Related Books

National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat Statements
Language: en
Pages: 53
Authors: IAEA
Categories: Technology & Engineering
Type: BOOK - Published: 2021-06-04 - Publisher: International Atomic Energy Agency

DOWNLOAD EBOOK

The identification and assessment of threats provides an essential basis for the selection, design, and implementation of nuclear security measures. For nuclear
National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat Statements
Language: en
Pages: 0
Authors: International Atomic Energy Agency
Categories: Nuclear facilities
Type: BOOK - Published: 2021 - Publisher:

DOWNLOAD EBOOK

The identification and assessment of threats provides an essential basis for the selection, design, and implementation of nuclear security measures. For nuclear
National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat Statements
Language: es
Pages: 57
Authors: IAEA
Categories: Technology & Engineering
Type: BOOK - Published: 2022-06-16 - Publisher: International Atomic Energy Agency

DOWNLOAD EBOOK

La determinación y la evaluación de amenazas sienta las bases esenciales para la selección, el diseño y la aplicación de medidas de seguridad física nucle
National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat Statements (Arabic Edition)
Language: en
Pages: 43
Authors: INTERNATIONAL ATOMIC ENERGY AGENCY.
Categories:
Type: BOOK - Published: 2022 - Publisher:

DOWNLOAD EBOOK

The identification and assessment of threats provides an essential basis for the selection, design, and implementation of nuclear security measures. For nuclear
Conducting Computer Security Assessments at Nuclear Facilities
Language: en
Pages: 0
Authors: International Atomic Energy Agency
Categories: Technology & Engineering
Type: BOOK - Published: 2016 - Publisher:

DOWNLOAD EBOOK

Computer security is increasingly recognized as a key component in nuclear security. This publication outlines a methodology for conducting computer security as