Author: American Nuclear Society
Publisher:
ISBN:
Category : Nuclear engineering
Languages : en
Pages : 1096
Book Description
Transactions of the American Nuclear Society
Author: American Nuclear Society
Publisher:
ISBN:
Category : Nuclear engineering
Languages : en
Pages : 1096
Book Description
Publisher:
ISBN:
Category : Nuclear engineering
Languages : en
Pages : 1096
Book Description
Energy and Water Development Appropriations for 2012: Dept. of Energy FY 2012 justifications
Author: United States. Congress. House. Committee on Appropriations. Subcommittee on Energy and Water Development
Publisher:
ISBN:
Category : Federal aid to energy development
Languages : en
Pages : 1436
Book Description
Publisher:
ISBN:
Category : Federal aid to energy development
Languages : en
Pages : 1436
Book Description
Annual Report to Congress
Author: United States. Department of Energy
Publisher:
ISBN:
Category : Energy policy
Languages : en
Pages : 506
Book Description
Publisher:
ISBN:
Category : Energy policy
Languages : en
Pages : 506
Book Description
Secretary's Annual Report to Congress
Author: United States. Department of Energy
Publisher:
ISBN:
Category : Energy policy
Languages : en
Pages : 248
Book Description
Publisher:
ISBN:
Category : Energy policy
Languages : en
Pages : 248
Book Description
Nuclear Criticality Safety
Author: Ronald Allen Knief
Publisher: American Nuclear Society
ISBN:
Category : Technology & Engineering
Languages : en
Pages : 256
Book Description
Nuclear criticality safety is the prevention of nuclear chain reactions in fissile materials outside of reactors. This book presents the underlying principles of nuclear criticality safety theory along with descriptions of the principal methods currently used and their in-plant applications. Exercises are provided at the end of each chapter to increase understanding of the text.
Publisher: American Nuclear Society
ISBN:
Category : Technology & Engineering
Languages : en
Pages : 256
Book Description
Nuclear criticality safety is the prevention of nuclear chain reactions in fissile materials outside of reactors. This book presents the underlying principles of nuclear criticality safety theory along with descriptions of the principal methods currently used and their in-plant applications. Exercises are provided at the end of each chapter to increase understanding of the text.
NUREG/CR.
Author: U.S. Nuclear Regulatory Commission
Publisher:
ISBN:
Category : Nuclear energy
Languages : en
Pages : 164
Book Description
Publisher:
ISBN:
Category : Nuclear energy
Languages : en
Pages : 164
Book Description
DOE this Month
Author:
Publisher:
ISBN:
Category : Energy conservation
Languages : en
Pages : 16
Book Description
Publisher:
ISBN:
Category : Energy conservation
Languages : en
Pages : 16
Book Description
Federal Register
Author:
Publisher:
ISBN:
Category : Delegated legislation
Languages : en
Pages : 2630
Book Description
Publisher:
ISBN:
Category : Delegated legislation
Languages : en
Pages : 2630
Book Description
Countering Cyber Sabotage
Author: Andrew A. Bochman
Publisher: CRC Press
ISBN: 1000292975
Category : Political Science
Languages : en
Pages : 232
Book Description
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.
Publisher: CRC Press
ISBN: 1000292975
Category : Political Science
Languages : en
Pages : 232
Book Description
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.
Professional Safety
Author:
Publisher:
ISBN:
Category : Electronic journals
Languages : en
Pages : 910
Book Description
Publisher:
ISBN:
Category : Electronic journals
Languages : en
Pages : 910
Book Description