Shortcuts
Please wait while page loads.
LiberoBanner . Default .
PageMenu- Main Menu-
Page content

Catalogue Display

Handbook of Water and Wastewater Systems Protection.

Handbook of Water and Wastewater Systems Protection.
Item Information
Barcode Shelf Location Collection Volume Ref. Branch Status Due Date Res.
10023429 Access this eBook online Ebook for Engineering   GUtech Library . . Available .  
. Catalogue Record 9781 ItemInfo Beginning of record . Catalogue Record 9781 ItemInfo Top of page .
Catalogue Information
Field name Details
ISBN 9781461401896
9781461401889
Author Clark, Robert M.
Title Handbook of Water and Wastewater Systems Protection.
Description 1 online resource (528 pages)
Contents Acknowledgement -- Contents -- Contributors -- 1 Securing Water and Wastewater Systems: An Overview -- 1.1 Introduction -- 1.2 History of Water Supply Vulnerability -- 1.3 Threats from Earthquakes -- 1.3.1 The Loma Prieta Earthquake -- 1.3.2 The Northridge Earthquake -- 1.3.3 Kobe City Earthquake -- 1.3.4 Technological and Institutional Adaptation -- 1.3.4.1 Technological Adaptations -- 1.3.4.2 Institutional Adaptations -- 1.4 Vulnerable Characteristics of US Water Supply Systems -- 1.5 The Threat of Terrorism to Urban Water Systems -- 1.5.1 Bioterrorism and Chemical Contamination -- 1.6 Countermeasures Against Terrorism -- 1.6.1 Physical Countermeasures -- 1.6.2 Sensor Networks -- 1.7 Cyber Security -- 1.7.1 Laws and Regulations Governing the Internet -- 1.7.2 Internet Recovery -- 1.7.3 Examples of Internet Interruption -- 1.7.3.1 Case Study -- The Slammer Worm -- 1.7.3.2 Case Study -- A Root Server Attack -- 1.7.3.3 Case Study -- The Baltimore Train Tunnel Fire -- 1.7.3.4 Case Study -- The September 11, 2001, Terrorist Attack on the World Trade Center -- 1.7.3.5 Case Study -- Hurricane Katrina -- 1.7.4 Cyber Attacks in the Public Sector -- 1.7.4.1 The ''Stuxnet'' Virus -- 1.8 Material to Be Included in This Book -- 1.8.1 Current State of Water Supply and Wastewater Systems Security: An Overview -- 1.8.2 Characteristics of Water and Wastewater Systems in the United States -- 1.8.3 Chemical and Microbiological Threats for Water System Contamination -- 1.8.4 Monitoring for Natural and Manmade Threats in Water and Wastewater Systems -- 1.8.5 Modeling Contaminant Propagation and Contaminant Threats -- 1.8.6 Case Study Applications -- 1.8.7 Distribution System Modeling, SCADA Systems, Security and Surveillance Systems -- 1.8.8 Institutional and Management Issues in Responding to Natural and Manmade Threats.
1.8.9 Developing Techniques and Approaches for Natural and Manmade Threat Response -- 1.9 Summary and Conclusions -- References -- 2 Water/Wastewater Infrastructure Security: Threats and Vulnerabilities -- 2.1 Introduction -- 2.2 Why Secure Water Infrastructure? -- 2.3 Threats to Water Systems -- 2.3.1 Evolving Threat Environment -- 2.3.1.1 September 11 Terrorist Attacks -- 2.3.1.2 Hurricane Katrina -- 2.3.2 Threat Assessments -- 2.3.3 Natural Disasters -- 2.3.3.1 Human-Caused Incidents -- 2.3.3.2 External Threats -- 2.3.3.3 Internal Threats -- 2.3.3.4 Cyber Threats -- 2.3.4 Design Basis Threat -- 2.3.5 Continuity Threats to Workforce and Infrastructure -- 2.3.5.1 The Dual Threat: Aging Infrastructure and Aging Workforce -- 2.3.5.2 Aging Infrastructure -- 2.3.5.3 Interdependent Infrastructure Failures -- 2.3.5.4 Workforce Illness -- 2.4 Water System Vulnerabilities -- 2.4.1 Above-Ground Structures -- 2.4.2 Below-Ground Structures -- 