e Se
’re
ou
y at
wh
mi
g.
in
ss
rs W ffe NO ail o com UP E em ess. GN IV pr SI CLUS .crc X ww rE w fo at
Contents Counterterrorism ..................................................3 Disaster and Emergency Management ..............10 Security and Homeland Security ........................22
Page 3
Page 12
Page 15
Page 22
Join the CRC Press online community! Sign up for email alerts at CRCPress.com and be the first to know about new books in your area of interest. You will also be eligible for:
Page 27
Page 39
• • • • •
Exclusive discounts Content Event announcements New book alerts FREE shipping
only available in our email and print promotions. Take full advantage of your insider savings and free shipping when you buy directly from CRCPress.com http://www.crcpress.com
To view more information and complete tables of contents for these and many other related books, Visit us at
www.crcpress.com e-mail: orders@crcpress.com 1-800-634-7064 • 1-561-994-0555 +44 (0) 1235 400 524 BWM03_ISSUU
Counterterrorism New
Antiterrorism and Threat Response Planning and Implementation Ross Johnson Capital Power Corporation, Edmonton, Alberta, Canada
Providing security managers with a clear and simple methodology to protect their organizations, Antiterrorism and Threat Response uses an adaptation of the U.S. Department of Defense’s antiterrorism fundamentals and applies it to the private sector to protect companies, facilities, and infrastructures. The book’s antiterrorism planning strategies enable security professionals to seize the initiative away from terrorists—setting them off balance and keeping them off balance—thereby disrupting their planning cycle and thwarting attack. The book helps security managers: • Understand the terrorist attack planning cycle • Conduct a terrorism threat vulnerability assessment • Develop an observation plan and the corresponding verification plan • Understand how surveillance detection works • Learn how pattern analysis wheels can be used to find weaknesses in security operations • Appreciate the role of random antiterrorism measures and learn how to develop them
New!
Foundations of Psychological Profiling Terrorism, Espionage, and Deception Richard W. Bloom This book examines the history of profiling, the basis for and theory behind profiling, as well as profiling as it is currently practiced. It details various psychologic and sociologic theories that profiling is based on and comes up with a unique, interdisciplinary approach to how it can be validated, utilized, and properly implemented. Many books on criminal profiling cover how to unearth who the perpetrator of a crime is. This one focuses on how to unearth behaviors, clues, and “triggers” to when, why, and how someone with bad intent may act on that intent. • Analyzes the history, politics, and controversy surrounding profiling • Examines psychological basis for profiling and socially deviant behaviors • Discusses the various uses of profiling in intelligence, security, and law enforcement • Assesses some of the commonalities and "red flags" to criminals, terrorists, and other trust betrayers • Speculates what the future of profiling may hold
Selected Contents:
• Establish response plans for a wide variety of contingencies related to terrorist attack
What is Profiling?
• Adapt this methodology to maritime operations against piracy, individual protection, and travel security
Challenges of Profiling: Who is Doing the Profiling?
Challenges of Profiling: What is Being Profiled? The Profiling Matrix
• Work with other security departments, the police, and the public to create infrastructure protection zones that will enhance the detection of suspicious events and reduce the likelihood of terrorist attack
The Profiling Narrative
The book aims to show that terrorists are not defeated by technology alone, but instead by collaboration and the timely passage of relevant information and intelligence.
The Future of Profiling
Catalog no. K14932, February 2013, 296 pp. ISBN: 978-1-4665-1290-0, $79.95 / £49.99
Profiling Applications: Profiling and Terrorism Profiling Applications: Profiling and Espionage Profiling Applications: Profiling and Deception References Catalog no. K16477, March 2013, 226 pp. ISBN: 978-1-4665-7029-0, $69.95 / £44.99 Also available as an eBook
Also available as an eBook
For more information and complete contents, visit www.crcpress.com
3
Counterterrorism New!
New!
Counter Terrorism Issues Case Studies in the Courtroom James Ottavio Castagnera Rider University, Lawrenceville, New Jersey, USA
This book presents a panoramic view of the American judiciary's handling of domestic terrorism in the last 20 years. It covers the ten most significant terrorism incidents, the subsequent trials, and the appeals. The author maintains that the American legal profession and judicial system bear a unique responsibility to set and maintain the balance between defending homeland security and protecting the civil liberties outlined in the Bill of Rights. This classroom-tested book includes an extensive introduction and appendices. • Provides historical perspective on the first attack on the World Trade Center • Examines domestic terrorism such as the Oklahoma Bombing of 1995 • Discusses the efforts of American attorneys to provide adequate representation to defendants • Covers the law enforcement and legal proceedings surrounding attempts to deal with Islamic terrorists and their American sympathizers • Explores a complex series of cases in which the plaintiffs won a massive default judgment against Iran
Selected Contents: The Fire Bell in the Night: The 1993 World Trade Center bombing. Homegrown Terrorists: Tim McVeigh and Terry Nichols (1995). Should Zacarias Moussaoui Die for Usama Bin Laden’s Sins? It Shouldn’t Happen to a Dog? The Trial of the SHAC 7 (2006). All My Trials Soon Be Over? Sami Al-Arian (2005-2010). Victims Fight Back: The Persian Antiquities Cases (2001-2012). At the Tipping Point on the Scales of Justice: National Security v. Civil Liberties (When a U.S. Citizen Is Declared an Unlawful Enemy Combatant). Of Wanna-be’s and Bumblers: the Fort Dix Conspirators and the Underwear Bomber. Lone Madman or Freelance Jihadist? Nidal Malik and the Fort Hood Shooting. The Yemeni Connection (Redux): What the Times Square Bomber Case Portends. Catalog no. K16566, March 2013, 264 pp. ISBN: 978-1-4665-7192-1, $99.95 / £63.99 Also available as an eBook
4
The TerroristCriminal Nexus An Alliance of International Drug Cartels, Organized Crime, and Terror Groups Jennifer L. Hesterman Retired Colonel, USAF, Senior Analyst, The MASY Groupe, Arlington, Virginia, USA
The once clear lines between the international drug trade, terrorism, organized crime, domestic terror, and Mexican drug cartels are blurring as groups increasingly join forces to further individual interests and goals. Factor in a rise in domestic terror and cartel activity spilling over U.S. borders and the resulting impact to America is grave. This text highlights the often disregarded, misunderstood, or obscured criminal/terrorist nexus threat to the U.S. Destroying the myth that such liaisons don’t exist due to differing ideologies, the book provides a thought-provoking and new look at the complexity and phenomena of the criminal/terrorist nexus. • Chronicles the rise of domestic groups, including Americans taking up the cause of Jihad with targets inside U.S. borders • Assesses international terrorist groups that most threaten U.S. security: the franchises of al Qaeda, Hezbollah, HAMAS, and FARC • Analyzes why groups would and would not liaise and discusses emergent activity and trends • Presents an analysis of transnational crime, including drugs, human trafficking, money laundering, corruption, kidnapping, and piracy • Examines cartel activity at U.S. borders
Selected Contents: Introduction to the Criminal-Terror Nexus. Transnational Organized Crime (OC) and Direct Impact in the U.S.. Fighting Transnational Crime Overseas … And Within Our Borders. International Terror Groups. Domestic Terror Concerns. Mexican Cartel Activity in the U.S.. Funding Terror. Exploitation of Ecommerce. Sharing Tactics. Use of Social Networking and Exploitation of the Internet for Recruiting, Spreading Propaganda, and Clandestine Communication. Why the Nexus Exists. Conclusion and Topics for Future Study. Catalog no. K15479, April 2013, c. 333 pp. ISBN: 978-1-4665-5761-1, $69.95 / £44.99 Also available as an eBook
Save when you order online at www.crcpress.com
Counterterrorism New!
New!
The Geography of International Terrorism
Effective Surveillance for Homeland Security
An Introduction to Spaces and Places of Violent Non-State Groups Richard M. Medina George Mason University, Fairfax, Virginia, USA
George F. Hepner University of Utah, Salt Lake City, USA
Providing the perspective required to understand and anticipate terrorism, this book presents an accessible, cross-disciplinary approach to understanding terrorism on local and global scales. The authors articulate the role of physical and human geography in terrorist ideology, operations, and haven formation and control. They supply a blend of concepts and techniques to support policy development within the governing counterterrorist community. To assist reader assimilation, the book includes maps, images, and graphics to support the text. • Presents an accessible cross-disciplinary approach that integrates twenty-first century geospatial scientific and technological advancements with geographical concepts applicable to understanding terrorism on the local and global scales • Articulates the role of physical and human geography in terrorist ideology, operations, and haven formation and control • Provides a blend of factual information, concepts and techniques to support policy development for countering future terrorism • Includes maps, images, and graphics to support information
Selected Contents: Terrorism and Geography Terrorist Networks in Geographic-Social Hybrid Space The Geography of Terrorism, Cultural Areas, Insurgent Havens, and Places of Warfare Technologies, Information, and Opportunities for Countering Effects of Terrorism Issues for the Future Catalog no. K14028, April 2013, c. 248 pp. ISBN: 978-1-4398-8686-1, $79.95 / £49.99 Also available as an eBook
Balancing Technology and Social Issues Edited by
Francesco Flammini, Roberto Setola, and Giorgio Franceschetti Since the September 11th attacks, the scientific and engineering communities have been called upon to help the world respond to security challenges. This volume focuses on challenges involving multidisciplinary problem analysis and systems engineering approaches to security. It presents a comprehensive survey of state-of-the-art methods for the surveillance and protection of citizens and critical infrastructure against both natural and deliberate threats. The first section analyzes technical issues related to surveillance. Next, the book examines legislative, organization, and management issues with a specific emphasis on privacy concerns. Finally, the contributors discuss innovative solutions and new research topics garnering heightened attention. • Covers state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures • Focuses on current technological challenges • Provides an overview of the most relevant aspects related to surveillance systems • Analyzes the technological issues related to surveillance
Selected Contents: Surveillance Technologies. Intrusion detection / access control. Video, infrared, thermal cameras and their application in Homeland Security. Multi-camera object tracking methods. Distributed monitoring through networks of smart cameras and sensors. Multi object tracking methods. Surveillance systems design and evaluation. Biometric data and Face detection/recognition. Legislative, Organizational, and Case Study. Security, Privacy and Dependability issues in surveillance (with a comparative focus on USA and Europe legislation). Physical and Cyber Security. Security management systems. Urban control application. Port, Airport, and Rail-way surveillance applications. Surveillance technologies for forensic. Advance Surveillance. Intelligent real-time audio-video analytics surveillance. Multi-modal surveillance and data/decision fusion. Situation awareness, early warning and decision support systems. Look behind walls, under the wears and inside objects. Use of radar, sonar, and audio techniques for surveillance of open space. Catalog no. K13920, May 2013, c. 584 pp. ISBN: 978-1-4398-8324-2, $119.95 / £72.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
5
Counterterrorism Criminal Major Case Management Persons of Interest Priority Assessment Tool (POIPAT) Larry Wilson Royal Canadian Mounted Police, Ottawa, Ontario, Canada
In high-profile investigations, when the suspect pool is very large, resources are unduly strained unless the pool can be narrowed down to the most likely offenders. The Persons of Interest Priority Assessment Tool (POIPAT) provides an objective and consistent means of establishing a priority ranking of suspects in any investigation. Using the unsolved Jack the Ripper mystery as a sample case study, this volume walks readers through the steps of creating and using the POIPAT system for any case. A supplemental CD-ROM with a POIPAT template and additional tools and guides is included. Catalog no. K14316, March 2012, 269 pp. ISBN: 978-1-4398-9861-1, $129.95 / £82.00 Also available as an eBook
Terrorist Suicide Bombings Attack Interdiction, Mitigation, and Response Mordecai Dzikansky, Gil Kleiman and Robert Slater “... an invaluable and authoritative guide for understanding the phenomenon of suicide terrorism and how to defeat it." —Joshua Sinai, in The Washington Times, January 6, 2012
Written by professionals with first-hand experience, this volume offers best practices from the field, lessons learned, and specific instructions on how to fortify possible suicide bombing targets to reduce casualties. It explains how suicide bombers operate and demystifies common myths that jeopardize successful interdiction. With graphic photos depicting the aftermath of actual bombing scenes, the book explains what first responders should and should not do. Case studies enhance the text. Catalog no. K13266, October 2011, c. 342 pp. ISBN: 978-1-4398-7131-7, $83.95 / £52.99 Also available as an eBook
U.S. Government Counterterrorism A Guide to Who Does What
Police and Military Dogs
Silver Spring, Maryland, USA
Criminal Detection, Forensic Evidence, and Judicial Admissibility
Edward Marks
John J. Ensminger
Washington, D.C., USA
Stone Ridge, New York, USA
“... a long overdue work ... . Kraft and Marks are to be commended for producing the first comprehensive guide to the bureaucratic agencies, approaches, and laws that have shaped U.S. counterterrorism policy for the past decade.”
“A solid, hands-on, quick reference source for K9 officers to use as guidance in their normal day-today cases. Also, an excellent reference tool for state and district attorneys to use when researching case law. Truly exceptional!”
Michael Kraft
—Professor Bruce Hoffman, Director, Center for Peace and Security Studies, Georgetown University
—Detective Jan Scofield, Master Trainer, North American Police Work Dog Association
U.S. Government Counterterrorism: A Guide to Who Does What is the first readily available, unclassified guide to the many U.S. government agencies, bureau offices, and programs involved in all aspects of countering terrorism domestically and overseas. The authors, veterans of the U.S. government’s counterterrorism efforts, present a rare insider’s view of the counterterrorism effort.
This volume examines the use of police and military dogs for a wide variety of functions and describes how a canine handler’s work can affect the subsequent investigation and prosecution of a crime. The book discusses optimal procedures for finding and processing evidence and reviews the boundaries of admissibility of evidence produced by police dogs.
Catalog no. K12355, December 2011, 407 pp. ISBN: 978-1-4398-5143-2, $72.95 / £46.99
Catalog no. K13331, October 2011, 304 pp. ISBN: 978-1-4398-7239-0, $83.95 / £52.99
Also available as an eBook
6
Also available as an eBook
Save when you order online at www.crcpress.com
Counterterrorism Terrorism and Organized Hate Crime
Terrorist Rehabilitation
Intelligence Gathering, Analysis and Investigations, Third Edition
Ami Angell and Rohan Gunaratna
Michael R. Ronczkowski Major & Fusion Center Director, Retired, Miami, Florida, USA
Providing a methodical approach to analyzing homeland security needs, this volume enables the law enforcement community to understand the vital role it plays in the War on Terrorism. It demonstrates how to recognize the indicators of an impending act, how to deter an attack, and how to transform information into intelligence to meet community demands for safety. New chapters in this third edition focus on source development and their use in investigations, fusion centers, terrorism financing, the handling of classified materials, and the National Suspicious Activity Reporting (SAR) Initiative. The book also discusses the radicalization process and behavioral traits associated with terrorism. Ancillary materials available upon qualified course adoption
Catalog no. K13056, September 2011, c. 417 pp. ISBN: 978-1-4398-6759-4, $93.95 / £59.99 Also available as an eBook
Terrorist Financing, Money Laundering, and Tax Evasion Examining the Performance of Financial Intelligence Units Jayesh D'Souza Florida International University, Miami, USA
“The book is great and I have required it of my students this semester.” —Moyara Ruehsen, PhD, CAMS, Monterey Institute of International Studies
The U.S. Experience in Iraq International Centre for Political Violence and Terrorism Research, Singapore
Because terrorists are made, not born, it is critically important to world peace that detainees and inmates influenced by violent ideology are deradicalized and rehabilitated back into society. This volume demonstrates through the actual experiences of military personnel, defense contractors, and Iraqi nationals that deradicalization and rehabilitation programs can succeed and positively impact thousands of would-be terrorists globally if utilized to their full capacity. The book describes religious, vocational training, education, creative expression, and Tanweer programs introduced to the detainee population. It also offers insight into future steps based on lessons learned from current rehabilitation programs. Catalog no. K12414, July 2011, 454 pp. ISBN: 978-1-4398-5249-1, $72.95 / £46.99 Also available as an eBook
The Counterterrorism Handbook Tactics, Procedures, and Techniques, Fourth Edition Frank Bolz, Jr., Kenneth J. Dudonis and David P. Schulz “... a must read for anyone involved in leadership positions at all levels of federal, state, or local governments or private organizations involved in the support of War on Terror operations.” —Paul E. Vallely, MG, US Army (Retired); Fox News Channel Military Analyst
Using the Balanced Scorecard method for assessment, this book explores the effectiveness of a government’s financial intelligence units in combating terrorist financing. It explores the large-scale misuse of funds to commit financial crimes, describes how easy it is for the criminals, and reviews the inter-jurisdictional problems involved. Although focused on the U.S., Canada, Australia, The European Union, the UK, Spain, and Holland, the strategies apply to all countries.
Updated to reflect an increased focus on terrorism in public transportation, the fourth edition of this volume provides an understanding of the strategies, tactics, and techniques required to tackle terrorism. It illustrates essential topics such as the elements common to all terrorism, bomb threats, risk assessment, hostages, and weapons of mass destruction. It also presents case studies of recent terrorist incidents.
Catalog no. K11399, August 2011, 232 pp., Soft Cover ISBN: 978-1-4398-2850-2, $79.95 / £40.99
Catalog no. K12096, July 2011, 529 pp. ISBN: 978-1-4398-4670-4, $93.95 / £59.99
Also available as an eBook
Also available as an eBook
For more information and complete contents, visit www.crcpress.com
7
Counterterrorism Drug Interdiction Partnerships, Legal Principles, and Investigative Methodologies for Law Enforcement, Second Edition
Terrorism and WMDs Awareness and Response John Pichtel Ball State University, Muncie, Indiana, USA
George S. Steffen
An introductory manual on CBRNE weapons, this volume helps prepare emergency response, counterterrorism, and security professionals to respond to an attack quickly and effectively. It discusses specific CBRNE weapons and examines their design, structure, properties, and behavior. Exploring the impacts of CBRNE weapons on human health and recommending safety precautions, the book also addresses specific responder issues, particularly the Incident Command System, as well as personal protective equipment (PPE), decontamination, and site remediation. Instructor’s guide and test bank are available upon qualified course adoption
Catalog no. K12376, April 2011, 456 pp. ISBN: 978-1-4398-5175-3, $83.95 / £52.99 Also available as an eBook
Albuquerque Police Department, New Mexico, USA
Exploring issues that confront today’s drug interdiction officer, this book explains how to initiate specific domestic drug interdiction programs and how to use business partnerships to assist law enforcement in identifying potential violators. It examines consensual encounters, drug canines, and interdictions involving trains, buses, rental vehicles, airports, hotels, storage units, and parcel systems. The book includes chapters on currency seizures, report writing, courtroom testimony, and the role of the interdiction supervisor. Each chapter includes relevant case law that supports the protocol described.
Science and Technology of Terrorism and Counterterrorism
Basic Principles and Theory, Second Edition
Second Edition
John A. Conkling
Edited by
Chestertown, Maryland, USA
Christopher J. Mocella Summer Pyrotechnics Seminars, Chestertown, Maryland, USA
“This is a fascinating book that should be of interest to all those involved in the application of chemistry to the more artistically rewarding aspects of the subject.” —Chromaographia, 2012
Considered by many to be the most definitive reference in this field, this volume was cited by the journal Pyrotechnica as belonging on every pyrotechnist’s bookshelf. It covers the requisite background in chemistry, thermodynamics, and light emission; introduces oxidizing agents, fuels, binders, and retardants; and then explores virtually every aspect of formulating pyrotechnics. Topics include high-energy mixtures, ignition and propagation, heat and delay compositions, and color and light production, including sparks, flitter, and glitter. Catalog no. DK4506, December 2010, 245 pp. ISBN: 978-1-57444-740-8, $99.95 / £62.99
8
Samuel M. Candelaria
Catalog no. 9176X, April 2010, 320 pp. ISBN: 978-1-4200-9176-2, $104.95 / £66.99
Chemistry of Pyrotechnics
Also available as an eBook
Pinellas County Sheriff's Office, Largo, Florida, USA
Tushar K. Ghosh, Mark A. Prelas, Dabir S. Viswanath, and Sudarshan K. Loyalka University of Missouri, Columbia, USA
“Intelligently presented and thoroughly referenced and indexed, the book offers a good balance of scientific and managerial information. ... the editors present a series of questions to assist in the development of prevention and emergency management programs.… The text is highly recommended to security professionals who seek a broader understanding of terrorist threats and technical countermeasures.” —Paul H. Aube, B.Sc., CPP, CAS, in Security Management, January 2011
Catalog no. AU7181, November 2009, 604 pp. ISBN: 978-1-4200-7181-8, $109.95 / £69.99 Also available as an eBook
Save when you order online at www.crcpress.com
Counterterrorism Jihadists and Weapons of Mass Destruction
Knowledge Discovery for Counterterrorism and Law Enforcement
Edited by
Gary Ackerman University of Maryland, College Park, USA
David Skillicorn
Jeremy Tamsett Center for Terrorism & Intelligence Studies, San Jose, California, USA
“... this seminal resource effectively documents current trends in the ideology, strategy, and tactics of jihadists as they relate to WMD. The book also provides an overview of nonproliferation policies designed to keep WMD out of the hands of jihadists, conducts a groundbreaking quantitative empirical analysis of jihadist behavior, and includes leading experts' estimates of the future WMD threat from jihadists.” –ASIS International
This authoritative and comprehensive work covers the weapons of mass destruction that jihadist terrorists have historically used and are likely to use in the future. Leading international experts examine terrorist ideology, strategy, and target selection. Catalog no. AU6964, February 2009, 494 pp. ISBN: 978-1-4200-6964-8, $91.95 / £58.99
Queen's University, Kingston, Ontario, Canada
“The writing is organized, clear, and free of technical jargon and mathematical notation.” —Computing Reviews, September 2009
Knowledge Discovery for Counterterrorism and Law Enforcement operates from the premise that detection algorithms must be rethought to be effective in this domain. It focuses on four main forms of knowledge discovery: prediction, clustering, relationship discovery, and textual analysis. For each of these application areas, the author discusses opportunities for concealment that are available to criminals and reveals tactics that can aid in detecting them. Catalog no. C7399, November 2008, 332 pp. ISBN: 978-1-4200-7399-7, $91.95 / £58.99 Also available as an eBook
Also available as an eBook
Data Mining for Intelligence, Fraud and Criminal Detection Advanced Analytics and Information Sharing Technologies Christopher Westphal CEO, Visual Analytics, Frederick, Maryland, USA
“… this book should be mandatory reading for every crime analyst. I’ve seen a lot of this info before but never in one place before nor with the level of explanation and examples.” —Michael P. Ley, Antiterrorism Officer & Intelligence Coordinator, U.S. Marine Corps Support Facility-Blount Island
Second Edition of a Bestseller!
Terrorist Recognition Handbook
A Practitioner's Manual for Predicting and Identifying Terrorist Activities, Second Edition Malcolm W. Nance Director, SRSI - Special Readiness Services International, Washington, D.C., USA
“... perhaps the definitive text on terrorist recognition. ... the book details every aspect of terrorism and identifies all of the various elements. ... a must-read for anyone tasked with or interested in anti-terrorism activities.” —Ben Rothke, CISSP, PCI QSA, NY Metro / BT Global Services, writing in Slashdot.org
This book reviews the commonality, framework, and infrastructures necessary to implement complex analytical systems. It addresses analytical approaches, technologies, and methodologies as well as information sharing and the design of today’s fusion centers.
Written by a 20-year veteran of the U.S. intelligence community, this second edition includes analysis of transformations within Al Qaeda, coverage of the modern insurgency, as well as global and regional terrorist groups.
Catalog no. AU6723, December 2008, 440 pp. ISBN: 978-1-4200-6723-1, $83.95 / £53.99
Catalog no. AU7183, April 2008, 480 pp., Soft Cover ISBN: 978-1-4200-7183-2, $69.95 / £44.99
Also available as an eBook
Also available as an eBook
For more information and complete contents, visit www.crcpress.com
9
Disaster and Emergency Management New!
Preparedness and Response for Catastrophic Disasters Edited by
The Human Side of Disaster Second Edition Thomas E. Drabek University of Denver, Colorado, USA
Rick Bissell University of Maryland, Baltimore, USA
Based on a popular course for the FEMA Higher Education project, Preparedness and Response for Catastrophic Disasters provides important insight into plans to mitigate and respond to the devastation caused by large-scale catastrophic events. Hurricane Katrina provided clear evidence that these occurrences are both qualitatively and quantitatively different from other disasters. Recent tragedies, like the 2004 South Asia tsunami, the 2010 earthquake in Haiti, and the 2011 earthquake, tsunami, and resulting nuclear plant meltdown in Japan further illustrate that we are not prepared for such events. Written by top disaster scholars and practitioners, the book defines what constitutes a catastrophic event, outlining both the factors that can lead to catastrophes and the unique logistical, planning, and response challenges posed by them. Distinct from general disasters, these events are termed “catastrophic” due to the regional impact, impacts to logistics and infrastructure, the devastating effects on large-scale populations, and the ripple effects on regional and global economies. This book examines why catastrophes must be approached differently. If governments, public administrators, and emergency management professionals are to succeed in protecting our populations, there must be consensus, decisiveness, and leadership in both the coordination and response. As such, the book explores how catastrophes can dramatically affect populations and addresses new, innovative, and fundamentally unique strategies communities can institute to better prepare populations for catastrophic events and their aftermath. Catalog no. K14860, March 2013, c. 405 pp. ISBN: 978-1-4665-1189-7, $79.95 / £49.99 Also available as an eBook
New Edition of a Bestseller!
The second edition of a bestseller, this volume is an excellent resource for understanding human behavior and how best to communicate and work with the public in disaster situations. The Human Side of Disaster, Second Edition uses an informal conversational style to help readers understand the social constraints that guide responses to disaster warnings, initial responses, evacuation decisions, and longerterm impacts. He describes the history of emergency management as well as selected policy issues. Fully updated with new cases and real-world examples, the book continues to be an invaluable reference for professionals in emergency management, aid organizations, and public policy. • Illustrates in conversational style how humans react in crisis and the best manner to communicate disaster plans and response to the public • Presents concepts and insights using constructed scenarios based on real-world disaster cases • Includes data from nearly five decades of research conducted by one of the original pioneers in the study of sociological aspects of disasters • Integrates recent disasters that have occurred since the first edition into discussions of major topics • Reiterates insights that sociological research has discovered about human behavior in the midst and aftermath of disasters Instructor's manual and figure slides are available upon qualified course adoption
Selected Contents: Experiences. The Problem and Approach. Hear That Siren? It Can’t Be Done. Shall We Leave? Why Me? Volunteers? You Bet! Organized – Disorganization. Life in a Fish Bowl. What About My Psyche? What Must Be Done? Community Change Agents. Notes. Suggested Readings. Catalog no. K14640, March 2013, c. 446 pp. ISBN: 978-1-4665-0685-5, $64.95 / £41.99 Also available as an eBook
10
Save when you order online at www.crcpress.com
Disaster and Emergency Management New!
Case Studies in Disaster Response and Emergency Management Nicolas A. Valcik University of Texas at Dallas, USA
Paul E. Tracy University of Massachusetts at Lowell, USA
“In government service anything can and will happen. Valcik and Tracy have selected a wide variety of case studies to help the reader prepare for that phone call when you least expect it.” —Allen Barnes, City Manager of Gonzales, Texas
Each emergency comes with its own set of challenges, however, many emergencies of the past can be used as tools to evaluate the decisions made and apply them to similar situations. Designed to enable public officials to conduct this kind of evaluation, Case Studies in Disaster Response and Emergency Management details a selection of emergencies— more than 50—that actually occurred. The book demonstrates that often there is no wrong or right answer, just choices that will resolve a problem favorably or cause the situation to deteriorate. The book illustrates the application of public administration theories and practices to real-life disasters. Arranged chronologically, the case studies involve incidents from the U.S. and worldwide, with topics including natural disasters, industrial accidents, epidemics, and terrorist attacks. It includes a set of generic questions at different points in the case study to allow evaluation of which decisions were successful and why. The decision-making process described gives readers an applied venue to test theoretical emergency management techniques that should work in real-world situations. The book demonstrates with the perspective of 20/20 hindsight how preventive planning measures are best practiced. It provides practical advice and guidance for public officials during emergency situations. Catalog no. K13913, January 2013, 262 pp. ISBN: 978-1-4398-8316-7, $79.95 / £49.99
New!
