Ebook: Understanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and Personnel
Author: Brian T. Bennett(auth.)
- Year: 2007
- Language: English
- pdf
Understanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and Personnel gives a detailed explanation of how to implement preventive and/or protective measures to ensure the safety of personnel and facilities. It includes:
- Easily customized templates for the vulnerability analysis, security procedures, emergency response procedures, and training programs
- Vulnerability assessment methodologies and formulas for prioritizing targets
- Coverage of critical infrastructure sectors, hard targets, and soft targets, such as hotels, places of worship, and commercial districts
- Countermeasures for terrorist attacks using weapons of mass destruction with coverage of chemical, biological, radiological/nuclear, and explosive materials
- A seven-step Security Vulnerability Analysis (SVA) process to identify and categorize critical infrastructure, key resources, and key assets
- Information on the National Incident Management System (NIMS) that enables all public, private, and non-governmental organizations to work together effectively to prepare for, prevent, respond to, and recover from domestic incidents
- Numerous case studies and examples
A practical, how-to book with step-by-step processes to help reduce risks from terrorist attacks, this is a must-have reference for private and public sector risk managers, safety engineers, security professionals, facility managers, emergency responders, and others charged with protecting facilities and personnel.Content:
Chapter 1 The Terrorist Threat (pages 1–50):
Chapter 2 Critical Infrastructure (pages 51–121):
Chapter 3 Types of Terrorist Attacks (pages 123–141):
Chapter 4 Weapons of Mass Destruction (pages 143–191):
Chapter 5 The Terrorist's Preparation for an Attack (pages 193–213):
Chapter 6 Risk and Threat Assessment (pages 215–254):
Chapter 7 Protecting Critical Infrastructure, Key Resources, and Key Assets (pages 255–287):
Chapter 8 Principles of Protective Security (pages 289–310):
Chapter 9 Effective Security Countermeasures (pages 311–366):
Chapter 10 General Emergency Response Considerations (pages 367–424):
Chapter 11 Emergency Response to a Weapon of Mass Destruction Attack (pages 425–460):