Physical security and environmental protection /

Saved in:
Bibliographic Details
Author / Creator:Perdikaris, John, author.
Imprint:Boca Raton, FL : CRC Press, [2014]
Description:xi, 331 pages ; 24 cm
Language:English
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/10043491
Hidden Bibliographic Details
ISBN:9781482211948 (hardback)
1482211947 (hardback)
Notes:Includes bibliographical references and index.
Summary:"Preface A disaster is a natural or man-made hazard resulting in an event of substantial magnitude causing significant physical damage or destruction, loss of life, or drastic change to the environment. It can be defined as any tragic event stemming from events such as earthquakes, floods, catastrophic accidents, fires, or explosions. It is a phenomenon that can cause damage to life and property and destroy the economic, social, and cultural life of people. When disaster strikes a vulnerable population, the incident evokes a combination of horror and empathy among a country's population. Similarly, unless a response is carefully planned and successfully carried out, a government can appear impotent or nonresponsive to the dangers facing its citizens. Often disasters result from mismanagement of the risks involved. The risks involved are a product of both hazards and vulnerability. Hazards that strike areas with low vulnerability never become disasters. Similarly, developing countries suffer the most when it comes to disasters, since they lack the tools and coping capacity to effectively deal with a disaster. However, industrialized nations are more resilient and capable in dealing with disasters. In this book I have attempted to assemble a guide through the disaster management process including prevention, mitigation, preparedness, response, and recovery for individuals interested in this field of study. The handbook guides the reader through the various phases of disaster management. Chapter 1 is an introduction to the emergency management process, which includes sections on hazard analysis, emergency planning, effective communication, leadership, and management of volunteers. Chapter 2 discusses threats assessment including an all-hazard approach to threat assessments,"--
Table of Contents:
  • Preface
  • Author
  • Chapter 1. Emergency Management
  • 1.1. Introduction to Disasters and Emergency Management
  • 1.2. Types of Disasters
  • 1.3. Emergency Planning
  • 1.4. All-Hazards Approach to Disaster Management
  • 1.5. Decision Making and Problem Solving
  • 1.6. Leadership and Influence
  • 1.7. Effective Communication Skills
  • 1.8. Developing and Managing Volunteers
  • Chapter 2. Threat Ensemble, Vulnerability, and Risk Assessments
  • 2.1. Introduction
  • 2.2. Threat Assessment
  • 2.3. Vulnerability Assessment
  • 2.4. Risk Assessment
  • Chapter 3. Critical Infrastructure Protection
  • 3.1. Introduction
  • 3.2. Building Security
  • 3.2.1. Unauthorized Entry (Forced and Covert)
  • 3.2.2. Insider Threats
  • 3.2.3. Explosive Threats: Stationary and Moving Vehicle-Delivered Bombs, Mail Bombs, and Package Bombs
  • 3.2.4. Ballistic Threats
  • 3.2.5. WMD: CBR
  • 3.2.6. Cyber and Information Security Threats
  • 3.2.7. Development and Training on Occupant Emergency Plans
  • 3.3. Water Supply Systems Security
  • 3.4. Security for Energy Facilities
  • 3.5. Food and Agricultural Security
  • 3.6. Aviation Security
  • 3.7. Maritime Security and Asset Protection
  • 3.8. Land Transportation Security Systems
  • 3.9. Cybersecurity
  • Chapter 4. Targeted Violence and Violent Behavior
  • 4.1. Introduction
  • 4.2. Methods and the Mind-Set of a Terrorist
  • 4.3. Terrorism
  • 4.4. Organized Crime
  • 4.5. Maritime Piracy
  • 4.6. Incidents and Indicators
  • 4.7. Suspicious Activity