Emergency Planning Guide for Utilities Second Edition Samuel Mullen Absecon, New Jersey, USA
An increase in major natural disasters—and the growing number of damaging events involving gas, electric, water, and other utilities—has led to heightened concerns about utility operations and public safety. Due to today's complex, compliance-based environment, utility managers and planners often find it difficult to plan for the action needed to help ensure organization-wide resilience and meet consumer expectations during these incidents. Emergency Planning Guide for Utilities, Second Edition offers a working guide that presents new and field-tested approaches to plan development, training, exercising, and emergency program management. • Provides a comprehensive risk assessment for utilities seeking to improve their plans • Identifies local, state, and federal emergency management organizations and examines how utilities should interface with them for large-scale emergencies and disasters • Offers a view of computer and web-based outage and control systems before, during, and after major storms and how those systems affect restoration • Presents tactics for auditing emergency plans and programs and applying metrics so plans can be significantly improved • Includes Internet resources to further improve utility emergency plans, training, and exercises while maintaining regulatory compliance The book will help utility planners, trainers, and responders—as well as their vendors and suppliers— to more effectively prepare for damaging events and improve the level of the utility’s resilience. It also focuses on planning needed in the National Incident Management System and ICS environment that many utilities are embracing going forward. In doing so, utilities will be able to improve the customer experience while reducing the impact that damaging events have on the utility’s infrastructure, people, and resources. Catalog no. K14544, January 2013, 232 pp. ISBN: 978-1-4665-0485-1, $89.95 / £57.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
11
Disaster and Emergency Management New!
Forthcoming!
Social Vulnerability to Disasters
Hazardous Materials Chemistry for Emergency Responders
Second Edition Edited by
Deborah S.K. Thomas, Brenda D. Phillips, William E. Lovekamp, and Alice Fothergill
Third Edition Robert A. Burke Fire Marshal, University of Maryland, Baltimore, USA
Since its publication in 2009, this volume has been used successfully in many college classes, by emergency management professionals, and in the independent volunteer sector. Focusing on populations subject to significant and often differential risk when disasters occur, Social Vulnerability to Disasters, Second Edition remains essential to the emergency management, homeland security, and related social science fields, including public policy, sociology, geography, political science, urban and regional planning, and public health. The new edition is fully updated, is more international in scope, and incorporates significant disaster events since 2009. It also includes new case studies to illustrate concepts.
Written in the same clear, concise style that made the previous editions bestsellers, this book provides easyto-understand chemistry for responders to use to handle hazardous materials emergencies on a daily basis. It provides the fundamentals of "street chemistry" that emergency response personnel need to know, with a focus on hazmat elements. Hazardous Materials Chemistry for Emergency Responders, Third Edition includes new review questions with answers and new incident examples. It also introduces the new United Nations GHS system for classification and labeling of chemicals, updates the NFPA requirements, and provides information on ethanol and other alternative automotive fuels.
• Contains contributions from leading scholars, professionals, and academics on their areas of expertise in examining vulnerable populations
• Provides an overview of hazardous materials chemistry organized into a known chemical hazard system developed by the United Nations and the United States Dept. of Transportation
• Uses concepts based on the popular and widely used FEMA Higher Education course • Takes a more global approach and includes numerous international case studies • Includes new chapters on animals and religious groups Instructor’s guide, PowerPoint® slides, and test bank available upon qualified course adoption
• Includes all-new review questions with answers included in the book • Presents information on Ethanol and other alternative automotive fuels • Shows new incident examples
Selected Contents:
Selected Contents:
Introduction
Social Construction of Disasters. Development of Vulnerability Analysis. World Views, Values and Political Dimensions. Root Causes. Structural Barriers to Disaster Resilience. Social Class. Race/Ethnicity. Sex/Gender. Age Disability Health and Medically Dependent Populations. Situational Barriers to Disaster Resilience. Language and Literacy/Foreign Born. Household and Family. Violence. Knowing and Assessing Community. Nature of Community. Community Vulnerability. Building Disaster-Resilient Communities. New Ideas, Skills and Practices. Promoting Empowerment through Social Change.
Basics of Chemistry
Catalog no. K15068, April 2013, c. 518 pp. ISBN: 978-1-4665-1637-3, $79.95 / £49.99
Incompatible and Unstable Chemicals
Also available as an eBook
Explosives Compressed Gases Flammable Liquids Flammable Solids Oxidizers Poisons Radioactive Materials Corrosive Miscellaneous Hazardous Materials Catalog no. K12261, May 2013, c. 534 pp. ISBN: 978-1-4398-4985-9, $129.95 / £82.00 Also available as an eBook
12
Save when you order online at www.crcpress.com
Disaster and Emergency Management Forthcoming!
Forthcoming!
Mass Fatality Management Concise Field Guide
Death and Accident Investigation Protocols
Mary H. Dudley
Mary H. Dudley
Forensic Medical Investigation Institute, Overland Park, Kansas, USA
Forensic Medical Investigation Institute, Overland Park, Kansas, USA
The first in a series of helpful forensic handbooks for medical examiners and forensic nurses, Mass Fatality Management Concise Field Guide outlines the necessary components for preparation and management of mass fatalities. Topics include administrative operations, site management and protocols, morgue operations, bioterrorism, mass burial guidelines, and family assistance center operations. Bulleted checklists and outlines coupled with a CD-ROM offering a dozen forms useful in the field make this concise guide the most up-to-date and practical reference available.
Useful both in the field and at the hospital, this volume provides 34 checklists and forms for investigating every kind of accident and death—whether intended or natural. The forms help investigators know what to look for, what questions to ask, and how to categorize the scene and the physical injuries. Produced as an 8.5 x 11 spiral-bound book, the forms can either be copied for use or downloaded from an accompanying CD-ROM. Brief directions precede every form to instruct users in best practices.
• Uses a bulleted format for easy reference • Highlights specific advice such as body and bag tagging • Contains five helpful appendices outlining various procedures • Includes a CD-ROM with downloadable forms for printing and use in the field
• Presents forms in alphabetical order for easy reference • Contains tips on common issues found in the field, such as handling hot wires • Includes forms for copy or download on an accompanying CD-ROM
Selected Contents:
Appendices
Aircraft Accident. Alcohol-Related Death. Blunt Force Injury. Child Fatality—Abuse or neglect. Child Infant Death – General. Child-Sudden Infant Death Syndrome. Combo/Short Form (Natural death, motor vehicle accident, suicide). Death report – General. Drowning. Drug Overdose. Electrical. Exposure. Falls. Fire. Gunshot/Shotgun. Hanging. Homicide. Hospital death – natural. Hospital death – Surgical. In Custody Death. Infectious Disease. Inquiries. Lightning. Medication List. Motor Vehicle Accident – Driver/Passenger. Motor Vehicle Accident – pedestrian. Natural death. Occupational Exposure. Organ and Tissue Donor Information Report Form. Poisons and Toxic Substances. Sexual Assault. Sharp Force Injury. Suicide. Unidentified Remains.
Catalog no. K15459, May 2013, 160 pp. Soft Cover ISBN: 978-1-4665-5725-3, $59.95 / £38.99
Catalog no. K15444, June 2013, 32 pp. Spiral Bound ISBN: 978-1-4665-5688-1, $89.95 / £57.99
Selected Contents: Mass Fatality Management Overview Administrative Operations Incident Site Morgue Operations Weapons of Mass Destruction Mass Burial Guidelines Family Assistance Center
Also available as an eBook
Also available as an eBook
For more information and complete contents, visit www.crcpress.com
13
Disaster and Emergency Management New!
New!
The Fukushima 2011 Disaster
Hazardous Material (HAZMAT) Life Cycle Management
Ronald Eisler U.S. Geological Survey (retired), Potomac, Maryland, USA
On March 11, 2011, Japan experienced the largest earthquake in its history, causing massive property damage. This book summarizes and critically analyzes the natural events and human shortcomings responsible for the failure of the Fukushima reactors during the first year following the accident, and governmental and civilian responses to the emergency. It covers the plant’s safety history, the tsunami and earthquake, and the implications of the events on the nuclear reactor industry. • Discusses radiation monitoring and assessment in the atmosphere, humans, soil, food, and aquatic ecosystems • Covers radiation effects in humans, terrestrial, and aquatic biota • Provides a comparison of radiation effects between Fukushima, Chernobyl, and Three Mile Island • Examines mitigation and remediation in Japan and the US • Reviews implications for the nuclear reactor industry worldwide
Selected Contents: Introduction The Earthquake The Tsunami Fukushima Nuclear Reactor
Corporate, Community, and Organizational Planning and Preparedness Robert Jaffin Boston University School of Medicine, Healthcare Emergency Management Program, Massachusetts, USA
It is well known that fluorescent light bulbs and consumer appliances contain harmful components. The existing literature on hazardous materials addresses the risks attached to specific materials and emphasizes compliance and personal protective equipment (PPE)—but not the life cycle management of the materials that represent the hazards. A logistics treatment of the subject is needed to understand the underlying supply chain management principles and apply solutions to reduce overall use of hazardous materials. Hazardous Material (HAZMAT) Life Cycle Management: Corporate, Community and Organizational Planning and Preparedness is organized into two thematic sections. Section I defines and classifies hazardous materials and covers the U.S. regulatory framework and standards governing the transport and use of such materials. Section II examines institutional and organizational program elements and provides guidelines for developing these programs to reduce liability and risk while lowering point-source pollution and total hazardous waste production.
Concluding Remarks
The logistics approach to hazardous materials yields exponential benefits in costs and the reduction or elimination of such materials. It limits organizational liability and, at the same time, reduces the costs associated with hazardous waste management and disposal. This book serves as an integrative reference offering a better understanding of hazardous materials use, life cycle management, consumption, and waste reduction at a holistic, strategic level.
Catalog no. K16809, December 2012, 152 pp. ISBN: 978-1-4665-7782-4, $69.95 / £44.99
Catalog no. K13422, December 2012, 249 pp. ISBN: 978-1-4398-7387-8, $99.95 / £63.99
Also available as an eBook
Also available as an eBook
Radiation Releases Radiation Monitoring Radiation Effects Mitigation and Remediation Implications for the Nuclear Reactor Industry
14
Save when you order online at www.crcpress.com
Disaster and Emergency Management Natural Hazard Mitigation Edited by
Alessandra Jerolleman Natural Hazard Mitigation Association, New Orleans, Louisiana, USA
John J. Kiefer
Catastrophic Impact and Loss The Capstone of Impact Assessment Kevin D. Burton
University of New Orleans, Louisiana, USA
KDB Legacy Holdings, LLC., Scottsdale, Arizona, USA
Natural Hazard Mitigation offers practical guidance on the implementation and selection of hazard mitigation programs and projects. Based on real-world applications, it includes case studies that present a thorough explanation of the various issues involved.
The author’s previous work, Managing Emerging Risk: The Capstone of Preparedness considered the notion of risk and what constitutes risk assessment. Six months after the book’s publication, many of the scenarios came true, and other, more menacing risks emerged. Catastrophic Impact and Loss: The Capstone of Impact Assessment is the second stone to be laid in a path toward a more mindful practice of emergency management, focusing on the impacts caused by risk and offering a complete approach to measure and manage them.
The contributors describe the value and potential of mitigation efforts and explain how to convince public officials and communities of that value. They also discuss how to better involve the community and uniquely tailor solutions to regional and local situations. The book begins with an overview of the history of hazard mitigation with a focus on the Disaster Mitigation Act of 2000. It examines where hazard mitigation fits into emergency management and addresses some of the challenges that can arise in navigating the various intergovernmental relationships involved in hazard mitigation. The remaining chapters explore: • Public-private partnerships for hazard mitigation at the local level • How to maximize the use of the National Flood Insurance Program and the Community Ratings System • Risk communications as a key component of encouraging hazard mitigation • Legal issues relevant to hazard mitigation
Providing a true understanding of what it is to be “in harm’s way," this book details the devastation and affects that both public and private enterprise must be prepared for in the event of a catastrophe. It also examines: • Impact assessment as an essential piece of information and the fundamental flaws that hinder the process • The development of the digital age and postmodernism and the five guiding principles of postmodern impact assessments • Problems that occur when we fail to create impact assessments that align with internal organizational values, federal and state laws, or industry regulations
• Ways to actively engage the community and how to advocate for hazard mitigation policy
• Methods for developing solid analytical models for impact assessment—exacting logical, relevant, and clear language and taxonomies
• How state and local governments can promote and fund mitigation without utilizing federal dollars
• How to address overrides and deviations based on expert opinion, cultural needs, and the application of common sense
• The area analysis as an innovative means of addressing flood risk at the block or neighborhood level
• Key challenges in postmodern business impact assessment and how we can best meet those challenges by understanding the concept of the uncanny valley
The book includes learning objectives, key terms, and end-of-chapter questions to enhance comprehension. It concludes with a discussion of tools that local practitioners can use and provides an appendix with additional links and resources.
