Amazon cover image
Image from Amazon.com

Drinking water security for engineers, planners, and managers : integrated water security series / Mary Kay Camarillo, Ph. D., P.E., William T. Stringfellow, Ph. D., Ravi Jain, Ph. D., P.E.

By: Contributor(s): Publisher: Kidlington, Oxford, UK : Butterworth-Heinemann, 2014Copyright date: ©2014Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780124114661
  • 0124114660
Subject(s): Genre/Form: LOC classification:
  • TD353
NLM classification:
  • Online Book
Online resources:
Contents:
1. Introduction -- 2. U.S. regulatory environment and planning for water security -- 3. Threats -- 4. Prevention -- 5. Detection -- 6. Response -- 7. Rehabilitation -- 8. Conclusions.
Summary: Concise and readable, Drinking Water Security for Engineers, Planners and Managers provides an overview of issues including infrastructure planning, planning to evaluate vulnerabilities and potential threats, capital improvement planning, and maintenance and risk management. This book also covers topics regarding potential contaminants, available water security technologies, analytical methods, and sensor technologies and networks. Other topics include transport and containment of contaminated water, treatment technologies and the treatability of contaminants. Threat and vulnerability risk assessments and capital improvementIdentification and characterization of potential contaminants and clean upApplication of information assurance techniques to computerized systems.
Item type: eBooks
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Includes index.

Concise and readable, Drinking Water Security for Engineers, Planners and Managers provides an overview of issues including infrastructure planning, planning to evaluate vulnerabilities and potential threats, capital improvement planning, and maintenance and risk management. This book also covers topics regarding potential contaminants, available water security technologies, analytical methods, and sensor technologies and networks. Other topics include transport and containment of contaminated water, treatment technologies and the treatability of contaminants. Threat and vulnerability risk assessments and capital improvementIdentification and characterization of potential contaminants and clean upApplication of information assurance techniques to computerized systems.

Online resource; title from PDF title page (ScienceDirect, viewed Feb. 12, 2014).

Includes bibliographical references and index.

1. Introduction -- 2. U.S. regulatory environment and planning for water security -- 3. Threats -- 4. Prevention -- 5. Detection -- 6. Response -- 7. Rehabilitation -- 8. Conclusions.

Elsevier ScienceDirect All Books

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu