In this Book

buy this book Buy This Book in Print
summary

Environmental tragedies such as Chernobyl and the Exxon Valdez remind us that catastrophic accidents are always possible in a world full of hazardous technologies. Yet, the apparently excellent safety record with nuclear weapons has led scholars, policy-makers, and the public alike to believe that nuclear arsenals can serve as a secure deterrent for the foreseeable future. In this provocative book, Scott Sagan challenges such optimism. Sagan's research into formerly classified archives penetrates the veil of safety that has surrounded U.S. nuclear weapons and reveals a hidden history of frightening "close calls" to disaster.

Table of Contents

restricted access Download Full Book
  1. Cover
  2. restricted access
    • PDF icon Download
  1. Title, Copyright, Dedication
  2. pp. i-viii
  3. restricted access
    • PDF icon Download
  1. Contents
  2. pp. ix-x
  3. restricted access
    • PDF icon Download
  1. List of Figures and Tables
  2. pp. xi-xii
  3. restricted access
    • PDF icon Download
  1. Acknowledgments
  2. pp. xiii-xiv
  3. restricted access
    • PDF icon Download
  1. List of Acronyms
  2. pp. xv-xvii
  3. restricted access
    • PDF icon Download
  1. Introduction: Expecting the Unexpected
  2. pp. 3-10
  3. restricted access
    • PDF icon Download
  1. 1: The Origins of Accidents
  2. pp. 11-52
  3. restricted access
    • PDF icon Download
  1. 2: Nuclear Weapons Safety during the Cuban Missile Crisis
  2. pp. 53-116
  3. restricted access
    • PDF icon Download
  1. 3: Intelligence and Warning during the Cuban Missile Crisis
  2. pp. 117-155
  3. restricted access
    • PDF icon Download
  1. 4: Redundancy and Reliability: The 1968 Thule Bomber Accident
  2. pp. 156-203
  3. restricted access
    • PDF icon Download
  1. 5: Learning by Trial and Terror
  2. pp. 204-249
  3. restricted access
    • PDF icon Download
  1. 6: The Limits of Safety
  2. pp. 250-280
  3. restricted access
    • PDF icon Download
  1. Index
  2. pp. 281-288
  3. restricted access
    • PDF icon Download
Back To Top