Browse Items (1 total)

  • Tags: threat

This book concludes by exploring the role of leak detection in the larger context of pipeline risk and integrity management. Many risk evaluation approaches manage risk by calculating it as the product of threat, vulnerability, and consequence. This…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2