Search:

Wake County incident command master plan / by Wake County (N.C.).ICS Task Force.;
Subjects: Incident command systems;
Available copies: 1 / Total copies: 1
unAPI

Implementing the incident command system at the institutional level : a handbook for libraries, archives, museums, and other cultural institutions / by Carmicheal, David W.(CARDINAL)274982;
Subjects: Incident command systems.; Emergency management.; Museums; Museums; Archives; Archives; Collection management (Libraries); Library administration.; Public institutions;
Available copies: 1 / Total copies: 1
On-line resources: Suggest title for digitization;
unAPI

Hazardous materials command & control procedures : ICS : appendix to Wake County ICS master plan. by Wake County (N.C.);
Subjects: Hazardous substances; Incident command systems;
Available copies: 1 / Total copies: 1
unAPI

Wildfire : on the front lines with station 8 / by Hansen, Heather,author.(CARDINAL)487554;
Includes bibliographical references (pages 283-293) index."Every year wildfires ravage forests, destroy communities, and devastate human lives, with only the bravery of dedicated firefighters creating a barrier against even greater destruction. Throughout the 2016 wildfire season, journalist Heather Hansen witnessed firsthand the heroics of the Station 8 crew in Boulder, Colorado. She tells that story here, layered with the added context of the history, science, landscape, and human behavior that, year-by-year, increases the severity, frequency, and costs of conflagrations in the West. She examines the changes in both mindset and activity around wildfires and tracks the movement from wildfire as something useful, to something feared, to something necessary but roundly dreaded. Wildfire shares the drama, hardships, and experiences of the firefighters who try, sometimes in vain, to prevent destruction when a spark flares out of control. Hansen tells the rich and frightening stories of the firefighters themselves and the challenges they face: a safety system struggling to keep up with fire seasons that are lengthening, fires that are becoming more extreme, and agencies that are struggling to cover the bills." --
Subjects: Wildfire fighters; Wildfires; Incident command systems; Fire management;
Available copies: 2 / Total copies: 2
unAPI

NFPA 1600 handbook : emergency management and continuity programs / by O'Connor, Brian J.,editor.(CARDINAL)808975; Larson, Dean R.,editor.(CARDINAL)349562; Hernandez, Orlando P.,editor.; National Fire Protection Association,issuing body.(CARDINAL)142758;
Includes bibliographical references and index.
Subjects: Handbooks and manuals.; Emergency management; Emergency management; Disaster relief; Disaster relief; Incident command systems; Incident command systems; Business planning; Business planning;
Available copies: 1 / Total copies: 1
unAPI

American ground, unbuilding the World Trade Center / by Langewiesche, William.(CARDINAL)264811;
Subjects: World Trade Center (New York, N.Y. : 1970-2001); September 11 Terrorist Attacks, 2001.; Wrecking; Incident command systems; Skyscrapers; Construction and demolition debris; Structural engineering; Underground construction.;
Available copies: 12 / Total copies: 15
unAPI

American ground [large print] : unbuilding the World Trade Center / by Langewiesche, William.(CARDINAL)264811;
At the center of the book is the team of engineers, many of them instrumental in building the towers, who now must collaborate in the sad task of disassembling them. Their responses are as dramatic and unpredictable as the shifting pile of rubble and the surrounding "slurry wall" that constantly threatens to collapse, potentially flooding a large part of underground Manhattan. They are also emotional and territorial, as firemen, police, widows, and officials attempt to claim the tragedy-and the difficult work of extracting the rubble and the thousands of dead buried there-as their own.
Subjects: Large print books.; World Trade Center (New York, N.Y. : 1970-2001); September 11 Terrorist Attacks, 2001.; Wrecking; Incident command systems; Skyscrapers; Construction and demolition debris; Structural engineering; Underground construction.;
Available copies: 2 / Total copies: 2
unAPI

Swiftwater rescue / by Ray, Slim.(CARDINAL)749447;
Includes bibliographical references (pages 253-256) and index.Introduction -- Prologue: an accident on the San Marcos River -- 1. Towards a philosophy of swiftwater rescue -- 2. The river: an introduction to hydrology -- 3. Eqipment -- 4. Rigging for river rescue I -- the basics -- 5. Rigging for river rescue II -- anchors, haul systems, and belays -- 6. Rigging for river rescue III -- advanced techniques -- 7. Shore-based rescue -- 8. Boat-based rescues -- 9. In-water rescues -- 10. Helicopters -- 11. Special situations -- 12. Incident command and site organization -- 13. Preparation, pre-planning & prevention --14. Medical considerations -- 15. Searches and recoveries -- 16. Animal rescue -- 17. Swiftwater training -- a suggested program -- 18. Afterword: an analysis of the San Marcos incident -- Appendix 1: Common search and rescue helicopters -- Appendix 2: Helicopter hand signals -- Appendix 3: Death investigation checklist -- Appendix 4: Swiftwater training -- Appendix 5: Pet owners -- Be prepared with a disaster plan! -- Appendix 6: The Anderson sling -- A glossary of swiftwater terms -- Bibliography -- Index."Firefighters, park rangers, search and rescue squad members, EMS administrators, and anyone whose public safety duties include river, flood or swiftwater rescues will find this densely illustrated, fact-filled book to be of tremendous value. It is written to save lives - yours and your teammates as well as those of the people you rescue. Swiftwater rescue is one of the most dangerous types of technical rescue - this book shows you how to stay alive and succeed."--Back cover.
Subjects: Handbooks and manuals.; Aquatic sports; Rescue work; Search and rescue operations;
Available copies: 1 / Total copies: 1
unAPI

