The Science and Technology of Counterterrorism: Measuring Physical and Electronic Security Risk
Autor Carl Youngen Limba Engleză Paperback – 29 apr 2014
The Science and Technology of Counterterrorism teaches the reader how to think about terrorism risk, and evaluates terrorism scenarios and counterterrorism technologies with sophistication punctuated by humor. Both students and security professionals will significantly benefit from the risk assessment methodologies and guidance on appropriate counterterrorism measures contained within this book.
- Offers a simple but effective analytic framework to assess counterterrorism risk and realistic measures to address threats
- Provides the essential scientific principles and tools required for this analysis
- Explores the increasingly important relationship between physical and electronic risk in meaningful technical detail
- Evaluates technical security systems to illustrate specific risks using concrete examples
Preț: 322.52 lei
Preț vechi: 403.15 lei
-20% Nou
Puncte Express: 484
Preț estimativ în valută:
61.73€ • 64.34$ • 51.39£
61.73€ • 64.34$ • 51.39£
Carte tipărită la comandă
Livrare economică 30 decembrie 24 - 13 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780124200562
ISBN-10: 0124200567
Pagini: 512
Ilustrații: black & white illustrations, black & white tables, figures
Dimensiuni: 191 x 235 x 28 mm
Greutate: 0.86 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 0124200567
Pagini: 512
Ilustrații: black & white illustrations, black & white tables, figures
Dimensiuni: 191 x 235 x 28 mm
Greutate: 0.86 kg
Editura: ELSEVIER SCIENCE
Cuprins
Section I-Modeling Terrorism Risk1: Terrorism Threats, Risk and Counterterrorism Strategies2: Terrorism Scenario Analysis3: Terrorism and Uncertainty4: Physical Models of Terrorism Threats5: Measuring Terrorism RiskSection II-Analyzing Terrorism Threats 6: Conventional Explosive Threats7: Radiological, Biological, Chemical, and Electromagnetic Weapons 8: Electronic Terrorism Threats9: Electronic Security MeetsPhysical SecuritySection III-Counterterrorism Controls10: Affiliation, Authentication and Authorization11: Closed Circuit Television (CCTV)12: Physical Access Restriction and Security Incident Monitoring/DetectionAppendices:1-Linearity, Non-linearity, and Scaling2-Exponents, Logarithms and Measuring Sensitivity to Change;3- The Exponential Function, ex4-Parameters for Anti-Explosive Window Treatments5-Half-Life6-High-Level Counterterrorism Technical Strategies7-RFID Effects on Credit Cards in Close Proximity
Recenzii
"After completing the entire book and applying its lessons, the security professional may have the means to better justify security-related expenditures by using math and science to explain the effectiveness of the proposed technology."--ASIS Dynamics Newsletter, February 2015