Catalog no. K14534, October 2012, 348 pp. ISBN: 978-1-4665-0464-6, $59.95 / £38.99 Also available as an eBook
Instructor’s guide available upon qualified course adoption
Catalog no. K11574, November 2012, 377 pp. ISBN: 978-1-4398-3493-0, $69.95 / £44.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
15
Disaster and Emergency Management Post-Disaster Reconstruction and Change Communities' Perspectives
Principles and Calculations
Edited by
Jennifer E. Duyne Barenstein
Louis Theodore
World Habitat Research Centre, Switzerland
Esther Leemann
Theodore Tutorial, East Williston, New York, USA
R. Ryan Dupont Utah State University, Logan, USA
University of Lucerne, Switzerland
Successful recovery following a disaster depends upon transcending the disciplinary divides of architecture, engineering, and planning and emphasizing the importance of community perspectives in the postdisaster reconstruction process. Effective results in community recovery mandate that we holistically examine the complex interrelationship between physical and social dimensions. Through a series of case studies, Post-Disaster Reconstruction and Change: Communities' Perspectives explores community viewpoints on post-disaster aid provided by external agencies and demonstrates how equity and effectiveness are affected by community social organization, power structures, and leadership capacities. The book further focuses on how external aid in turn affects community livelihoods, cultures, and social organizations. Each chapter serves as a real-world case study based on several months of ethnographic fieldwork conducted in India, Nicaragua, Indonesia, Sri Lanka, and Argentina. Post-disaster community recovery depends on informed decisions that build on lessons learned from past experiences. This book shows how different communities have coped with and responded to various external interventions. Focusing on housing reconstruction and the restoration of livelihood, the authors demonstrate that changes in settlement location, morphology, housing materials, and design produce multiple cascading consequences for the inhabitants of reconstructed settlements. Ultimately, the book establishes the importance of integrating community perspectives in policies and programs for sustainable post-disaster reconstruction—enabling greater resiliency as well as future disaster risk reduction. Catalog no. K14065, October 2012, 368 pp. ISBN: 978-1-4398-8815-5, $79.95 / £49.99 Also available as an eBook
Environmental Health and Hazard Risk Assessment
Environmental Health and Hazard Risk Assessment explains how to evaluate and apply environmental health and hazard risk assessment calculations in a variety of real-life settings. Using a wealth of examples and case studies, the book helps readers develop both a theoretical understanding and a working knowledge of the principles of health, safety, and accident management. The book takes a pragmatic approach to risk assessment, identifying problems and outlining solutions. Organized into four parts, the text: • Presents an overview of the history of environmental health and hazard problems, legal considerations, and emergency planning and response • Tackles the broad subject of health risk assessment, discussing toxicology, exposure, and health risk characterization • Examines hazard risk assessment in significant detail—from problem identification, probability, consequence, and characterization of hazards/accidents to the fundamentals of applicable statistics theory • Uses case studies to demonstrate the applications and calculations of risk analysis for real systems The book assumes only a basic background in physics, chemistry, and mathematics, making it suitable for students and those new to the field. It is also a valuable reference for practicing engineers, scientists, technicians, technical managers, and others tasked with ensuring that plant and equipment operations meet applicable standards and regulations. A clear and comprehensive resource, this book offers guidance for those who want to reduce or eliminate the environmental health effects and accidents that can result in loss of life, materials, and property. Catalog no. K13156, June 2012, 636 pp. ISBN: 978-1-4398-6887-4, $119.95 / £76.99 Also available as an eBook
16
Save when you order online at www.crcpress.com
Disaster and Emergency Management Behavioral Health Response to Disasters
Emergency Management
Edited by
The American Experience 19002010, Second Edition
Julie L. Framingham
Edited by
Florida Department of Children and Families, Tallahassee, USA
Claire B. Rubin
Martell L. Teasley Florida State University, Tallahassee, USA
In Behavioral Health Response to Disasters, professionals with years of practice, research, and national advisory board service review and discuss key topics in the field. Highlighting the themes of cultural competence and evidence-based practice, this volume presents an interdisciplinary approach to examining specific disaster behavioral health topics. It considers how an individual’s culture may impact willingness to seek out and accept services and includes research on vulnerable or at-risk populations who are likely to suffer disproportionately more adverse psychological consequences of disaster. It also discusses clinical studies of cognitive behavioral treatments for disaster-related distress and post-traumatic stress disorder. Catalog no. K11125, April 2012, 441 pp. ISBN: 978-1-4398-2123-7, $89.95 / £57.99 Also available as an eBook
Disasters 2.0 The Application of Social Media Systems for Modern Emergency Management Adam Crowe Richmond, Virginia, USA
Emerging social media and Web 2.0 technologies will continue to have a great impact on the practice and application of the emergency management function in every public safety sector. This volume prepares emergency managers and first responders to successfully apply social media principles in the operations, logistics, planning, finance, and administrative aspects of any given disaster. Using real-life examples, each chapter begins with a list of objectives and includes practitioner profiles showing real people implementing the technology for real solutions. Demonstrating how to effectively apply social media technology to the next crisis, this is a must-read book for those charged with disaster management and response.
Arlington, Virginia, USA
Praise for the new edition of this awardwinning book: “The first edition of this book filled a serious gap in the literature by providing historical context for present-day emergency management. This edition goes further to flesh out that context, detailing the political and practical underpinnings of emergency management organization and practice. —Professor William L. Waugh Jr., Department of Public Administration & Urban Studies, Andrew Young School of Policy Studies, Georgia State University
“... a must-read for both undergraduate and graduate students who want to learn from our past and join a growing professional field committed to enhancing community resilience and sustainability. — John C. Pine, director, Research Institute for Energy, Environment and Economics, Appalachian State University
Following in the footsteps of its popular predecessor, the second edition of Emergency Management: The American Experience provides the background needed to understand the key political and policy underpinnings of emergency management, exploring how major "focusing events" have shaped the development of emergency management. It builds on the original theoretical framework and chronological approach, but improves on the first edition by adding fresh information on older events such as Hurricane Katrina as well as a new chapter covering the BP oil spill in 2010 and the unprecedented characteristics of the disaster response to it. The final chapter offers an insightful discussion of the public administration concepts that constitute the larger context for consideration of emergency management in the United States for more than a century. Catalog no. K15114, April 2012, 312 pp. Soft Cover ISBN: 978-1-4665-1753-0, $44.95 / £28.99 Also available as an eBook
Catalog no. K13449, April 2012, 321 pp. ISBN: 978-1-4398-7442-4, $69.95 / £44.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
17
Disaster and Emergency Management Radiation Injury Prevention and Mitigation in Humans Kedar N. Prasad, Ph.D.
Principles of Emergency Management Hazard Specific Issues and Mitigation Strategies
Premier Micronutrient Corporation, Antioxidant Research Institute, Novato, California, USA
Edited by
This book identifies and examines physical protection strategies as well as non-toxic, cost-effective biological protection strategies. It discusses implementing physical and biological protection strategies particularly for first responders, radiation workers, astronauts, and civilians who might be exposed to higher doses of radiation in the course of their activities. Examining cutting-edge advances in the research of the effects of non-ionizing radiation on cellular and genetic levels, the book proposes an implementation plan of both physical and biological protection strategies. It covers the full range of potential sources of radiation and includes an up-to-date list of helpful resources and references for the latest research and readings on the topic.
Whether a disaster is natural or man-made, accidental or deliberate, the best way to protect the public is by implementing an integrated emergency management system incorporating all potential stakeholders through all phases of the event. This volume offers preparedness and mitigation recommendations for advanced emergency planning. Topics discussed include continuity planning, the role of public health officials, developing public-private partnerships, and traditional and social media and their impacts on emergency management. The book reviews specific types of disasters, including terrorism, agroterrorism, pandemics, and active shooter incidents. It examines sheltering, human services, and the special needs of children in disasters.
Michael J. Fagel, PhD, CEM Aurora Safety, Illinois, USA
Catalog no. K13439, March 2012, 302 pp. ISBN: 978-1-4398-7424-0, $89.95 / £57.99 Also available as an eBook
Catalog no. K13259, December 2011, 585 pp. ISBN: 978-1-4398-7120-1, $93.95 / £59.99 Also available as an eBook
Mass Notification and Crisis Communications Planning, Preparedness, and Systems
The Capstone of Preparedness
Denise C. Walker, PhD Lone Star College System, The Woodlands, Texas, USA
Mass communication in the midst of a crisis must be done in a targeted and timely manner to mitigate impact and save lives. Based on sound research, realworld case studies, and the author’s own experiences, this volume helps emergency planning professionals create an effective crisis communications plan. It reviews the challenges organizations face during various types of disasters, helps outline the target audience of the communiqué, and describes how to get the right message across the first time. It explores how social media can be a powerful tool in message dissemination and examines the legal landscape to ensure managers are in compliance with regulatory requirements. Catalog no. K13446, December 2011, 550 pp. ISBN: 978-1-4398-7438-7, $83.95 / £52.99 Also available as an eBook
18
Managing Emerging Risk Kevin D. Burton KDB Legacy Holdings, LLC., Scottsdale, Arizona, USA
From Main Street to Mumbai, this volume considers the new global drivers behind threats and hazards facing all those tasked with protecting the public and private sector. The book explores what is needed to better cultivate, design, develop, and operate emerging management and preparedness thinking in the current environment. Each chapter begins with key terms and objectives and ends with thought-provoking questions. Introducing a new paradigm of thought that takes into account the chief influencers of global threats, the book arms emergency and business operations managers with the ammo needed to successfully confront emerging threats in the twenty-first century. Catalog no. K11272, December 2011, 287 pp. Soft Cover ISBN: 978-1-4398-2641-6, $62.95 / £40.99 Also available as an eBook
Save when you order online at www.crcpress.com
Disaster and Emergency Management Critical Incident Management A Complete Response Guide, Second Edition Vincent Faggiano, John McNall, and Tom Gillespie
Social Media, Crisis Communication, and Emergency Management Leveraging Web 2.0 Technologies
BowMac Educational Services, Inc., Honeoye Falls, New York, USA
Connie White
Filled with tactical direction designed to prevent, contain, manage, and resolve emergencies efficiently and effectively, this volume provides proven methodologies applicable to a host of public and private sector scenarios. Topics include the phases of a critical incident response and stabilizing the scene, leadership style and techniques required to manage a critical incident successfully, guidelines for responding to hazardous materials and weapons of mass destruction incidents, stress management, business continuity in the face of a crisis, and the roles of high-level personnel in setting policy and direction for the response and recovery efforts.
Explaining how to use social media and Web 2.0 technologies to improve emergency planning, preparedness, and response capabilities, this book describes a set of guidelines for using social media effectively across a range of emergency management applications. It supplies cutting-edge methods for leveraging these technologies to reduce information overload, inform the public, and save lives. Filled with real-world examples and case studies, it is an ideal self-study resource. Its easy-to-navigate structure and numerous exercises also make it suitable for courses at the undergraduate and graduate levels.
Catalog no. K13455, November 2011, 246 pp. ISBN: 978-1-4398-7454-7, $83.95 / £52.99 Also available as an eBook
School of Media Arts, Columbia College Chicago, Illinois, USA
Catalog no. K12470, September 2011, 329 pp. ISBN: 978-1-4398-5349-8, $72.95 / £46.99 Also available as an eBook
Comparative Emergency Management Mass Fatalities Managing the Community Response Peter R. Teahen International Mass Fatalities Center, Cedar Rapids, Iowa, USA
A mass fatalities response goes far beyond returning the remains of a loved one to surviving family members. Those charged with this grim but critical responsibility will find themselves immersed in multiple tasks involving diverse individuals, organizations, and priorities. This volume provides practical guidance to communities and responders as they plan for, respond to, and recover from a mass fatalities incident. Topics include managing resources and personnel; protecting a potential crime scene; search, recovery, identification, and return of remains; and providing family members, responders, and the impacted community the necessary support to cope with the physical, spiritual, and emotional stressors of a mass fatalities incident.
Examining Global and Regional Responses to Disasters Edited by
DeMond Shondell Miller and Jason David Rivera Rowan University, Glassboro, New Jersey, USA
Bringing together the contributions of international experts, this book demonstrates ways to recognize and reduce regional infrastructure vulnerability by building secure networks of collaboration within different areas of the world. With sections on the Americas, Africa and the Middle East, Europe, Asia, and the Pacific Rim, it examines the various ways different societies have responded to environmental threats. The book presents a multifaceted study to foster dialogue among policymakers to reduce social vulnerability and build local and regional capacities to withstand environmental assaults.
Catalog no. K12215, October 2011, 421 pp. ISBN: 978-1-4398-4902-6, $74.95 / £47.99
Catalog no. K10271, June 2011, 469 pp. ISBN: 978-1-4398-0491-9, $104.95 / £66.99
Also available as an eBook
Also available as an eBook
For more information and complete contents, visit www.crcpress.com
19
Disaster and Emergency Management Disaster Victim Identification Experience and Practice Edited by
Sue Black, L. Hackman, and X. Mallett University of Dundee, Nethergate, Scotland Cumbria Police Authority, Penrith, UK
Disaster management has become an increasingly global issue, with victim identification receiving greater attention. This volume presents a selection of key historical incidents in the United Kingdom and includes candid discussions of potential areas for improvement in preparedness and future deployment capabilities. Each chapter addresses a specific disaster and covers a number of main points in relation to the incident. Viewing disaster management from a global perspective, the book contains the combined input of academics, forensic specialists, trainers, and law enforcement professionals who focus on actual cases to honestly assess events and provide concrete recommendations. Catalog no. 94122, May 2011, 272 pp. ISBN: 978-1-4200-9412-1, $139.95 / £89.00 Also available as an eBook
Jane Jordan & Associates, Green Valley, California, USA
“... the book is packed with hidden gems that even the most seasoned public relations professionals can learn from. ... it’s well worth the investment. I highly recommend it.” —Brad Phillips, Mr. Media Training Blog
This book explains how to choose the appropriate language and media outlet to properly convey your message during and after a crisis. Unveiling the secrets of how to manage the media in a crisis, it examines how rapidly evolving social media and Web 2.0 technologies have changed the crisis management landscape. Catalog no. K12481, March 2011, 320 pp. ISBN: 978-1-4398-5373-3, $62.95 / £40.99 Also available as an eBook
Principles of Emergency Management and Emergency Operations Centers (EOC)
Managing Spontaneous Community Volunteers in Disasters A Field Manual Lisa Orloff World Cares Center, New York, USA
Laying out the rationale and process by which emergency managers, community leaders, and nongovernmental aid organizations can effectively collaborate and integrate citizen response, this volume explains how to engage, train, and utilize spontaneous unaffiliated community volunteers. The book prepares leaders to integrate local volunteers into any emergency response, large- or small-scale, and outlines protocols and flexible management solutions to ensure safe and effective planning and execution. It also includes work templates that can be modified to suit the needs of any community. Each chapter includes an Introduction, Conclusion, and End-of-Chapter Questions.