2.4.3 SCADA and Cyber Systems -- 2.4.4 Vulnerability Assessments -- References -- 3 EPA Drinking Water Security Research Program -- 3.1 Background -- 3.2 Research Drivers -- 3.3 Objectives and Desired Outcomes -- 3.4 Water Security Research -- 3.4.1 Protection and Prevention -- 3.4.1.1 Blast Vulnerability Assessment Tool -- 3.4.1.2 Design and Renovation of Drinking Water Systems -- 3.4.1.3 Contingency Planning Following Disasters and Disruption of Service -- 3.4.2 Detection -- 3.4.2.1 Commercially Available Sensors/Detectors -- 3.4.2.2 Development of New Detectors -- 3.4.2.3 Threat Ensemble Vulnerability Assessment Research -- 3.4.2.4 Public Health Surveillance -- 3.4.2.5 Sampling and Analytical Methods -- 3.4.2.6 Improving Microbial Contaminant Detection -- Sample Concentration -- 3.4.3 Containment and Mitigation -- 3.4.4 Water Treatment and Infrastructure Decontamination -- 3.4.4.1 Inactivation of Biothreat Agents.
3.4.4.2 Persistence of Contaminants in Pipes and Other Water System Infrastructure -- 3.4.4.3 Inactivation of Anthrax Spores in Decontamination Wash/Waste Water -- 3.4.4.4 Quantitative Structure Property Relationship Prediction of Chlorine Reactivity with Chemical Contaminants of Concern -- 3.4.5 Technology Testing and Evaluation Program -- 3.5 Research Outcomes -- 3.6 Future Direction -- Acronyms -- References -- 4 Drinking Water Critical Infrastructure and Its Protection -- 4.1 Introduction -- 4.2 Water Security Issues -- 4.2.1 Water Sector Dependencies -- 4.2.2 Critical Infrastructure Definition -- 4.2.3 Contaminants of Concern -- 4.2.3.1 Agency for Toxic Substances and Disease Registry (ATSDR) -- 4.2.3.2 Center for Disease Control (CDC) -- 4.2.3.3 US Environmental Protection Agency (USEPA) -- 4.2.3.4 Food and Drug Administration (FDA) -- 4.2.3.5 World Health Organization (WHO) Database -- 4.2.3.6 Water Information Sharing and Analysis Center (WaterISAC) -- 4.2.3.7 Chemical Weapons Convention -- 4.2.3.8 North Atlantic Treaty Organization (NATO) -- 4.2.3.9 US Department of Defense -- 4.2.3.10 National Institute of Justice (NIJ) -- 4.2.3.11 Congressional Research Service -- 4.3 Water Quality Security -- 4.3.1 Water Security Initiative (WSI) -- 4.3.2 Environmental Technology Verification (ETV) and Technology Testing and Evaluation (TTEP) -- 4.3.3 The Standardized Analytical Methods for Environmental Restoration Following Homeland Security Events (SAM) -- 4.3.4 Response Protocol Tool Box (RPTB) -- 4.3.5 Water Contaminant Information Tool (WCIT) -- 4.4 Water Quality Security Models -- 4.4.1 EPANET Family of Codes -- 4.4.2 TEVA's Sensor Placement Optimization Tool (SPOT) -- 4.4.3 CANARY -- 4.5 Physical Security -- 4.5.1 Physical Security Tools -- 4.6 Cyber Security -- 4.6.1 Specific Actions to Improve Implementation.
4.6.2 Actions to Establish Essential Underlying Management Processes -- References -- 5 Wastewater Critical Infrastructure Security and Protection -- 5.1 Introduction -- 5.2 Wastewater Security Regulations -- 5.3 Early Warning System -- 5.3.1 Selection Criteria for an Early Warning System -- 5.3.2 Wastewater Contaminants of Concern Database -- 5.3.3 Wastewater Sensors -- 5.3.4 Sensor Locations -- 5.3.4.1 Local Conditions -- 5.3.4.2 System-Wide and Topological Factors -- 5.3.5 Anomaly Detection -- 5.4 Security Incidents: Consequences and Response -- 5.4.1 Decontamination -- 5.4.2 Response to Wastewater Treatment from CBR -- 5.4.3 Response to Upset Event in Wastewater -- Normal Conditions -- 5.5 EPA-WERF Wastewater