Principles of cybersecurity / by Crelin, Joy,editor.(CARDINAL)885824;
Includes bibliographical references (pages 371-401) and index.Aadhaar Hack ; Access Control ; Advanced Encryption Standard ; Algorithm ; Android OS ; Anonymity and Anonymizers ; Anonymous ; Artificial Intelligence ; Artificial Intelligence and Terrorism ; Artificial Intelligence Cold War ; Autonomous Cars ; Big Data ; Biometric Identification Systems ; Blockchain ; Bots ; Browsers ; Cambridge Analytica Facebook Data Scandal ; Catfishing ; Changing Passwords ; China's Cyberinvasion ; Cloud Computing ; Combinatorics ; Computer and Technical Support Specialist ; Computer Crime Investigation ; Computer Fraud ; Computer Fraud and Abuse Act ; Computer Hardware Engineer ; Computer Hardware Security ; Computer Languages, Compilers, and Tools ; Computer Memory and Storage ; Computer Network Architect ; Computer Networks ; Computer Programmer ; Computer Security ; Computer Software ; Computer Viruses and Worms ; Cryptography ; Cyber Command ; Cyberbulling ; Cybercrime ; Cybercrime, Social Impacts of ; Cybersecurity Basics ; Cybersecurity Testing ; Cyberterrorism ; Cyberwarfare ; Cyberweapon ; Dark Web ; Data Breach ; Data Harvesting ; Data Mining ; Data Protection ; Database ; Database Design ; Debugging ; Deepfake ; Demon Dialing/War Dialing ; Device Drivers ; Digital Forensics ; Digital Watermarking ; Doxing ; E-banking ; Electronic Bugs ; Electronic Commerce Technology ; Email and Business ; Encryption ; End-User Cybersecurity Education ; Estonia Cyberattack ; Fax Machine, Copier, and Printer Analysis ; Firewalls ; Firmware ; Fuzzy Logic ; Graphical User Interface ; Hacking ; HTML ; HTTP Cookie ; Identity Theft ; ILOVEYOU Virus ; Industrial Espionage ; Information Security Analyst ; Information Techology ; Internet of Things ; Internet Protocol ; Internet Tracking and Tracing ; Intrusion Detection and Prevention ; iOS ; Mac OS ; Machine Learning ; Malware ; Marriott Starwood Hotels Hack ; Metadata ; Michelangelo Computer Virus ; Microprocessor ; Mobile Apps ; Mobile Web Technology ; Network and Computer Systems Administrator ; Online Piracy ; Operating System ; Personal Computers ; Phishing ; Privacy Breaches ; Privacy Rights ; Privacy Settings ; Public-Key Cryptography ; Random-Access Memory ; Ransomware ; Risk Management ; Russian Hacking Scandal ; Servers ; Smart City ; Social Engineering ; Software Developer/Quality Assurance Analyst/Tester ; Spam ; Spam Filters ; Spyware ; Stuxnet Virus ; Systems Security Engineering ; Targeted Advertising ; Usability ; Virtual Private Network ; Web Developer ; Windows Operating System ; Wireless Networks ; Workplace Monitoring ; XML ; Y2K Crisis ; Zero Trust Security."Cybersecurity is multifaceted, encompassing the protection of computers, mobile devices, networks, websites, clout services, and other computer and inter-connected technologies from a wide range of cyperattacks. This volume takes a broad view, covering security-enhancing technologies like encryption and zero trust as well as underlying hardware, software, and internet technologies. Topics discussed range from common cyberattacks and cybercrimes, famous computer viruses and hacking incidents, doxing, cyberbullying, and cyberwarfare and cyberterrorism."--
Subjects: Reference works.; Informational works.; Computer networks; Computer security; Data protection;
Available copies: 2 / Total copies: 2
unAPI

The new breed [sound recording] / by Griffin, W. E. B.,author.; Dove, Eric G.,narrator.;
Performed by Eric G. Dove.It was more than an incident. It was a deadly assault across the 38th parallel. It was the Korean War. In the fear and the frenzy of battle, those who had served with heroism before were called again by America to man the trenches and sandbag bunkers. From Pusan to the Yalu, they drove forward with commands too new and tanks too old, brothers in war, bonded together in battle as they had never been in peace.System requirements: CD/MP3 player or PC with MP3-capable software.
Subjects: War stories; Action and adventure fiction.; Audiobooks.; Korean War, 1950-1953;
Available copies: 1 / Total copies: 2
unAPI