Catalog no. K10962, April 2011, 323 pp. ISBN: 978-1-4398-1833-6, $83.95 / £52.99
20
How to Manage the Media in the Digital Age Jane Jordan-Meier
G. Sunderland
Also available as an eBook
The Four Stages of Highly Effective Crisis Management
Michael J Fagel, PhD, CEM Aurora Safety, Founder, CEO, Illinois, USA
“… an essential tool that should be in every new emergency manager’s tool belt and on every seasoned emergency manager’s reference shelf.” —Rick C. Mathews, MS, Director of the National Center for Security & Preparedness
This book discusses the process and systems that should be considered in emergency planning and preparedness efforts. Detailing the needs for appropriate training and planning, the book stresses the importance of consistency with the various national preparedness initiatives, includes definitions of terms, and examines language representative of the evolution of emergency planning. Catalog no. K11747, December 2010, 430 pp. ISBN: 978-1-4398-3851-8, $87.95 / £56.99 Also available as an eBook
Save when you order online at www.crcpress.com
Disaster and Emergency Management Community Disaster Recovery and Resiliency
Communicating Emergency Preparedness
Exploring Global Opportunities and Challenges
Strategies for Creating a Disaster Resilient Public
Edited by
Damon P. Coppola
DeMond S. Miller and Jason David Rivera
Bullock and Haddow, LLC, Reston, Virginia, USA
Rowan University, Glassboro, New Jersey, USA
Catalog no. AU8822, October 2010, 634 pp. ISBN: 978-1-4200-8822-9, $104.95 / £66.99 Also available as an eBook
Erin K. Maloney Michigan State University, East Lansing, USA
Catalog no. AU6510, May 2009, 264 pp. ISBN: 978-1-4200-6510-7, $79.95 / £49.99 Also available as an eBook
Catastrophic Disaster Planning and Response Clifford E. Oliver, CEM, CBCP
Disaster Recovery Brenda D. Phillips
Crofton, Maryland, USA
Oklahoma State University, Stillwater, USA
Catalog no. K11939, July 2010, 401 pp. ISBN: 978-1-4398-4169-3, $83.95 / £53.99
Catalog no. AU7420, May 2009, 546 pp. ISBN: 978-1-4200-7420-8, $79.95 / £49.99
Also available as an eBook
Also available as an eBook
Cross-Training for First Responders Gregory S. Bennett
Global Warming, Natural Hazards, and Emergency Management
Helmetta, New Jersey, USA
Edited by
Catalog no. K11295, June 2010, 283 pp. ISBN: 978-1-4398-2653-9, $76.95 / £48.99 Also available as an eBook
George Haddow and Jane A. Bullock Bullock and Haddow, LLC, Reston, Virginia, USA
Kim Haddow Sierra Club, Washington, D.C., USA
Catalog no. AU1829, October 2008, 304 pp. Soft Cover ISBN: 978-1-4200-8182-4, $71.95 / £45.99 Also available as an eBook
Natural Hazards Analysis Reducing the Impact of Disasters John C. Pine Appalachian State University, Boone, North Carolina, USA
Catalog no. AU7038, October 2008, 304 pp. ISBN: 978-1-4200-7038-5, $93.95 / £59.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
21
Security and Homeland Security New Edition of a Bestseller!
Homeland Security An Introduction to Principles and Practice, Second Edition
New!
Handbook of SCADA/Control Systems Security Edited by
Robert Radvanovsky
Charles P. Nemeth, JD, PhD, LLM John Jay College of Criminal Justice, New York, New York,USA
Homeland Security: An Introduction to Principles and Practice, Second Edition covers the latest developments on the makeup, organization, and strategic mission of the Department of Homeland Security (DHS). This new edition is updated with new laws, regulations, and strategies that reflect changes and developments over the last several years. The book offers unique insights into the various roles of multijurisdictional agencies and stakeholders at all levels of government. Coverage includes: • The history of security threats in the American experience, the events leading up to 9/11, and the formation and evolution of the DHS • The legal basis and foundation for the DHS • Training and preparatory exercises for homeland security professionals • Federal Emergency Management Agency (FEMA) in both the pre- and post-9/11 and post-Katrina world • The agencies and entities entrusted with intelligence analysis • Issues surrounding border security, immigration, and U.S. citizenship
CIPS, Infracritical, Geneva, Illinois, USA
Jacob Brodsky Woodbine, Maryland, USA.
The Handbook of SCADA/Control Systems Security provides a fundamental outline of security concepts, methodologies, and relevant information pertaining to the supervisory control and data acquisition (SCADA) systems and technology that quietly operate in the background of critical utility and industrial facilities. The book examines topics comprising functions within and throughout industrial control systems (ICS) environments. Topics include: • Emerging trends and threat factors that plague the ICS security community • Risk methodologies and principles that can be applied to safeguard and secure an automated operation • Methods for determining events leading to a cyber incident, and methods for restoring and mitigating issues—including the importance of critical communications • The necessity and reasoning behind implementing a governance or compliance program • A strategic roadmap for the development of a secured SCADA/control systems environment, with examples
• Homeland security practice in the airline, maritime, and mass transit industries
• Relevant issues concerning the maintenance, patching, and physical localities of ICS equipment
• The interplay between public health and homeland security
• How to conduct training exercises for SCADA/control systems
Each chapter contains extensive pedagogy, including learning objectives, informative sidebars, chapter summaries, end-of-chapter questions, web links, and references to aid in comprehension and retention. This book provides an objective, balanced perspective on each of the core components that comprise the DHS’s mission and the priorities and challenges that federal and state government agencies continue to face.
The final chapters outline the data relied upon for accurate processing, discusses emerging issues with data overload, and provides insight into the possible future direction of ISC security. The book supplies crucial information for securing industrial automation/process control systems as part of a critical infrastructure protection program. The content has global applications for securing essential governmental and economic systems that have evolved into present-day security nightmares. The authors present a "best practices" approach to securing business management environments at the strategic, tactical, and operational levels.
An instructor’s manual, exam questions, lesson plans, and PowerPoint® slides are available upon qualified course adoption.
Catalog no. K14806, February 2013, 652 pp. ISBN: 978-1-4665-1090-6, $69.95 / £44.99 Also available as an eBook
22
Catalog no. K14428, February 2013, 383 pp. ISBN: 978-1-4665-0226-0, $99.95 / £63.99 Also available as an eBook
Save when you order online at www.crcpress.com
Security and Homeland Security New!
Supply Chain Security A Comprehensive Approach Dr. Arthur G. Arway St. James City, Florida, USA
In this global economy, companies must be able to integrate security into supply chain logistics to protect their employees, assets, and clients from incidents of theft and other damaging events. Supply Chain Security: A Comprehensive Approach provides security professionals the tools necessary to ensure supply chain security. It explains how to establish and enforce security policies and protocols, including rapid responses that must be deployed in the event of a theft or security incident. Most importantly, it enables professionals to integrate business practices into the planning, development, and successful operation of supply chains to ensure security and protect assets. It also: • Details the differences between supply chain and logistics security and normal corporate security operations • Offers strategies on how to "manage-back" to clients and customers to limit security risk and potential loss within the supply chain • Describes how to manage security providers to enhance supply chain security (SCS) plans and programs Drawn from the experience of a recognized leader in domestic and international supply chain logistics, trade, and transportation security, the book illustrates through a series of case studies how security professionals can institute sound security practices. By demonstrating to their stakeholders and potential customers that they provide a secure environment for materials, products, goods, and cargo, companies can increase their customer base and improve their bottom line. Catalog no. K14857, February 2013, 189 pp. ISBN: 978-1-4665-1187-3, $69.95 / £44.99 Also available as an eBook
PRAGMATIC Security Metrics Applying Metametrics to Information Security W. Krag Brotby Enterprise Security Architect, Thousand Oaks, California, USA
Gary Hinson Hastings, New Zealand
Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics. Packed with time-saving tips, the book offers easy-tofollow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system (a comprehensive suite of metrics) to help: • Security professionals systematically improve information security, demonstrate the value they are adding, and gain management support for the things that need to be done • Management address previously unsolvable problems rationally, making critical decisions such as resource allocation and prioritization of security relative to other business activities • Stakeholders, both within and outside the organization, be assured that information security is being competently managed In addition to its obvious utility in the information security realm, the PRAGMATIC approach, introduced for the first time in this book, has broader application across diverse fields of management including finance, human resources, engineering, and production—in fact any area that suffers a surplus of data but a deficit of useful information. Catalog no. K13838, January 2013, 512 pp. ISBN: 978-1-4398-8152-1, $69.95 / £44.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
23
Security and Homeland Security New Edition of a Bestseller!
New Edition of a Bestseller!
21st Century Security and CPTED
Investigating ComputerRelated Crime
Designing for Critical Infrastructure Protection and Crime Prevention, Second Edition
Second Edition
Randall I. Atlas
Written by an information security specialist, this second edition of Investigating Computer-Related Crime discusses cybercrime, its investigation, and the difficulties encountered by both public law enforcement officials and private corporate investigators. The book offers insights into collecting evidence, interrogating suspects and witnesses, handling crime in progress, as well as issues involving the authorities, and helpful case studies. Updated chapters incorporate new kinds of attacks, current work of the Digital Forensic Research Workshop and their investigative model, new operating systems, the impact of the Patriot Act, and new ways of analyzing computer media.
Atlas Safety and Security Design, Inc., Fort Lauderdale, Florida, USA
Praise for the First Edition: “A major guide to CPTED takes up the cause of Crime Prevention Through Environmental Design. … Each chapter has plenty of references and web links. … Arguably most important is one of the end chapters, on measuring success. … As it’s a hefty book, if well-aimed, it could knock some sense into the heads of builders and contractors.” —Mark Rowe, Professional Security Magazine
Peter Stephenson Norwich University, Northfield, Vermont, USA
Keith Gilbert
Based on the tenets of Crime Prevention Through Environmental Design (CPTED), the updated edition of this popular reference blends new design elements with the latest best-practice security measures. Illustrated with hundreds of photographs and line drawings, the text emphasizes consideration of security aspects throughout the design process, including how to take stock of open spaces, avoid blind corners, and use landscaping to create secure spaces. The author updates these classic principles to include the latest design capabilities given new security and building construction technologies. Containing new chapters on security and sustainability, this edition:
• Provides updated information on the latest attacks and the newest technologies to investigate them
• Updates classic CPTED principles and includes some of the latest design capabilities given the latest security and building construction technologies
The Nature of Cybercrime. Cybercrime as We Enter the Twenty-First Century. The Potential Impacts of Cybercrime. Malware Attacks. Surgical Strikes and Shotgun Blasts. Investigating Cybercrime. A Framework for Conducting an Investigation of a Computer Security Incident. Look for the Hidden Flaw. Analyzing the Remnants of a Computer Security Incident. Launching the Investigation. Determining If a Crime Has Taken Place. Cover-Ups Are Common. Involving the Authorities. When an Investigation Cannot Continue. Preparing for Cybercrime. Building a Corporate Cyber "SWAT Team". Privacy and Computer Crime. Introduction to End-to-End Digital Investigation. Collecting and Analyzing Evidence of a Computer Crime. Using Evidence Effectively. Conducting Incident Postmortems. Using the Forensic Utilities.
• Features hundreds of photographs and line drawings • Focuses on best practices and do’s and don’ts in physical security design and applications
Contents Abridged: Background and Theory Protecting the Built Environment Applications of CPTED in the Built Environment Catalog no. K13768, March 2013, c. 972 pp. ISBN: 978-1-4398-8021-0, $119.95 / £76.99 Also available as an eBook
• Includes in-depth coverage of encase as the leading tool for analyzing computer media • Covers public and private computer investigations • Details the author's new end-to-end approach covering all aspects of the investigation
Contents Abridged:
Catalog no. 1973, April 2013, 402 pp. ISBN: 978-0-8493-1973-0, $89.95 / £57.99 Also available as an eBook
24
Save when you order online at www.crcpress.com
Security and Homeland Security New!
Critical Infrastructure System Security and Resiliency Betty Biringer and Eric Vugrin Sandia National Laboratories, Albuquerque, New Mexico, USA
Drake Warren Rand Corporation, Santa Monica, California, USA
Security protections for critical infrastructure nodes are intended to minimize the risks resulting from natural or man-made "initiating events." This book focuses on the notion of safeguarding critical infrastructure by protecting the infrastructure's ability to perform its mission or function. The authors’ analytical approach and methodology leverages expertise in modeling dependencies, optimizing system resiliency for effective physical protection system design and consequence mitigation. The book also provides risk assessment tools and necessary metrics to provide guidance to decision-makers in applying the sometimes limited resources to reduce risk and ensure operational resiliency. • Provides a total, integrated system approach to security risk assessment that can be reproducible for various critical infrastructure assessments • Examines the security functions of detection, delay, and response, and the integration of these functions required for an effective protection system
Third Edition of a Bestseller!
Critical Infrastructure Homeland Security and Emergency Preparedness, Third Edition Robert Radvanovsky CIPS, Infracritical, Geneva, Illinois, USA
Allan McDougall Evolutionary Security Management Inc., Arnprior, Ontario, Canada
In keeping with the fast-changing nature of this field, the third edition of this essential resource has been completely revised and updated. All existing weblinks have been verified for accuracy and new weblinks have been added. Three chapters have been renamed to be more reflective of current trends, and several chapters are now consolidated into a single chapter, as the book embraces a new "all-hazards approach" to homeland security, critical infrastructure protection and assurance, and emergency management. • New edition refleects a more holistic approach • Every chapter is either updated: reworked: or combined to reflect changes in how private and governmental agencies work together • New updated links
Selected Contents:
• Offers a survey of current resilience assessment methods and an evaluation of their limitations and benefits
Introduction to Critical Infrastructure Assurance and Protection
• Presents optional features that can be added to a system to reduce risk and increase the protection system's effectiveness
Beyond National Frameworks
Selected Contents: Introduction. Threat Analysis. Likelihood of Initiating Events. Consequences of Undesired Events. Protection System Effectiveness. Security Risk. Push For Resilience. Current State of Resilience Assessment. A Resilience Assessment Framework. Case Studies. Outstanding Research Areas. Summary and Conclusions. Appendix A - Fault Tree Theory. Appendix B - Physical Protection Feature Performance Data. Catalog no. K15473, April 2013, 216 pp. ISBN: 978-1-4665-5750-5, $89.95 / £57.99 Also available as an eBook
Demand, Capacity and Fragility and the Emergence of Networks Public-Private Partnerships The Re-Invention of Information Sharing and Intelligence Emergency Preparedness and Readiness Security Vulnerability Assessments Regulations Information Sharing and Analysis Centers Supervisory Control and Data Critical Infrastructure Information Appendices Catalog no. K14465, April 2013, 280 pp. ISBN: 978-1-4665-0345-8, $99.95 / £63.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
25
Security and Homeland Security Coming Soon!