Security Research -- 5.6 Summary -- References -- 6 Protecting Water and Wastewater Systems -- 6.1 Introduction -- 6.2 Nebraskas Response to PL 1071--88 -- 6.2.1 Vulnerability Assessments -- 6.2.2 Progress in Completing Vulnerability Assessments -- 6.2.3 Response to Emergencies -- 6.3 Nebraska's Public Water System Emergency Response Plan -- 6.3.1 Implementing the Plan -- 6.3.1.1 Training Activities -- 6.4 Potential for Replication -- 6.5 Summary and Conclusions -- Appendix: Security Needs Assessment Summary -- 7 Spatial Distributed Risk Assessment for Urban Water Infrastructure -- 7.1 Introduction -- 7.1.1 Hazard Maps -- 7.1.2 Vulnerability Maps -- 7.1.3 Intrinsic Vulnerability Maps -- 7.1.4 Risk Maps -- 7.2 Materials and Methods -- 7.2.1 Performance Evaluation for Water Supply -- 7.2.2 Performance Evaluation for Urban Drainage -- 7.2.3 Vulnerability Assessment -- 7.2.4 Hazard Assessment -- 7.2.4.1 Flooding Hazard (h1) -- 7.2.4.2 Landslide Hazard (h2) -- 7.2.4.3 Avalanche Hazard (h3) -- 7.2.4.4 Debris Flow (h4) -- 7.2.5 Risk Assessment -- 7.2.6 Case Studies for Water Supply -- 7.2.7 Case Studies for Urban Drainage.
7.3 Results and Discussion -- 7.3.1 Vulnerability Maps -- 7.3.2 Vulnerability Maps for WSSs -- 7.3.3 Vulnerability Maps for UDSs -- 7.3.4 Risk Maps -- 7.3.5 Summary of Risk Analysis -- 7.4 Conclusions -- References -- 8 US Water and Wastewater Critical Infrastructure -- 8.1 Introduction -- 8.2 Safe Drinking Water Act -- 8.3 Clean Water Act -- 8.4 Water and Wastewater Infrastructure -- 8.4.1 Drinking Water Infrastructure -- 8.4.2 Wastewater Infrastructure -- 8.4.2.1 Other US Water Infrastructure -- 8.5 Drinking Water Infrastructure Needs -- 8.6 Wastewater Infrastructure Needs -- 8.7 Summary and Conclusions -- References -- 9 Microbial Issues in Drinking Water Security -- 9.1 Introduction -- 9.2 Bio-threat Agents -- 9.3 Persistence -- 9.4 Detection -- 9.5 Treatment -- 9.6 Summary -- References -- 10 Rapid Detection of Bacteria in Drinking Water and Wastewater Treatment Plants -- 10.1 Introduction -- 10.2 Waterborne Pathogens -- 10.3 History of Water System Contamination -- 10.3.1 Recent Water Contamination Experience in the USA -- 10.3.1.1 Cabool Missouri Case Study -- 10.3.1.2 Gideon, Missouri Case Study -- 10.3.1.3 Walkerton, Canada Case Study -- 10.3.1.4 Cryptosporidium Outbreak in Milwaukee -- 10.4 Need for Development of a Rapid Detection Method -- 10.5 Method Development -- 10.5.1 Sample Filtration -- 10.5.2 ATP Bioluminescence -- 10.5.3 Bacterial Enumeration: AODC, DVC, and HPC -- 10.6 Method Validation -- 10.6.1 Collection of Water Samples -- 10.6.2 Public Water Supplies in France -- 10.6.3 Results and Discussion -- 10.7 Summary and Conclusions -- References -- 11 Chlorine Residual Management for Water Distribution System Security -- 11.1 Introduction and Background -- 11.2 Vulnerability Assessment Using Chlorine Residual Modeling -- 11.3 Chlorine Sensors for Nonspecific Event Detection -- 11.4 Booster Response to Low Chlorine.
11.5 Future Directions in Chlorine Sensing for Drinking Water Distribution System Control.
Subject Sewage -- Protection
Water-supply -- Protection
Waterworks -- Protection
Other Author Electronic books.
Other name(s) Hakim, Simon
Ostfeld, Avi
Ebook Link Find Ebook Central in MyGUtech
Links to Related Works
Subject References:
Authors:
Catalogue Information 9781 Beginning of record . Catalogue Information 9781 Top of page .

Reviews


This item has not been rated.    Add a Review and/or Rating9781