,

The Science and Technology of Counterterrorism

Measuring Physical and Electronic Security Risk

Specificaties
Paperback, blz. | Engels
Elsevier Science | e druk, 2014
ISBN13: 9780124200562
Rubricering
Juridisch :
Elsevier Science e druk, 2014 9780124200562
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Scientists with little or no background in security and security professionals with little or no background in science and technology often have difficulty communicating in order to implement the best counterterrorism strategies. The Science and Technology of Counterterrorism offers the necessary theoretical foundation to address real-world terrorism scenarios, effectively bridging the gap. It provides a powerful security assessment methodology, coupled with counterterrorism strategies that are applicable to all terrorism attack vectors. These include biological, chemical, radiological, electromagnetic, explosive, and electronic or cyber attacks. In addition to rigorous estimates of threat vulnerabilities and the effectiveness of risk mitigation, it provides meaningful terrorism risk metrics.

The Science and Technology of Counterterrorism teaches the reader how to think about terrorism risk, and evaluates terrorism scenarios and counterterrorism technologies with sophistication punctuated by humor. Both students and security professionals will significantly benefit from the risk assessment methodologies and guidance on appropriate counterterrorism measures contained within this book.

Specificaties

ISBN13:9780124200562
Taal:Engels
Bindwijze:Paperback

Inhoudsopgave

<p>Section I-Modeling Terrorism Risk1: Terrorism Threats, Risk and Counterterrorism Strategies2: Terrorism Scenario Analysis3: Terrorism and Uncertainty4: Physical Models of Terrorism Threats5: Measuring Terrorism RiskSection II-Analyzing Terrorism Threats 6: Conventional Explosive Threats7: Radiological, Biological, Chemical, and Electromagnetic Weapons 8: Electronic Terrorism Threats9: Electronic Security MeetsPhysical SecuritySection III-Counterterrorism Controls10: Affiliation, Authentication and Authorization11: Closed Circuit Television (CCTV)12: Physical Access Restriction and Security Incident Monitoring/DetectionAppendices:1-Linearity, Non-linearity, and Scaling2-Exponents, Logarithms and Measuring Sensitivity to Change;3- The Exponential Function, ex4-Parameters for Anti-Explosive Window Treatments5-Half-Life6-High-Level Counterterrorism Technical Strategies7-RFID Effects on Credit Cards in Close Proximity</p>

Net verschenen

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        The Science and Technology of Counterterrorism