The Active Shooter Response Training Manual Scott M. Hyderkhan Kinetic Tactical Training Solutions LLC, Mercer Island, Washington, USA
“… clear, concise, and easily understandable and virtually implementable with any size team of operators or road dogs. … builds on training, unity, tasks, skill levels … making sure your techniques fall within the parameters of good reliable doctrine. … perfect for all types of learners.” —National Tactical Officer Association Conference Active Shooter Instructor certification course attendee, Mesquite, Nevada
The modern Active Shooter Response (ASR) has been evolving since its inception, approximately a decade ago. This manual, DVD training video, and PowerPoint® presentation on CD-ROM provides police personnel with the skills necessary to respond successfully to any active shooter situation. Using established doctrine developed by the U.S. Army, this program is designed to help create, plan, and execute ASR training at the departmental level. The methods and protocols presented are applicable across all federal, state, and local law enforcement agencies. • Offers insight from an experienced army ranger and police officer • Presents methods and protocols based on an established doctrine • Provides three tiers of learning tools: manual, video, and PowerPoint® slides
Selected Contents: The Active Shooter Response Mission and Operation Principles of Training and Developing an ASR Training Plan Movement and Maneuver Close Quarter Battle (CQB) Individual and Collective Tasks
New!
Cybercrime, Cyberconflict & Cyberpower Solange Ghernaouti-Helie University of Lausanne, Switzerland
This work develops perspectives and approaches to crucial cyber-security issues that are non-political, non-partisan, and non-governmental. It informs readers through high-level summaries and the presentation of a consistent approach to several cyber-riskrelated domains, both from a civilian and a military perspective. It explains fundamental principles in an interdisciplinary manner, thus shedding light on the societal, economic, political, military, and technical issues related to the use and misuse of information and communication technologies. • Provides a broad evaluation of cybercrime and cyberconflict and discusses approaches to security that best protect individuals, companies and governments from the criminals who operate in cyberspace. • Takes a comprehensive approach to cybercrime breaking down the discussion in terms of the impact on citizens, organisations and the state • Discusses of the civil-military and personalcorporate axes of perspective
Selected Contents: Cybercrime and Cybersecurity: Stakes and Challenges for the 21th Century. Cyberspace and the Internet: a new Paradigm for Crime and Conflict. Cybercrimes against Persons. Cybercrimes against Assets. Cybercrime against States. Cyberconflict, Cyberwar, and Cyberpower. Understanding Cybercriminals. The Cybercriminal Toolkit. The Fight against Cybercrime. Cybercriminal Investigation: Computer Forensics. A Global Approach to Cybersecurity. Cybersecurity Governance and Security Measures. Cyberspace: Protection of a Shared Asset. Glossary of main cybercrime and cybersecurity related terms. References and bibliography. Index. Catalog no. N10719, December 2012, 220 pp. ISBN: 978-1-4665-7304-8, $89.95 / £57.99 Also available as an eBook
Catalog no. K18964, May 2013, 88 pp. Soft Cover ISBN: 978-1-4665-8297-2, $89.95 / £57.99 Also available as an eBook
26
Save when you order online at www.crcpress.com
Security and Homeland Security New!
Cultural Property Security Protecting Museums, Historic Sites, Archives, and Libraries Daniel J. Benny, PhD Embry-Riddle Aeronautical University Worldwide, Harrisburg, Pennsylvania, USA
Cultural property security is of global importance, with tens of thousands of institutions internationally tasked with protecting and maintaining relics and artifacts of social, cultural, and historical significance. Cultural Property Security offers powerful protection guidelines to security departments tasked with safeguarding popular historical sites, museums, and libraries and the historical artifacts they house. Presenting practical, ready-to-implement solutions in a clear writing style, the book: • Provides a working definition of cultural properties • Identifies the threats against cultural properties from crime and terrorism, particularly in regions with political or civil unrest • Offers guidance in threat assessment • Identifies the physical security measures and technology that can be used to protect such institutions • Presents guidelines for establishing a protective service department for cultural properties • Describes proper arrest and post-arrest protocols • Includes a list of online resources for further information related to the protection of cultural properties Complete with dozens of photos, the book establishes leading industry best practices to identify the various threats to cultural properties and protect them. Dr. Daniel J. Benny has more than 35 years of security management experience and has served as a Director of Protective Services for the state of Pennsylvania’s Historic and Museum Commission. His insight is invaluable to those responsible for securing these institutions from internal and external threats.
New!
Introduction to Intelligence Studies Carl J. Jensen, III, David H. McElreath, and Melissa Graves University of Mississippi, Oxford, USA
Since the attacks of 9/11, the United States intelligence community (IC) has undergone an extensive overhaul. Perhaps the greatest of these changes has been the formation of the Office of the Director of National Intelligence. The IC today faces challenges as it never has before; everything from terrorism to pandemics to economic stability has now become an intelligence issue. Introduction to Intelligence Studies provides a comprehensive overview of intelligence and security issues, defining critical terms, and reviewing the history of intelligence as practiced in the United States. Designed in a practical sequence, the book begins with the basics of intelligence, progresses through its history, describes best practices, and explores the way the IC looks and operates today. Each chapter begins with objectives and key terms and closes with questions to test reader assimilation. The authors examine the "pillars" of the American intelligence system—collection, analysis, counterintelligence, and covert operations—and demonstrate how these work together to provide "decision advantage." The book provides equal treatment to the functions of the intelligence world—balancing coverage on intelligence collection, counterintelligence, information management, critical thinking, and decision-making. It also covers such vital issues as laws and ethics, writing and briefing for the IC, and the emerging threats and challenges that intelligence professionals will face in the future. Instructor’s manual and other ancillaries available upon qualified course adoption
Catalog no. K14365, November 2012, 374 pp. ISBN: 978-1-4665-0003-7, $79.95 / £49.99 Also available as an eBook
Catalog no. K15509, December 2012, 232 pp. ISBN: 978-1-4665-5818-2, $79.95 / £49.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
27
Security and Homeland Security The Complete Guide to Physical Security Edited by
Paul R. Baker Rand Corporation, Arlington, Virginia, USA
Daniel J. Benny Harrisburg, Pennsylvania, USA
To adequately protect an organization, physical security must go beyond the "gates, guns, and guards" mentality that characterizes most security programs. Creating a sound security plan involves understanding not only security requirements but also the dynamics of the marketplace, employee issues, and management goals. The Complete Guide to Physical Security discusses the assets of a facility—people, building, and location—and the various means to protect them. It emphasizes the marriage of technology and physical hardware to help those tasked with protecting these assets to operate successfully in the ever-changing world of security. The book covers specific physical security technologies, such as intrusion detection, access control, and video surveillance systems—including networked video. It addresses the reasoning behind installations, how to work with contractors, and how to develop a central station for monitoring. It also discusses government regulations for building secured facilities and SCIFs (Sensitive Compartmented Information Facilities). Case examples demonstrate the alignment of security program management techniques with not only the core physical security elements and technologies but also operational security practices. The authors of this book have nearly 50 years combined experience in the security industry—including the physical security and security management arenas. Their insights provide the foundation for security professionals to develop a comprehensive approach to achieving physical security requirements while also establishing leadership roles that help further the overall mission of their organization. Catalog no. K10007, November 2012, 360 pp. ISBN: 978-1-4200-9963-8, $69.95 / £44.99 Also available as an eBook
28
New!
Information Security Management Handbook 2012 Edition on CD-ROM Edited by
Harold F. Tipton, CISSP and Micki Krause Nozaki, CISSP Updated annually, the Information Security Management Handbook is the most comprehensive and up-to-date reference available on information security and risk management. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security, this volume features 31 new entries on Social Networking, Secure Software Lifecycle, Insider Threat, Application Whitelisting, Server Virtualization, Security Requirements Analysis, CERT Resilience Management Model, Continuous Monitoring, Service-Oriented Architecture, Cloud Security, Managing Advanced Persistent Threats, Virtualization Forensics, Protected Health Information under HIPAA and HITECH, and more. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and nearfield communications. This 2012 CD-ROM Edition contains the complete contents of every annual edition of the handbook since 1997, including 2012. It is an authoritative resource that is linked, searchable by keyword, and organized under the CISSP® CBK® domains. In addition to the complete contents of the set, the CD-ROM includes an extra volume’s worth of information— including chapters from other security and networking books that have never appeared in the print edition of the Information Security Management Handbook. Catalog no. K14130, October 2012, CD-ROM ISBN: 978-1-4398-9209-1, $199.95 / £127.00 Also available as an eBook
Save when you order online at www.crcpress.com
Security and Homeland Security Protection, Security, and Safeguards Practical Approaches and Perspectives, Second Edition Edited by
Dale L. June National University, Los Angeles, California, USA
Much has changed on the security landscape since the last edition of this book was published in 2000. Today’s security personnel face greater demands than ever before and are expected to be more highly trained and educated. Updated to reflect the heightened security climate of the current age, Protection, Security, and Safeguards: Practical Approaches and Perspectives, Second Edition offers a critical survey of the field, introduces proven procedures, and explores the latest advances for security practitioners. Highlights of the book include: • Psychological perspectives on security issues • The professional requirements of security officers and executive protection agents • Case studies of unusual security scenarios • Guidance on performing a threat assessment under immediate situations • Workplace violence prevention and response programs • The role of security consultants • Defensive tactics for protecting clients and personal self-defense • Residence security, airline security, corporate investigations, and motorcade procedures • Real stories from K-9 handlers • Safeguards against identity theft and counterfeiting • Tips on getting hired as a security professional Edited by a former U.S. Secret Service Agent, the book includes contributions from professionals in all walks of the security industry. The diverse array of topics in this volume provide a scintillating view of the challenging field of security and the people who make up today’s security workforce.
Introduction to Surveillance Studies J.K. Petersen Computer Consultant, Writer, and Educator, Washington, USA
Surveillance is a divisive issue—one might say it is inherently controversial. Used by private industry, law enforcement, and for national security, it can be a potent tool for protecting resources and assets. It can also be extremely invasive, calling into question our basic rights to freedom and privacy. Introduction to Surveillance Studies explores technological trends, past- and present-day rationales for surveillance and surveillance devices, and current social issues surrounding them. The book begins with a brief historical perspective on the evolution of surveillance technologies, then charts the development of modern-day devices from the invention of radar to the dawn of the Internet. Next, it describes emerging technologies—including GIS, GPS devices, Google Maps, biometric technology, surveillance cameras, global satellites, miniaturization of devices, and social media—that are challenging notions of privacy and the right of access to information. While focusing on the technology, the book also discusses surveillance as a phenomenon and what these technologies mean to our understanding of freedom, privacy, and the impact of technology on communications and the structure of society. Enhanced with numerous photos, the book presents the pros and cons—and some of the controversy—of these increasingly sophisticated technologies, their collective impact, and what the future may hold. It is ideal for those new to surveillance; security, military, and law enforcement professionals who utilize surveillance technologies; and students of privacy, constitutional freedom, journalism, and sociology. Instructor’s guide available upon qualified course adoption
Catalog no. K15350, October 2012, 416 pp. ISBN: 978-1-4665-5509-9, $69.95 / £44.99 Also available as an eBook
Catalog no. K13190, October 2012, 478 pp. ISBN: 978-1-4398-6953-6, $69.95 / £44.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
29
Security and Homeland Security
Introduction to Transportation Security
Cargo Crime Security and Theft Prevention J. J. Coughlin Rockwall, Texas, USA
By understanding the current methods and operations of those who attack the supply chain, industry professionals can design effective security plans and law enforcement can properly investigate these crimes. Drawn from the author’s experience as a law enforcement detective and supervisor and as a regional security manager for a large multimode transportation and logistics company, this book reviews emerging trends, identifies criminal tactics, discusses law enforcement response to cargo theft, and presents best practices to help businesses avoid victimization by cargo thieves. Catalog no. K14902, October 2012, 266 pp. ISBN: 978-1-4665-1245-0, $69.95 / £44.99 Also available as an eBook
Frances L. Edwards and Daniel C. Goodrich Mineta Transportation Institute, San Jose State University, California, USA
“... an important read for all managers in need of comprehensive reference materials on transportation security for all modes. The learning objectives, case studies, summaries, and discussion questions in each chapter keep you focused. This is an invaluable tool for both the student or seasoned professional.” —Herby G. Lissade, P.E., Chief, Office of Emergency Management for the California Department of Transportation
Providing transportation managers with the knowledge, skills, and abilities to effectively manage the security of transportation assets, Introduction to Transportation Security examines: • Basic theories of security and emergency management • The integrated nature of the nation’s critical infrastructure and the threats to transportation in each surface mode
The Comprehensive Handbook of School Safety Edited by
E. Scott Dunlap Eastern Kentucky University, Richmond, USA
“… invaluable to administrators and educators as a relevant and active tool to prepare for crisis management.” —Nancy Booth, Boone County Schools, Madison, West Virginia, USA
The Comprehensive Handbook of School Safety expands the dialogue on school safety to address the spectrum of safety risks—including bullying, fire safety, and playground and transportation safety. Helping school administrators develop appropriate programs that protect all individuals from harm, the book addresses the spectrum of school safety issues including school security, environmental safety risks, and cyber safety risks. Catalog no. K13432, September 2012, 454 pp. ISBN: 978-1-4398-7407-3, $119.95 / £76.99
• Federal agencies working in emergency management and transportation security and their intelligence and response requirements and capabilities • The types of disasters and their economic impact • Cost-beneficial security strategies aimed at preventing catastrophic failures in each transportation mode • Effective methods for organizing, testing, and evaluating transportation security across modes and professions The book covers all transportation modes and their interconnectivity—including highway, air cargo, freight and passenger rail, transit, and maritime. It presents learning objectives and discussion questions to test assimilation of the material and case studies to facilitate a practical understanding of the concepts. Introduction to Transportation Security provides essential information for students in transportation management programs and professionals charged with safeguarding the movement of assets within our interconnected transportation network. Catalog no. K12044, September 2012, 388 pp. ISBN: 978-1-4398-4576-9, $69.95 / £44.99 Also available as an eBook
Also available as an eBook
30
Save when you order online at www.crcpress.com
Security and Homeland Security Concepts and Case Studies in Threat Management
Digital Forensics for Handheld Devices
Frederick S. Calhoun Threat Management Consultant, Arlington, Virginia, USA
Eamon P. Doherty
Stephen W. Weston California Highway Patrol (Retired), Sacramento, USA
Fairleigh Dickinson University, Teaneck, New Jersey, USA
Concepts and Case Studies in Threat Management explores the salient themes essential to the practice and profession of threat management. These concepts include case dynamics and intervention synergy, the importance of determining key factors in each situation, the power of inhibitors, differences among the various venues of violence, and avoiding myopic management strategies and isolationism. The authors provide detailed examples and real-life case studies to give readers practical insights on the threat management scenarios they may encounter. Moving the field towards a more pragmatic approach, the book clearly illustrates the current state of the threat management process.
