Bennett Understanding, Assessing, and Responding to Terrorism
1. Auflage 2007
ISBN: 978-0-470-11894-8
Verlag: John Wiley & Sons
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Protecting Critical Infrastructure and Personnel
E-Book, Englisch, 400 Seiten, E-Book
ISBN: 978-0-470-11894-8
Verlag: John Wiley & Sons
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Preparedness is the best weapon against terrorism
Understanding, Assessing, and Responding to Terrorism:Protecting Critical Infrastructure and Personnel gives adetailed explanation of how to implement preventive and/orprotective measures to ensure the safety of personnel andfacilities. It includes:
* Easily customized templates for the vulnerability analysis,security procedures, emergency response procedures, and trainingprograms
* Vulnerability assessment methodologies and formulas forprioritizing targets
* Coverage of critical infrastructure sectors, hard targets, andsoft targets, such as hotels, places of worship, and commercialdistricts
* Countermeasures for terrorist attacks using weapons of massdestruction with coverage of chemical, biological,radiological/nuclear, and explosive materials
* A seven-step Security Vulnerability Analysis (SVA) process toidentify and categorize critical infrastructure, key resources, andkey assets
* Information on the National Incident Management System (NIMS)that enables all public, private, and non-governmentalorganizations to work together effectively to prepare for, prevent,respond to, and recover from domestic incidents
* Numerous case studies and examples
A practical, how-to book with step-by-step processes to helpreduce risks from terrorist attacks, this is a must-have referencefor private and public sector risk managers, safety engineers,security professionals, facility managers, emergency responders,and others charged with protecting facilities and personnel.
Autoren/Hrsg.
Weitere Infos & Material
Chapter 1. The Terrorist Threat.
Chapter 2. Critical Infrastructure.
Chapter 3. Types of Terrorist Attack.
Chapter 4. Weapons of Mass Destruction.
Chapter 5. The Terrorist's Preparation for an Attach.
Chapter 6. Risk and Threat Assessment.
Chapter 7. Protecting Critical Infrastructure, Key Resources,and Key Assets.
Chapter 8. Principles of Protective Security.
Chapter 9. Effective Countermeasures.
Chapter 10. General Emergency Response Considerations.
Chapter 11. Emergency Response to a Weapon of Mass DestructionAttack.