Providing security managers with a clear and simple methodology to protect their organizations, this volume uses an adaptation of the U.S. Department of Defense's antiterrorism fundamentals and applies it to the private sector to protect companies, facilities, and infrastructures. The book helps security managers conduct a terrorism threat vulnerability assessment, understand how surveillance detection works, establish response plans for a wide variety of contingencies related to terrorist attack, and work with other security departments, the police, and the public to create infrastructure protection zones that will enhance the detection of suspicious events and reduce the likelihood of terrorist attack.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.