An adversary who attacks an organization from within can prove fatal to the organization and is generally impervious to conventional defenses. Digital Forensics for Handheld Devices examines both the theoretical and practical aspects of investigating handheld digital devices. The book touches on all areas of mobile device forensics, including topics from the legal, technical, academic, and social aspects of the discipline.
Catalog no. K14132, August 2012, 252 pp. Soft Cover ISBN: 978-1-4398-9217-6, $79.95 / £49.99 Also available as an eBook
It provides guidance on how to seize data, examine it, and prepare it as evidence for court. This includes the use of chain of custody forms for seized evidence and Faraday Bags for digital devices to prevent further connectivity and tampering of evidence. Emphasizing the policies required in the work environment, the author provides readers with a clear understanding of the differences between a corporate investigation and a criminal investigation. The book also: • Offers best practices for establishing an incident response policy and seizing data from company or privately owned digital devices
General Aviation Security
• Provides guidance in establishing dedicated examinations free of viruses, spyware, and connections to other devices that could taint evidence
Aircraft, Hangars, Fixed-Base Operations, Flight Schools, and Airports
• Supplies guidance on determining protocols for complicated crime scenes with external media and devices that may have connected with the handheld device
Daniel J. Benny, Ph.D Embry-Riddle Aeronautical University Worldwide, Harrisburg, Pennsylvania, USA
“Dr. Benny gives the reader practical slices of airport and general aviations operations … This is a practical primer which will bring the general aviation security novice up to speed on applicable federal regulations, current topics, and generally accepted practices.” —GA Security Magazine
General Aviation Security: Aircraft, Hangars, FixedBase Operations, Flight Schools, and Airports examines the threats against general aviation (GA) and presents resources for security professionals and GA airport owners and operators to develop an impenetrable airport and aircraft security plan.
Considering important privacy issues and the Fourth Amendment, this book facilitates an understanding of how to use digital forensic tools to investigate the complete range of available digital devices, including flash drives, cell phones, PDAs, digital cameras, and netbooks. It includes examples of commercially available digital forensic tools and ends with a discussion of the education and certifications required for various careers in mobile device forensics. Catalog no. K14323, August 2012, 336 pp. ISBN: 978-1-4398-9877-2, $69.95 / £44.99 Also available as an eBook
Catalog no. K14805, August 2012, 347 pp. ISBN: 978-1-4665-1087-6, $79.95 / £49.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
31
Security and Homeland Security Corporate Security in the Asia-Pacific Region Crisis, Crime, Fraud, and Misconduct Christopher J. Cubbage, CPP and David J. Brooks, PhD Amlec House, Pty, Ltd, Booragoon, Western Australia
“There is no comparable book on the international market and, as such, it is at the leading edge of advanced security management texts for the serious consideration of asset protection.” —Clifton Smith PhD, Hon. Professor of Security Science, Edith Cowan University
Corporate Security in the Asia-Pacific Region examines real cases of corporate crisis, crime, fraud, and other misconduct that corporate security professionals need to be aware of to effectively protect people, operations, and assets within the region. Current security threats and risks are addressed to help readers conduct an informed risk assessment and analysis of operational risk. Catalog no. K14136, August 2012, 242 pp. ISBN: 978-1-4398-9227-5, $79.95 / £49.99 Also available as an eBook
Power, National Security, and Transformational Global Events Challenges Confronting America, China, and Iran Edited by
Thomas A. Johnson University of Wisconsin-Parkside, Kenosha, USA
With China holding so much of America’s debt, currency valuation issues have already caused tensions between the two superpowers. Couple this with Iran’s efforts to develop into a nuclear power, and the United States and China could soon find themselves in a global power tug-of-war. This volume explores the shifts in power that have initiated major transformational events around the world. Describing how current and emerging situations will impact the U.S., the book discusses the effect of information technology and social media tools, insights from intelligence community experts, challenges with Iran, and the rapid growth of China’s economic wealth and military power.
Managing the Insider Threat No Dark Corners Nick Catrantzos University of Alaska, Fairbanks, USA
An adversary who attacks an organization from within can prove fatal to the organization and is generally impervious to conventional defenses. Drawn from the findings of an award-winning thesis, Managing the Insider Threat: No Dark Corners is the first comprehensive resource to use social science research to explain why traditional methods fail against these trust betrayers. In this groundbreaking book, author Nick Catrantzos identifies new management, security, and workplace strategies for categorizing and defeating insider threats. The book begins with problem definition and research findings that lead to the "No Dark Corners" strategy for addressing insider threats. With these foundational underpinnings, the book then examines agents of change within the workplace—namely, key players in positions to effectively support or undermine the No Dark Corners strategy, including corporate sentinels and leaders affecting application of this approach. From there, the author goes on to examine key areas where No Dark Corners-style engagement can make a difference in the way an institution counters insider threats—through rethinking background investigations, recognizing deception, and using lawful disruption. Moving progressively from the theoretical to the practical in applying the strategy within an organizational framework, the book looks at implementation challenges and offers a framework for introducing new insider defense insights into an organization. Each chapter offers questions to stimulate discussion and exercises or problems suitable for team projects. This practical resource enables those charged with protecting an organization from internal threats to circumvent these predators before they jeopardize the workplace and sabotage business operations. Catalog no. K13375, May 2012, 363 pp. ISBN: 978-1-4398-7292-5, $69.95 / £44.99 Also available as an eBook
Catalog no. K13956, June 2012, 391 pp. ISBN: 978-1-4398-8422-5, $99.95 / £49.99 Also available as an eBook
32
Save when you order online at www.crcpress.com
Security and Homeland Security Hospitality Security Managing Security in Today’s Hotel, Lodging, Entertainment, and Tourism Environment Darrell Clifton, CPP Circus Circus Hotel Casino, Reno, Nevada, USA
“... a road map for success that can be used at all levels of management and/or discipline. The book should be read by every operational manager to ensure their property is protected from the many forms of risk.” —James C. Reynolds, CPP, CLSD, Hilton Worldwide
This book provides time-tested methods for preventing and resolving the challenges faced by hospitality practitioners. Ideal for novices and veterans alike, this accessible, reader-friendly primer enables security directors to evaluate what risks are inherent to hospitality environments, analyze those risks through threat and vulnerability assessments, and develop methods to mitigate them. Catalog no. K13445, May 2012, 333 pp. ISBN: 978-1-4398-7436-3, $79.95 / £49.99 Also available as an eBook
Information Security Management Handbook Sixth Edition, Volume 6 Edited by
Harold F. Tipton HFT Associates, Villa Park, California, USA
Micki Krause Nozaki Pacific Life Insurance Company, Newport Beach, California, USA
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the upto-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2® CISSP Common Body of Knowledge (CBK®), this volume features new information on advanced persistent threats, HIPAA requirements, social networks, virtualization, and SOA.
Pandemic Planning Edited by
J. Eric Dietz and David R. Black Purdue University, West Lafayette, Indiana, USA
Preparedness and rigorous planning on community, state, and regional levels are critical to containing the threat of pandemic illness. Steeped in research and recommendations from lessons learned, Pandemic Planning describes the processes necessary for the efficient and effective preparation, prevention, response, and recovery from a pandemic threat. This evidence-based book guides plan development and provides solutions to common strategic, ethical, and practical challenges to pandemic preparedness. Topics discussed include: • The current threat of pandemics and how they relate to homeland security and emergency management • Leadership and incident management structure as they relate to pandemic preparedness • Computer simulation models and data visualization for strengthening prevention and control measures within a community • Marketing principles and how they promote pandemic preparedness for a community • Lessons learned from pandemic influenza exercises conducted with regional hospitals and how those lessons can be applied to other institutions • Government resources available to assist with the planning for and monitoring of a pandemic event • Economic and logistic concerns that arise during a pandemic Discussing preparedness across a variety of institutional levels, the authors’ collaboration with national research leaders and community stakeholders has enabled them to assemble the most current and essential information available on pandemic preparedness. Their book distills this information into workable strategies to bolster public health, mitigate risk, and protect the population. Catalog no. K12692, March 2012, 330 pp. ISBN: 978-1-4398-5765-6, $79.95 / £49.99 Also available as an eBook
Catalog no. K14176, March 2012, 504 pp. ISBN: 978-1-4398-9313-5, $99.95 / £63.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
33
Security and Homeland Security New!
Investigations in the Workplace Second Edition
Smart Grid Security An End-to-End View of Security in the New Electrical Grid Gilbert N. Sorebo
Eugene F. Ferraro
SAIC, McLean, Virginia, USA
Business Controls, Inc., Greenwood Village, Colorado, USA
Gleaned from Eugene Ferraro’s decades of experience, this volume provides insightful information on the processes for the proper and safe investigation of workplace crime and misconduct. Revised and updated with more methods, techniques, and case studies, the book includes new diagrams, checklists, and visuals to help readers put the material in context and make their investigations soar. Each chapter begins with Key Learning Points and is supplemented with boxed Tips, Traps, and Common Mistakes. An exhaustive appendix includes a glossary of common investigative terms, sample surveillance and investigative reports, advice on digital evidence, and more. Catalog no. K10762, February 2012, 603 pp. ISBN: 978-1-4398-1480-2, $79.95 / £49.99 Also available as an eBook
Michael C. Echols Utility Security Professional, Litchfield Park, Arizona, USA
“For those looking to get a handle on how to secure the evolving and dynamic smart grid, Smart Grid Security is an excellent reference. 4 stars.” —Security Management, December 2012
This volume explores the important techniques, challenges, and forces that will shape how we achieve a secure twenty-first century electric grid. The authors discuss the technical details about how metering technology is being implemented and the likely threats and vulnerabilities that utilities will face. They address the home area network (HAN) and examine distribution and transmission. Catalog no. K12610, December 2011, 328 pp. ISBN: 978-1-4398-5587-4, $83.95 / £52.99 Also available as an eBook
Third Edition
Asset Protection through Security Awareness
J.K. Petersen
Tyler Justin Speed
Computer Consultant, Writer, Educator, Washington, USA
Electronics International, Oregon, USA
From officially sanctioned, high-tech operations to budget spy cameras and cell phone video, the third edition of this bestselling handbook reflects the rapid growth in the surveillance industry. The only comprehensive work chronicling the background and current applications of a broad range of surveillance technologies, this fully revised and expanded edition offers the latest in surveillance and privacy issues, including workplace and school privacy, front yard privacy, and transportation security issues. It addresses social media, GPS circuits in cell phones and PDAs, new GIS system use, Google street-viewing technology, as well as other new and emerging developments.
Supplying a high-level overview of how to protect your company’s physical and intangible assets, this book explains how to enlist the assistance of your employees as the first line of defense in safeguarding company assets and mitigating security risks. It reviews key topics surrounding computer security and provides detailed instruction on how to put together an effective security awareness team. Requiring no previous networking or programming experience, the book specifies managers’ and employees’ roles in establishing a company-wide culture of security awareness.
