Cargando…

The science and technology of counterterrorism : measuring physical and electronic security risk /

Scientists with little or no background in security and security professionals with little or no background in science and technology often have difficulty communicating in order to implement the best counterterrorism strategies. The Science and Technology of Counterterrorism offers the necessary th...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Young, Carl S.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington : Elsevier Science, 2014.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn871780938
003 OCoLC
005 20231120111531.0
006 m o d
007 cr |n|---|||||
008 140306s2014 vtu ob 001 0 eng d
040 |a MHW  |b eng  |e pn  |c MHW  |d EBLCP  |d OPELS  |d N$T  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCQ  |d YDXCP  |d B24X7  |d DEBSZ  |d OCLCQ  |d MERUC  |d OCLCQ  |d U3W  |d D6H  |d OTZ  |d AU@  |d OCLCQ  |d WYU  |d VT2  |d C6I  |d OCLCQ  |d VLB  |d OCL  |d S2H  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 879242764  |a 1065711159  |a 1103273647  |a 1152976888 
020 |a 9780124200616  |q (electronic bk.) 
020 |a 0124200613  |q (electronic bk.) 
020 |z 9780124200562 
020 |z 0124200567 
035 |a (OCoLC)871780938  |z (OCoLC)879242764  |z (OCoLC)1065711159  |z (OCoLC)1103273647  |z (OCoLC)1152976888 
050 4 |a HV6431  |b .Y68 2014 
050 4 |a HV6433 .E85 
072 7 |a BUS  |x 032000  |2 bisacsh 
072 7 |a SOC  |x 000000  |2 bisacsh 
082 0 4 |a 363.3  |a 363.32094 
100 1 |a Young, Carl S. 
245 1 4 |a The science and technology of counterterrorism :  |b measuring physical and electronic security risk /  |c Carl S. Young. 
260 |a Burlington :  |b Elsevier Science,  |c 2014. 
300 |a 1 online resource (513 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Scientists with little or no background in security and security professionals with little or no background in science and technology often have difficulty communicating in order to implement the best counterterrorism strategies. The Science and Technology of Counterterrorism offers the necessary theoretical foundation to address real-world terrorism scenarios, effectively bridging the gap. It provides a powerful security assessment methodology, coupled with counterterrorism strategies that are applicable to all terrorism attack vectors. These include biological, chemical, radiological, electromagnetic, explosive, and electronic or cyber attacks. In addition to rigorous estimates of threat vulnerabilities and the effectiveness of risk mitigation, it provides meaningful terrorism risk metrics. 
588 0 |a Print version record. 
505 0 |a Front Cover; The Science and Technology of Counterterrorism: Measuring Physical and Electronic Security Risk; Copyright; Dedication; Contents; Acknowledgments; About the Author; Preface; Part I: Modeling Terrorism Risk; Chapter 1: Terrorism Threats, Risk, and Risk Assessments; 1.1. Introduction: Decisions and Risk; 1.2. Threats and the Components of Risk; 1.3. Risk Assessments; 1.4. Security Risk Trade-Offs; 1.5. Security Risk in Context; 1.6. Risk Factors; 1.7. Counterterrorism Controls; 1.8. Counterterrorism Methods; 1.9. Operational Requirements; 1.10. Performance Specifications. 
505 8 |a 1.11. Security Risk Assessment Frameworks, Security Standards, and Security Risk MetricsSummary; References; Problems; Chapter 2: Organizing and Assessing Terrorism Risk; 2.1. A Taxonomy of Terrorism Threats; 2.2. Counterterrorism Standards and Risk Metrics; 2.3. The Cost of Risk Mitigation; 2.4. Medical Analogies; 2.5. Simple Risk Assessments; 2.6. Security Theatre; Summary; References; Problems; Chapter 3: Uncertainty and Terrorism; 3.1. Introduction; 3.2. Uncertainty, Entropy, and Randomness; 3.3. The Normal Distribution; 3.4. Uncertainty Applied to Terrorism; Summary; References; Problems. 
