Search Results for Infrastructure (Economics) -- Security measures.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInfrastructure$002b$002528Economics$002529$002b--$002bSecurity$002bmeasures.$0026te$003dILS$0026ps$003d300?2024-11-04T18:59:19ZCritical infrastructure homeland security and emergency preparednessent://SD_ILS/0/SD_ILS:2881612024-11-04T18:59:19Z2024-11-04T18:59:19ZAuthor Radvanovsky, Robert. McDougall, Allan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466503465">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Next catastrophe : reducing our vulnerabilities to natural, industrial, and terrorist disastersent://SD_ILS/0/SD_ILS:3752872024-11-04T18:59:19Z2024-11-04T18:59:19ZAuthor Perrow, Charles.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.ctt7t4c1">http://www.jstor.org/stable/10.2307/j.ctt7t4c1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Homeland security and private sector business corporations' role in critical infrastructure protectionent://SD_ILS/0/SD_ILS:2905662024-11-04T18:59:19Z2024-11-04T18:59:19ZAuthor Lee, Elsa.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420070798">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Strategies for protecting national critical infrastructure assets a focus on problem-solvingent://SD_ILS/0/SD_ILS:2971062024-11-04T18:59:19Z2024-11-04T18:59:19ZAuthor Sullivant, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0740/2007026434-b.html">http://catdir.loc.gov/catdir/enhancements/fy0740/2007026434-b.html</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470228371">http://dx.doi.org/10.1002/9780470228371</a>
Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpSPNCIAA6">http://app.knovel.com/web/toc.v/cid:kpSPNCIAA6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Techno security's guide to securing SCADAent://SD_ILS/0/SD_ILS:1484922024-11-04T18:59:19Z2024-11-04T18:59:19ZAuthor Wiles, Jack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492829">http://www.sciencedirect.com/science/book/9781597492829</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Seeds of Disaster, Roots of Response How Private Action Can Reduce Public Vulnerabilityent://SD_ILS/0/SD_ILS:2359672024-11-04T18:59:19Z2024-11-04T18:59:19ZAuthor Auerswald, Philip E.. Branscomb, Lewis M.. La Porte, Todd M.. Michel-Kerjan, Erwann O..<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511509735">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>