Atnaujinkite slapukų nuostatas

El. knyga: Letters, Power Lines, and Other Dangerous Things: The Politics of Infrastructure Security

(Northeastern University)
  • Formatas: 384 pages
  • Serija: Infrastructures
  • Išleidimo metai: 08-May-2020
  • Leidėjas: MIT Press
  • Kalba: eng
  • ISBN-13: 9780262357777
  • Formatas: 384 pages
  • Serija: Infrastructures
  • Išleidimo metai: 08-May-2020
  • Leidėjas: MIT Press
  • Kalba: eng
  • ISBN-13: 9780262357777

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

An examination of how post-9/11 security concerns have transformed the public view and governance of infrastructure.

After September 11, 2001, infrastructures—the mundane systems that undergird much of modern life—were suddenly considered “soft targets” that required immediate security enhancements. Infrastructure protection quickly became the multibillion dollar core of a new and expansive homeland security mission. In this book, Ryan Ellis examines how the long shadow of post-9/11 security concerns have remade and reordered infrastructure, arguing that it has been a stunning transformation. Ellis describes the way workers, civic groups, city councils, bureaucrats, and others used the threat of terrorism as a political resource, taking the opportunity not only to address security vulnerabilities but also to reassert a degree of public control over infrastructure.

Nearly two decades after September 11, the threat of terrorism remains etched into the inner workings of infrastructures through new laws, regulations, technologies, and practices. Ellis maps these changes through an examination of three U.S. infrastructures: the postal system, the freight rail network, and the electric power grid. He describes, for example, how debates about protecting the mail from anthrax and other biological hazards spiraled into larger arguments over worker rights, the power of large-volume mailers, and the fortunes of old media in a new media world; how environmental activists leveraged post-9/11 security fears over shipments of hazardous materials to take on the rail industry and the chemical lobby; and how otherwise marginal federal regulators parlayed new mandatory cybersecurity standards for the electric power industry into a robust system of accountability.



An examination of how post-9/11 security concerns have transformed the public view and governance of infrastructure.
Acknowledgments vii
Introduction: Letters, Power Lines, and Other Dangerous Things 1(28)
I The Political Origins of Infrastructure Vulnerability
29(108)
1 Stumbling toward Resilience: The Overlooked Virtues of Regulation
31(56)
2 The Political Origins of Infrastructure Vulnerability: The Hidden Vices of Deregulation
87(50)
II Ubiquitous Targets: Infrastructure Security after September 11
137(116)
3 Imagination Unbound: Risk, Politics, and Post-9/11 Anxiety
139(26)
4 Infected Mail: Labor, Commerce, and the 2001 Anthrax Attacks
165(20)
5 Green Security: The Environmental Movement, the Transportation of Hazardous Materials, and the War on Terror
185(24)
6 Regulating Cybersecurity: The Unexpected Remaking of Electric Power
209(44)
Conclusion: The Politics of Critical Infrastructure Protection
239(10)
Coda: Infrastructure as Target
249(4)
Notes 253(76)
Bibliography 329(24)
Index 353