Physical security and environmental protection /
Saved in:
Author / Creator: | Perdikaris, John, author. |
---|---|
Imprint: | Boca Raton, FL : CRC Press, [2014] |
Description: | xi, 331 pages ; 24 cm |
Language: | English |
Subject: | |
Format: | Print Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/10043491 |
Table of Contents:
- Preface
- Author
- Chapter 1. Emergency Management
- 1.1. Introduction to Disasters and Emergency Management
- 1.2. Types of Disasters
- 1.3. Emergency Planning
- 1.4. All-Hazards Approach to Disaster Management
- 1.5. Decision Making and Problem Solving
- 1.6. Leadership and Influence
- 1.7. Effective Communication Skills
- 1.8. Developing and Managing Volunteers
- Chapter 2. Threat Ensemble, Vulnerability, and Risk Assessments
- 2.1. Introduction
- 2.2. Threat Assessment
- 2.3. Vulnerability Assessment
- 2.4. Risk Assessment
- Chapter 3. Critical Infrastructure Protection
- 3.1. Introduction
- 3.2. Building Security
- 3.2.1. Unauthorized Entry (Forced and Covert)
- 3.2.2. Insider Threats
- 3.2.3. Explosive Threats: Stationary and Moving Vehicle-Delivered Bombs, Mail Bombs, and Package Bombs
- 3.2.4. Ballistic Threats
- 3.2.5. WMD: CBR
- 3.2.6. Cyber and Information Security Threats
- 3.2.7. Development and Training on Occupant Emergency Plans
- 3.3. Water Supply Systems Security
- 3.4. Security for Energy Facilities
- 3.5. Food and Agricultural Security
- 3.6. Aviation Security
- 3.7. Maritime Security and Asset Protection
- 3.8. Land Transportation Security Systems
- 3.9. Cybersecurity
- Chapter 4. Targeted Violence and Violent Behavior
- 4.1. Introduction
- 4.2. Methods and the Mind-Set of a Terrorist
- 4.3. Terrorism
- 4.4. Organized Crime
- 4.5. Maritime Piracy
- 4.6. Incidents and Indicators
- 4.7. Suspicious Activity
- 4.8. Avoiding an Attack
- Chapter 5. Protection Strategies
- 5.1. Physical Security
- 5.2. Improvised Explosive Devices Awareness
- 5.3. Surveillance and Countersurveillance
- 5.4. Conducting a Site Security Survey
- 5.5. Geospatial Intelligence
- 5.6. Technical Surveillance and Countermeasures
- 5.7. Protection against Explosives and Blast Effects
- 5.7.1. Stationary Vehicle along Secured Perimeter Line
- 5.7.2. Stationary Vehicle in a Parking Garage or Loading Dock
- 5.7.3. Moving Vehicle Attack
- 5.7.4. Hand-Carried Weapon Placed against the Exterior Envelope
- 5.8. Responding to Cyberattacks
- 5.9. Executive and Close Personal Protection
- 5.10. Travel Security
- Chapter 6. Management Strategies
- 6.1. Crisis and Incident Management
- 6.2. Bomb Threat Management
- 6.3. Managing a Technical Surveillance and Countermeasures Detail
- 6.4. Managing a Close Protection Detail
- 6.5. Managing Disasters in the Data Center
- 6.5.1. Section 1-Document Introduction
- 6.5.2. Section 2-Crisis Scenarios/Situations
- 6.5.3. Section 3-Crisis Considerations
- 6.5.4. Section 4-Crisis Management Team
- 6.5.5. Section 5-Crisis Management Facility
- 6.5.6. Section 6-Notification Procedures
- 6.5.7. Section 7-Action Procedures
- 6.5.8. Section 8-Postcrisis Analysis
- 6.5.9. Section 9-Plan Exercising
- 6.5.10. Section 10-Appendix
- 6.6. Hostage Survival and Crisis Negotiations
- 6.7. Managing Violent Behavior in the Workplace
- 6.7.1. Type I Attacker-Criminal Intent
- 6.7.2. Type II Attacker-Customer and/or Client
- 6.7.3. Type III Attacker-Worker-on-Worker
- 6.7.4. Type IV Attacker-Personal Relationship
- 6.8. Event and Crowd Management
- Chapter 7. Contingency Plans
- 7.1. Developing a Force Protection Plan
- 7.1.1. Estimate the Threat
- 7.1.2. Assess Vulnerabilities
- 7.1.3. Develop Protective Measures
- 7.1.4. Conduct Routine Security Operations
- 7.1.5. Conduct Contingency Operations
- 7.2. Developing a Security Plan
- 7.2.1. Approvals
- 7.2.2. Executive Summary
- 7.2.3. Communications and Consultations
- 7.2.4. Context
- 7.2.5. Security Risk Assessment
- 7.2.6. Security Risk Treatment Process
- 7.2.7. Implementation
- 7.3. Developing a Business Continuity Plan
- 7.3.1. Analysis Phase
- 7.3.2. Solution Design Phase
- 7.3.3. Implementation Phase
- 7.3.4. Testing Phase
- 7.3.5. Maintenance Phase
- Chapter 8. Response and Recovery Operations
- 8.1. Responding to Natural and Human-Induced Disasters
- 8.1.1. Natural Disasters
- 8.1.2. Human-Induced Disasters
- 8.2. Responding to Chemical, Biological, Radiological, Nuclear, Explosive, and Incendiary Events
- 8.2.1. Biological Agents
- 8.2.1.1. Wet or Dry Agent from a Point Source
- 8.2.1.2. Threat of Dry Agent Placed in HVAC or Package with No Physical Evidence
- 8.2.13. Confirmed Agent Placed in HVAC System (Visible Fogger, Sprayer, or Aerosol Device)
- 8.2.2. Nuclear or Radiological Agents
- 8.2.3. Incendiary Devices
- 8.2.4. Chemical Agents
- 8.2.5. Explosives
- 8.2.5.1. Unexploded Device and Preblast Operations
- 8.2.5.2. Explosive Device Preblast
- 8.2.5.3. Explosive Device Postblast
- 8.2.5.4. Agency-Related Actions, Fire Department
- 8.2.5.5. Emergency Medical Services
- 8.2.5.6. Law Enforcement
- 8.2.5.7. Ha/Mat Group
- 8.3. Responding to a Terrorist Event
- 8.4. Disaster Recovery Operations
- 8.5. Special Response Teams
- 8.6. Stress Management after a Disaster
- Appendix A. Select Emergency Management Organizations
- Appendix B. Top 10 Global Disasters Since 1900
- Appendix C. Select Global Special Operations Teams
- Appendix D. Select Global Terrorist Organizations
- Bibliography
- Index