  • 4.8. Avoiding an Attack
  • Chapter 5. Protection Strategies
  • 5.1. Physical Security
  • 5.2. Improvised Explosive Devices Awareness
  • 5.3. Surveillance and Countersurveillance
  • 5.4. Conducting a Site Security Survey
  • 5.5. Geospatial Intelligence
  • 5.6. Technical Surveillance and Countermeasures
  • 5.7. Protection against Explosives and Blast Effects
  • 5.7.1. Stationary Vehicle along Secured Perimeter Line
  • 5.7.2. Stationary Vehicle in a Parking Garage or Loading Dock
  • 5.7.3. Moving Vehicle Attack
  • 5.7.4. Hand-Carried Weapon Placed against the Exterior Envelope
  • 5.8. Responding to Cyberattacks
  • 5.9. Executive and Close Personal Protection
  • 5.10. Travel Security
  • Chapter 6. Management Strategies
  • 6.1. Crisis and Incident Management
  • 6.2. Bomb Threat Management
  • 6.3. Managing a Technical Surveillance and Countermeasures Detail
  • 6.4. Managing a Close Protection Detail
  • 6.5. Managing Disasters in the Data Center
  • 6.5.1. Section 1-Document Introduction
  • 6.5.2. Section 2-Crisis Scenarios/Situations
  • 6.5.3. Section 3-Crisis Considerations
  • 6.5.4. Section 4-Crisis Management Team
  • 6.5.5. Section 5-Crisis Management Facility
  • 6.5.6. Section 6-Notification Procedures
  • 6.5.7. Section 7-Action Procedures
  • 6.5.8. Section 8-Postcrisis Analysis
  • 6.5.9. Section 9-Plan Exercising
  • 6.5.10. Section 10-Appendix
  • 6.6. Hostage Survival and Crisis Negotiations
  • 6.7. Managing Violent Behavior in the Workplace
  • 6.7.1. Type I Attacker-Criminal Intent
  • 6.7.2. Type II Attacker-Customer and/or Client
  • 6.7.3. Type III Attacker-Worker-on-Worker
  • 6.7.4. Type IV Attacker-Personal Relationship
  • 6.8. Event and Crowd Management
  • Chapter 7. Contingency Plans
  • 7.1. Developing a Force Protection Plan
  • 7.1.1. Estimate the Threat
  • 7.1.2. Assess Vulnerabilities
  • 7.1.3. Develop Protective Measures
  • 7.1.4. Conduct Routine Security Operations
  • 7.1.5. Conduct Contingency Operations
  • 7.2. Developing a Security Plan
  • 7.2.1. Approvals
  • 7.2.2. Executive Summary
  • 7.2.3. Communications and Consultations
  • 7.2.4. Context
  • 7.2.5. Security Risk Assessment
  • 7.2.6. Security Risk Treatment Process
  • 7.2.7. Implementation
  • 7.3. Developing a Business Continuity Plan
  • 7.3.1. Analysis Phase
  • 7.3.2. Solution Design Phase
  • 7.3.3. Implementation Phase
  • 7.3.4. Testing Phase
  • 7.3.5. Maintenance Phase
  • Chapter 8. Response and Recovery Operations
  • 8.1. Responding to Natural and Human-Induced Disasters
  • 8.1.1. Natural Disasters
  • 8.1.2. Human-Induced Disasters
  • 8.2. Responding to Chemical, Biological, Radiological, Nuclear, Explosive, and Incendiary Events
  • 8.2.1. Biological Agents
  • 8.2.1.1. Wet or Dry Agent from a Point Source
  • 8.2.1.2. Threat of Dry Agent Placed in HVAC or Package with No Physical Evidence
  • 8.2.13. Confirmed Agent Placed in HVAC System (Visible Fogger, Sprayer, or Aerosol Device)
  • 8.2.2. Nuclear or Radiological Agents
  • 8.2.3. Incendiary Devices
  • 8.2.4. Chemical Agents
  • 8.2.5. Explosives
  • 8.2.5.1. Unexploded Device and Preblast Operations
  • 8.2.5.2. Explosive Device Preblast
  • 8.2.5.3. Explosive Device Postblast
  • 8.2.5.4. Agency-Related Actions, Fire Department
  • 8.2.5.5. Emergency Medical Services
  • 8.2.5.6. Law Enforcement
  • 8.2.5.7. Ha/Mat Group
  • 8.3. Responding to a Terrorist Event
  • 8.4. Disaster Recovery Operations
  • 8.5. Special Response Teams
  • 8.6. Stress Management after a Disaster
  • Appendix A. Select Emergency Management Organizations
  • Appendix B. Top 10 Global Disasters Since 1900
  • Appendix C. Select Global Special Operations Teams
  • Appendix D. Select Global Terrorist Organizations
  • Bibliography
  • Index