505 8 |a Chapter 4: Physical Models of Terrorism4.1. Introduction; 4.2. Point Sources of Radiation; 4.3. Exponential Growth and Decay; 4.4. Harmonic Motion and the Single Degree of Freedom Model; 4.5. Gaussian Plumes[1]; Summary; Reference; Problems; Chapter 5: Exploiting Terrorism Uncertainty; 5.1. Introduction: Addressing Terrorism Risk Factors; 5.2. Risk Factor-Related Incidents; Indirect Measurements of Security Risk; 5.3. The "Probability of Protection" Method; 5.3.1. The Minimum Number of Required Security Officers; 5.3.2. Explosive Blasts and the Probability of Window Protection. 
505 8 |a 5.4. The Probability of Protection Method Summary5.5. Physical Access Control System Risk Statistics; Summary; Reference; Problems; Part 2: Measuring Terrorism Risk; Chapter 6: Conventional Explosive Threats and Risk Mitigation; 6.1. Introduction; 6.2. Applying the Single Degree of Freedom Model; 6.3. Explosive Overpressure and Impulse Parametric Scaling; 6.4. Blast Effects: A Qualitative Description; 6.5. The Effects of Distance and Payload; 6.6. Vehicle-Borne Explosives; 6.7. Vehicle-Borne Explosive Risk: A Simple Calculation; 6.8. Barriers and Bollards; 6.9. Assessing Bollard Effectiveness. 
505 8 |a 6.10. Antiblast Film6.11. Explosive Detection; 6.12. X-Ray Inspection Technology; 6.13. The Dangling Crane: Terror Without Terrorists; Summary; References; Problems; Chapter 7: Nontraditional Terrorist Threats and Risk Mitigation; 7.1. Introduction; 7.2. Radiological Dispersion Devices (RDDs); 7.2.1. The RDD as a Weapon; 7.2.2. Dentists, Bananas, and the Natural Radiation Background; 7.2.3. Radioisotopes as Weapons; 7.2.4. Radioactive Flux, Absorption, and Shielding; 7.2.4.1. Radioactive Flux; 7.2.4.2. Radioactive Absorption; 7.2.4.3. Radioactive Absorption in Human Tissue. 
504 |a Includes bibliographical references and index. 
650 0 |a Terrorism  |x Prevention. 
650 0 |a Terrorism  |x Prevention  |x Technological innovations. 
650 0 |a Computer security. 
650 0 |a Risk management. 
650 0 |a Security systems. 
650 2 |a Computer Security  |0 (DNLM)D016494 
650 2 |a Risk Management  |0 (DNLM)D012308 
650 6 |a Terrorisme  |x Pr�evention.  |0 (CaQQLa)201-0194031 
650 6 |a Terrorisme  |0 (CaQQLa)201-0194031  |x Pr�evention  |0 (CaQQLa)201-0194031  |x Innovations.  |0 (CaQQLa)201-0379286 
650 6 |a S�ecurit�e informatique.  |0 (CaQQLa)201-0061152 
650 6 |a Gestion du risque.  |0 (CaQQLa)201-0055861 
650 6 |a Syst�emes de s�ecurit�e.  |0 (CaQQLa)201-0001035 
650 7 |a risk management.  |2 aat  |0 (CStmoGRI)aat300179502 
650 7 |a security systems.  |2 aat  |0 (CStmoGRI)aat300076660 
650 7 |a BUSINESS & ECONOMICS  |x Infrastructure.  |2 bisacsh 
650 7 |a SOCIAL SCIENCE  |x General.  |2 bisacsh 
650 7 |a Security systems  |2 fast  |0 (OCoLC)fst01110883 
650 7 |a Risk management  |2 fast  |0 (OCoLC)fst01098164 
650 7 |a Computer security  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Terrorism  |x Prevention  |2 fast  |0 (OCoLC)fst01148123 
650 7 |a Terrorism  |x Prevention  |x Technological innovations  |2 fast  |0 (OCoLC)fst01148131 
776 0 8 |i Print version:  |z 9780124200562 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780124200562  |z Texto completo