جزییات کتاب
Content: Front-matter, Pages i,iiiCopyright, Page ivDedication, Page vPreface, Page xiiiAcknowledgments, Page xvAbout the Author, Page xviiChapter 1 - Purpose, Pages 1-4Chapter 2 - Scope, Pages 5-6Chapter 3 - Objective and Description of PHA, What-If, and HAZOP Reviews, Pages 7-12Chapter 4 - Adaptation to Security Vulnerability Analysis, Pages 13-15Chapter 5 - Specialized Reviews—Bow-Tie Analysis, Layers of Protection Analysis, and Safety Integrity Levels, Pages 17-23Chapter 6 - Team Members, Qualifications, and Responsibilities, Pages 25-37Chapter 7 - Management Support and Responsibilities, Pages 39-40Chapter 8 - Review Applications for Typical Facilities, Pages 41-46Chapter 9 - Review Procedures, Pages 47-77Chapter 10 - Review Worksheets, Pages 79-86Chapter 11 - Report Preparation and Distribution, Pages 87-91Chapter 12 - Handling and Resolution of Recommendations, Pages 93-97Chapter 13 - Schedule and Cost Estimates, Pages 99-105Appendix A - Typical Company Policy Statement, Page 107Appendix B - Quality Assurance Audit Checklist, Page 109Appendix C - Probability, Severity, Risk, and Risk-Acceptance Tables, Pages 111-113Appendix D - PHA and What-If Checklist Questions, Pages 115-132Appendix E - HAZOP Parameters, Deviations, and Possible Causes, Pages 133-141List of Acronyms, Pages 143-144Glossary, Pages 145-149Bibliography, Pages 151-152Index, Pages 153-158