Chapter
Licensed
Unlicensed
Requires Authentication
1 Introduction
-
Mavis Sika Okyere
You are currently not able to access this content.
You are currently not able to access this content.
Chapters in this book
- Frontmatter I
- Preface VII
- Acknowledgments IX
- Author biography XI
- Contents XIII
- List of tables XVII
- List of figures XIX
- Abbreviations XXI
- 1 Introduction 1
- 2 Hazard mitigation 4
- 3 Risk assessment 87
- 4 Investigation 92
- 5 Inspection, monitoring, and repair 94
- 6 Integrity assessment 108
- 7 Pipeline operation and maintenance 123
- 8 Records and data management 132
- 9 Competency and training 135
- 10 Management of change 136
- 11 Communication 139
- 12 Auditing 140
- References 143
- Index 145
Chapters in this book
- Frontmatter I
- Preface VII
- Acknowledgments IX
- Author biography XI
- Contents XIII
- List of tables XVII
- List of figures XIX
- Abbreviations XXI
- 1 Introduction 1
- 2 Hazard mitigation 4
- 3 Risk assessment 87
- 4 Investigation 92
- 5 Inspection, monitoring, and repair 94
- 6 Integrity assessment 108
- 7 Pipeline operation and maintenance 123
- 8 Records and data management 132
- 9 Competency and training 135
- 10 Management of change 136
- 11 Communication 139
- 12 Auditing 140
- References 143
- Index 145