|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
SCIDIR_ocn872704016 |
003 |
OCoLC |
005 |
20231117044943.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
140222s2014 ne a ob 001 0 eng d |
040 |
|
|
|a CNSPO
|b eng
|e pn
|c CNSPO
|d OCLCO
|d OCLCF
|d OCLCO
|d YDXCP
|d EBLCP
|d OPELS
|d TEFOD
|d N$T
|d B24X7
|d UMI
|d IDEBK
|d E7B
|d GGVRL
|d DEBSZ
|d CHVBK
|d TEFOD
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d MERUC
|d OCLCQ
|d OCLCA
|d U3W
|d D6H
|d OCLCQ
|d OCLCO
|d WYU
|d OCLCA
|d C6I
|d OCLCA
|d OCLCQ
|d OCLCA
|d S2H
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d LVT
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 866840327
|a 866858644
|a 870677245
|a 1039498762
|a 1105774545
|a 1302260966
|
020 |
|
|
|a 9780124078352
|q (electronic bk.)
|
020 |
|
|
|a 0124078354
|q (electronic bk.)
|
020 |
|
|
|a 0124077803
|q (hardcover)
|
020 |
|
|
|a 9780124077805
|q (hardcover)
|
020 |
|
|
|a 1306255996
|
020 |
|
|
|a 9781306255998
|
035 |
|
|
|a (OCoLC)872704016
|z (OCoLC)866840327
|z (OCoLC)866858644
|z (OCoLC)870677245
|z (OCoLC)1039498762
|z (OCoLC)1105774545
|z (OCoLC)1302260966
|
043 |
|
|
|a n-us---
|
050 |
|
4 |
|a HV7432
|b .K57 2014
|
072 |
|
7 |
|a BUS
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a SOC
|x 000000
|2 bisacsh
|
082 |
0 |
4 |
|a 363.2/320973
|2 23
|
100 |
1 |
|
|a Kirchner, Richard,
|c Jr.,
|e author.
|
245 |
1 |
0 |
|a Surveillance and threat detection :
|b prevention versus mitigation /
|c Richard Kirchner, Jr.
|
264 |
|
1 |
|a Amsterdam :
|b Elsevier,
|c [2014]
|
300 |
|
|
|a 1 online resource (ix, 253 pages .)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Preface and introduction -- Overview and understanding -- Case studies -- Conducting surveillance detection.
|
520 |
|
|
|a Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate.
|
650 |
|
0 |
|a Crime prevention
|z United States.
|
650 |
|
0 |
|a Terrorism
|z United States
|x Prevention.
|
650 |
|
0 |
|a Surveillance detection.
|
650 |
|
0 |
|a National security
|z United States.
|
650 |
|
0 |
|a Internal security
|z United States.
|
650 |
|
6 |
|a D�etection de surveillance.
|0 (CaQQLa)000267131
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Infrastructure.
|2 bisacsh
|
650 |
|
7 |
|a SOCIAL SCIENCE
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Crime prevention
|2 fast
|0 (OCoLC)fst00883055
|
650 |
|
7 |
|a Internal security
|2 fast
|0 (OCoLC)fst00976624
|
650 |
|
7 |
|a National security
|2 fast
|0 (OCoLC)fst01033711
|
650 |
|
7 |
|a Surveillance detection
|2 fast
|0 (OCoLC)fst01744260
|
650 |
|
7 |
|a Terrorism
|x Prevention
|2 fast
|0 (OCoLC)fst01148123
|
651 |
|
7 |
|a United States
|2 fast
|0 (OCoLC)fst01204155
|
650 |
|
7 |
|a Kriminalit�at
|2 gnd
|0 (DE-588)4033178-7
|
650 |
|
7 |
|a Bek�ampfung
|2 gnd
|0 (DE-588)4112701-8
|
650 |
|
7 |
|a Kontrolle
|2 gnd
|0 (DE-588)4032312-2
|
650 |
|
7 |
|a �Uberwachung
|2 gnd
|0 (DE-588)4134175-2
|
650 |
|
7 |
|a Terrorismus
|2 gnd
|0 (DE-588)4059534-1
|
650 |
|
7 |
|a Detektion
|2 gnd
|0 (DE-588)4462534-0
|
651 |
|
7 |
|a USA
|2 gnd
|0 (DE-588)4078704-7
|
776 |
0 |
8 |
|i Print version:
|a Kirchner, Richard, Jr.
|t Surveillance and threat detection.
|z 0124077803
|z 9780124077805
|w (DLC) 2013050373
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780124077805
|z Texto completo
|