art thinking and modeling methods for enhancing physical security. The book offers approaches based on scientific insights, mainly addressing terrorist attacks. Moreover, the use of innovative techniques is explained, including Bayesian networks, game-theory and petri-networks. Dealing with economic parameters and constraints and calculating the costs and benefits of security measures are also included. The book will be of interest to security (and safety) scientists, security managers and the public at large.
Academics and students in the field of physical security (and safety); security (and safety) scientists and security engineers; chemical engineers; security (and safety) managers from chemical companies (including process and oil & gas), pharmaceutical companies, the nuclear industry, and hazmat transportation; engaged citizens
1. An introduction to physical security
2. History of terrorist attacks to Critical infrastructures involving hazardous materials
3. Security in relation to safety
4. Principles and concepts for physical security
5. Physical security measures
5.1. Inherent (safety and) security design (CPTED)
5.2.. Add-on (safety and) security measures
6. Physical security risk assessment
6.1. Existing security risk assessment approaches (TA, VA, SVA)
6.2. Innovative security risk assessment approaches (BN, GT, Petri-networks)
7. Physical security risk management
7.1. Costs of security measures
7.2. Benefits of security measures
7.3. Cost-benefit Decision-making for physical security
8. General conclusions
GL
NK
GR