The COP method

Files

Link to Full Text

Download Full Text

Publication Date

January 2004

Abstract

Comparative application of the PI and COP methods of intrinsic vulnerability mapping, specific vulnerability mapping, hazard and risk mapping

Keywords

Comparative Application, Intrinsic Vulnerability Mapping, Hazard And Risk Mapping, Southern Spain

Document Type

Article

Identifier

SFS0072312_00001

Share

 
COinS