Please use this identifier to cite or link to this item:
http://elibrary.nnra.gov.ng/jspui/handle/123456789/688
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | IAEA | - |
dc.date.accessioned | 2021-06-30T10:16:25Z | - |
dc.date.available | 2021-06-30T10:16:25Z | - |
dc.date.issued | 2021 | - |
dc.identifier.uri | http://elibrary.nnra.gov.ng/jspui/handle/123456789/688 | - |
dc.description | the scope of this publication has been broadened to clarify the use of an alternative approach to the design basis threat, to explain how to develop application specific design basis threats and to better address threats involving cyber-attacks [5]. | en_US |
dc.language.iso | en | en_US |
dc.publisher | NNRA Library | en_US |
dc.relation.ispartofseries | No. 10-G (Rev. 1); | - |
dc.subject | Risk assessment. | en_US |
dc.subject | Nuclear facilities — Security measures. | en_US |
dc.subject | Radioactive substances | en_US |
dc.subject | Security measures | en_US |
dc.title | National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat Statements | en_US |
dc.type | Book | en_US |
Appears in Collections: | Nuclear Security and Physical Protection of Radioactive Material |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
National Nuclear Security.pdf | 1.46 MB | Adobe PDF | View/Open |
Items in e-Library are protected by copyright, with all rights reserved, unless otherwise indicated.