A Screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
<record>
<leader>00000nab a2200000 i 4500</leader>
<controlfield tag="001">MAP20071506995</controlfield>
<controlfield tag="003">MAP</controlfield>
<controlfield tag="005">20080418125331.0</controlfield>
<controlfield tag="007">hzruuu---uuuu</controlfield>
<controlfield tag="008">050715e20050401usa|||| | |00010|eng d</controlfield>
<datafield tag="040" ind1=" " ind2=" ">
<subfield code="a">MAP</subfield>
<subfield code="b">spa</subfield>
</datafield>
<datafield tag="084" ind1=" " ind2=" ">
<subfield code="a">7</subfield>
</datafield>
<datafield tag="100" ind1="1" ind2=" ">
<subfield code="0">MAPA20080296346</subfield>
<subfield code="a">Apostolakis, George E.</subfield>
</datafield>
<datafield tag="245" ind1="1" ind2="0">
<subfield code="a">A Screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism</subfield>
<subfield code="c">George E. Apostolakis and Douglas M. Lemon</subfield>
</datafield>
<datafield tag="520" ind1="8" ind2=" ">
<subfield code="a">The extreme importance of critical infrastructures to modern society is widely recognized. These infrastrustures are complex and interdependent. Protecting the critical infrastructures from terrorism presents an enormous challenge. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to identify and prioritize the vulnerabilities in infrastructures. This article presents a methodology for the identification and prioritization of vulnerabilities in infrastructures</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080556808</subfield>
<subfield code="a">Terrorismo</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080549756</subfield>
<subfield code="a">Atentados</subfield>
</datafield>
<datafield tag="650" ind1="0" ind2="1">
<subfield code="0">MAPA20080571009</subfield>
<subfield code="a">Vulnerabilidad</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080569235</subfield>
<subfield code="a">Identificación</subfield>
</datafield>
<datafield tag="650" ind1="0" ind2="1">
<subfield code="0">MAPA20080591182</subfield>
<subfield code="a">Gerencia de riesgos</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080578886</subfield>
<subfield code="a">Análisis en redes</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080576325</subfield>
<subfield code="a">Infraestructuras</subfield>
</datafield>
<datafield tag="700" ind1="1" ind2=" ">
<subfield code="0">MAPA20080198220</subfield>
<subfield code="a">Lemon, Douglas M.</subfield>
</datafield>
<datafield tag="740" ind1="0" ind2=" ">
<subfield code="a">Risk analysis : an international journal</subfield>
</datafield>
<datafield tag="773" ind1="0" ind2=" ">
<subfield code="w">MAP20077000345</subfield>
<subfield code="t">Risk analysis : an international journal</subfield>
<subfield code="d">New York and London</subfield>
<subfield code="g">Vol. 25, nº 2, April 2005 ; p. 361-376</subfield>
</datafield>
</record>
</collection>