Handbook of Surveillance Technologies
Catalog no. K13389, January 2012, 1040 pp. ISBN: 978-1-4398-7315-1, $139.95 / £89.00
Catalog no. K10491, December 2011, 337 pp. ISBN: 978-1-4398-0982-2, $69.95 / £46.99 Also available as an eBook
Also available as an eBook
34
Save when you order online at www.crcpress.com
Security and Homeland Security Cybersecurity for Industrial Control Systems
Introduction to Unmanned Aircraft Systems
SCADA, DCS, PLC, HMI, and SIS
Edited by
Tyson Macaulay Security Liaison Officer, Bell Canada, Ottawa, Ontario
Bryan Singer Principal Consultant, Kenexis Consulting Corporation
“... this is clearly the best book on ICS Security by far. The two best things about this book are: 1) They got the facts right about both ICS and IT security. ... 2) They provided the background information for a beginner to understand, but followed that up with significant technical detail and examples.” —Dale G Peterson, writing on www.digitalbond.com
This book provides the tools to ensure network security without sacrificing efficiency and functionality. Starting with an introduction to ICS, it discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. Catalog no. K10111, December 2011, 203 pp. ISBN: 978-1-4398-0196-3, $79.95 / £52.99
Richard K. Barnhart, Stephen B. Hottman, Douglas M. Marshall, and Eric Shappee Kansas State University, Salina, USA
A collection of contributions from leading experts, this book applies the depth of their expertise to identify and survey the fundamentals of unmanned aircraft system (UAS) operations. Written from a nonengineering civilian operational perspective, the book starts by detailing the history of UASs and then explores current technology and what is expected for the future. Covering all facets of UAS elements and operation—including an examination of safety procedures and human factors—this material gives readers a truly complete and practical understanding of what it takes to safely operate UASs for a variety of missions in the National Airspace System. Catalog no. K11588, October 2011, 233 pp. ISBN: 978-1-4398-3520-3, $72.95 / £46.99 Also available as an eBook
Also available as an eBook
CISO's Guide to Penetration Testing A Framework to Plan, Manage, and Maximize Benefits James S. Tiller Raleigh, North Carolina, USA
“Tiller teaches on the simplicity of security, breaking it down from smoke and mirrors to time-proven measures.” — Jeffrey Schmidt, Global Head Business Continuity, Security, and Governance, BT Global Services
Presenting the methodologies and concepts required for successful penetration testing, this book discusses the process of penetration testing from both consultative and technical perspectives. It provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used. The methodology detailed provides a comprehensive solution to meeting the objectives of penetration testing. Catalog no. K13771, December 2011, 389 pp. ISBN: 978-1-4398-8027-2, $72.95 / £46.99 Also available as an eBook
Introduction to Emergency Management Brenda D. Phillips and David M. Neal Oklahoma State University, Stillwater, USA
Gary R. Webb University of North Texas, Denton, USA
Providing an insider’s glimpse into emergency management, this volume engages readers in real-life case studies, integrating scientific findings with practitioner viewpoints. It outlines various career tracks within emergency management with a focus on core competencies, ethical practice standards, certification issues, and the responsibilities of the emergency manager. Boxed features written by graduates of emergency management programs and expert practitioners from around the world provide real-world insights. Each chapter begins with learning objectives and includes discussion questions. Instructor’s manual, test questions, and PowerPoint® slides are available upon qualified course adoption
Catalog no. K11506, October 2011, 517 pp. ISBN: 978-1-4398-3070-3, $62.95 / £40.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
35
Security and Homeland Security The Security Risk Assessment Handbook
Homeland Security
A Complete Guide for Performing Security Risk Assessments, Second Edition
What Is It and Where Are We Going? Amos N. Guiora The University of Utah, Salt Lake City, USA
Douglas J. Landoll
Have policies enacted to protect us from terrorist attacks since 9/11 made us safer, or have they merely mollified the concerned public with a false sense of security? This volume combines professional experiences, personal reflections, and academic scholarship to provide a realistic assessment of current policy effectiveness. It suggests ways to prioritize limited resources and offers insight into what should be the predominant considerations. It also examines terror financing, provides a cost-benefit analysis of homeland security, and discusses international cooperation/intelligence sharing, business continuity, and immigration/narco terrorism.
“… this book, now in its second edition, covers a lot of ground ... Its author, a one-time senior analyst at the NSA, is clearly highly experienced in managing very large-scale risk assessment exercises. … a valuable guide ... .”
Catalog no. K11730, August 2011, 199 pp. ISBN: 978-1-4398-3818-1, $83.95 / £52.99
Catalog no. K11138, May 2011, 495 pp. ISBN: 978-1-4398-2148-0, $79.95 / £49.99
Also available as an eBook
Also available as an eBook
Lantego, LLC, Austin, Texas, USA
Risk Assessment for Water Infrastructure Safety and Security Anna Doro-on RAMCO Companies, Inc., Ventura, California, USA
The water supply system remains largely unprotected from terrorist threat. This volume provides a unique quantitative risk assessment methodology for protection against terrorist contamination, vandalism, and other threats to water supply systems. It includes processes for security and safe facility operations; an integrated model to the risk assessment of surface water, dams, wells, wastewater treatment facilities, reservoirs, and aqueducts of large urban regions; and a discussion on intelligence analysis incorporating risk assessment for terrorism prevention. It also discusses legal and regulatory requirements related to the groundwater and water supply protection policy against terrorism. Catalog no. K12466, August 2011, 431 pp. ISBN: 978-1-4398-5341-2, $119.95 / £76.99 Also available as an eBook
36
— Michael Barwise, BSc, CEng, CITP, MBCS, in InfoSec Reviews, July 2011
This new edition of a bestseller explains how to conduct an effective risk assessment. Providing comprehensive treatment of the risk assessment process, it unveils little known tips, tricks, and techniques used by savvy professionals in the field.
Practical Risk Management for the CIO Mark Scherling M3P Consulting, Inc., Victoria, British Columbia, Canada
“This is an exceptionally wellwritten primer for anyone responsible for corporate information risk management. … A must-have for CIOs and anyone else managing business information assets.” —Michael Barwise, BSc, CEng, CITP, MBCS, in InfoSec Reviews, September 2011
Detailing procedures that will help your team perform better risk assessments and aggregate results into more meaningful metrics, Practical Risk Management for the CIO approaches information risk management through improvements to information management and information security. It provides easy-tofollow guidance on how to effectively manage the flow of information and incorporate both service delivery and reliability. Catalog no. K12655, April 2011, 399 pp. ISBN: 978-1-4398-5653-6, $79.95 / £52.99 Also available as an eBook
Save when you order online at www.crcpress.com
Security and Homeland Security Official (ISC)2® Guide to the ISSMP® CBK® Edited by
Harold F. Tipton HFT Associates, Villa Park, California, USA
(ISC)² Corporate Preparing professionals for certification and job readiness, the Official (ISC)²® Guide to CISSP®-ISSMP® CBK® supplies a complete overview of the management topics related to information security. It provides for an expanded enterprise model of security and management that delves into project management, risk management, and continuity planning. Facilitating the mastery of the five ISSEP domains required for certification, this book will not only help you prepare for the CISSP-ISSMP certification exam, but also provide you with a solid foundation to enhance your career path. Catalog no. AU9443, April 2011, 468 pp. ISBN: 978-1-4200-9443-5, $79.95 / £52.99 Also available as an eBook
FISMA Principles and Best Practices Beyond Compliance Patrick D. Howard Chief Information Security Officer, Nuclear Regulatory Commission, USA
Detailing a proven approach for establishing and implementing a comprehensive information security program, this book integrates compliance review, technical monitoring, and remediation efforts to explain how to achieve and maintain compliance with Federal Information Security Management Act (FISMA) requirements. Based on the author’s experience developing, implementing, and maintaining enterprise FISMA-based information technology security programs at three major federal agencies, the book provides workable solutions for establishing and operating an effective security compliance program. It delineates the processes, practices, and principles involved in managing the complexities of FISMA compliance. Catalog no. AU8291, March 2011, 345 pp. ISBN: 978-1-4200-7829-9, $79.95 / £52.99 Also available as an eBook
Loss Control Auditing A Guide for Conducting Fire, Safety, and Security Audits E. Scott Dunlap Eastern Kentucky University, Richmond, USA
A comprehensive resource for those developing and executing a loss control audit program, this book comes at the material from three perspectives: workplace safety, physical security, and life safety and fire service. Written for professionals in loss prevention and safety management as well as those studying the field, this reference includes core auditing issues that are addressed in the mainstream by loss control professionals and provides insight on the implementation of an auditing program within organizations. It illustrates audit scoring methodologies and presents sample audit formats for reader understanding and future use. Catalog no. K11419, April 2011, 255 pp. Soft Cover ISBN: 978-1-4398-2886-1, $52.95 / £33.99 Also available as an eBook
Protective Operations A Handbook for Security and Law Enforcement Glenn McGovern Santa Clara County District Attorney's Office, Bureau of Investigation, San Jose, California, USA
“One of the clear strengths of the book … is the use of realistic and credible scenarios. The actual scenarios sprinkled throughout each chapter … lend credibility to the work and provide excellent support to the central themes of each section.” —Linda F. Florence, Ph.D., CPP, Henry-Putnam University, in Journal of Strategic Security
This volume offers suggestions and guidance for confronting high-threat scenarios as well as the more mundane protective details. It explores operational security, situational awareness, and surveillance detection and includes examples from real-world attacks occurring over the past 60 years. Catalog no. K12374, March 2011, 224 pp. ISBN: 978-1-4398-5171-5, $83.95 / £52.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
37
Security and Homeland Security Internet Searches for Vetting, Investigations, and Open-Source Intelligence Edward J. Appel
Retail Security and Loss Prevention Solutions Alan Greggo, CPP, CFE PROFITRx, Cincinnati, Ohio, USA
iNameCheck LLC, Bethany Beach, Delaware, USA
Millie Kresevich
“Appel develops a framework for preparation and planning of successful Internet research. He covers basic information about search engines, metasearch engines, social networking sites, and search terms. … delivers with content and is an easy read.”
Facing security problems on many fronts, including external and internal theft, operational and paperwork errors, vendor error, and organized retail crime (ORC), retail security practitioners must be well-versed on the cause and effect of each problem as they are often called on for answers to mitigate these issues and protect the profitability of their company. This book provides an understanding of the fast-paced world of retail loss prevention, the day-to-day challenges retailers encounter, and solutions for the threats facing this multifaceted business. It also explains how to successfully assemble a loss prevention department and program.
—Larry Zilliox, in the PISA Newsletter, April 2011
Addressing legal, policy, privacy, and management issues, this book provides a procedural framework for effective Internet searching in investigations and intelligence. The text describes the proper use of Internet vetting, investigations, and open-source intelligence and offers solutions to common stumbling blocks that prevent the adoption of appropriate defenses against those who misuse information systems. Catalog no. K11359, January 2011, 320 pp. ISBN: 978-1-4398-2751-2, $72.95 / £46.99
Lakewood, Ohio, USA
Catalog no. AU9006, December 2010, 274 pp. ISBN: 978-1-4200-9006-2, $87.95 / £56.99 Also available as an eBook
Also available as an eBook
Practical Bomb Scene Investigation Second Edition James T. Thurman Eastern Kentucky University, Richmond, USA
“Packed with new photos, updated procedures, exciting and innovative strategies; Tom Thurman has improved on his already exceptional book with this second edition. There is no finer volume for operators who handle bombs and investigate criminal use of explosives.” —Jeffrey H. Norwitz, NCIS (Retired), Federal Law Enforcement Training Center
This second edition explores the investigative process that IED specialists undertake at the scene of an explosion. This edition includes information on detonation pressure, estimating the explosives weight of an IED, and investigating a post-blast scene in a hostile environment. Catalog no. K11031, January 2011, 519 pp. ISBN: 978-1-4398-1959-3, $104.95 / £66.99 Also available as an eBook
38
Cyber Security Essentials Edited by
James Graham, Ryan Olson, and Rick Howard Verisign iDefense Security Intelligence Services, Dulles, Virginia, USA
This volume provides an understanding of the concepts behind cyber-prevalent threats, tactics, and procedures. The team of security professionals from VeriSign’s iDefense® Security Intelligence Services supply an extensive review of the computer security landscape. They address more than 75 key security concepts in a series of well-illustrated summaries designed for most levels of technical understanding. Accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to nontechnical staff. Catalog no. K12343, December 2010, 341 pp. Soft Cover ISBN: 978-1-4398-5123-4, $69.95 / £46.99 Also available as an eBook
Save when you order online at www.crcpress.com
Security and Homeland Security Security Strategy Security An Introduction Philip P. Purpura, CPP
From Requirements to Reality Bill Stackpole Microsoft Corporation, Redmond, Washington, USA
Florence-Darlington Technical College, South Carolina, USA
Eric Oksendahl
“ … a thorough and well-organized text that addresses every aspect of security in a definitive way. ... could be a useful resource for both students and security practitioners.”
“The authors—both security veterans—share many personal anecdotes. They use relevant quotes and concisely illustrate their points.”
—David Sayer, Owner of Orion Security Consulting, in Security Management, July 2011
Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives.
Philip P. Purpura, recently selected by Security Magazine as one of the Top 25 Most Influential People in the Security Industry, shares proven methodologies that security practitioners can apply to scenarios they encounter. Each chapter includes learning objectives, a list of key terms, discussion questions, role-playing exercises, and links to relevant websites. Instructor's manual available upon qualified course adoption.
Catalog no. AU2839, October 2010, 637 pp. ISBN: 978-1-4200-9283-7, $76.95 / £48.99
Port Orchard, Washington, USA
—A. Marlen, Reviews.com
Catalog no. K11348, October 2010, 346 pp. Soft Cover ISBN: 978-1-4398-2733-8, $79.95 / £52.99 Also available as an eBook
Also available as an eBook
Casino Security and Gaming Surveillance Derk J. Boss and Alan W. Zajic Consultant, Wadsworth, Nevada, USA
“It’s professionals like Al and Derk who personify the professionalism that is crucial when establishing and operating modern casino security and surveillance departments.”
Terrorism and Homeland Security Perspectives, Thoughts, and Opinions Edited by
Dale L. June National University, Los Angeles, California, USA
This handbook provides gaming security professionals with the means to mitigate the myriad security threats facing the gaming world. It details the most common risks, threats, and scams—both internal and external—and supplies the appropriate security response. It covers physical security techniques as well as statistical information and metrics used to monitor key operations and transactions.
This volume brings together the work of academic researchers and law enforcement and intelligence personnel to present a sober appraisal of the issues surrounding the current state of our security infrastructure. Topics discussed include the history of terrorism and the rise of transnational anti-Western Islamism, progress made in protecting nations and individuals from terrorism, an analysis of a captured alQaeda training manual, suicide bombings, and political propaganda. The book also examines cooperative antiterrorism efforts among nations, insider threats, intelligence gathering, terrorist threats south of the border, and tools for locating bomb makers and clandestine labs.
Catalog no. AU7827, October 2010, 322 pp. ISBN: 978-1-4200-8782-6, $87.95 / £56.99
Catalog no. 93061, September 2010, 395 pp. ISBN: 978-1-4200-9306-3, $87.95 / £56.99
—Roger Gros, Publisher, Global Gaming Business Magazine
Also available as an eBook
For more information and complete contents, visit www.crcpress.com
39
Security and Homeland Security Targeted Violence
Managing an Information Security and Privacy Awareness and Training Program
A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings
Second Edition
Glenn P. McGovern
Rebecca Herold Rebecca Herold, LLC, Van Meter, Iowa, USA
“Rebecca Herold, an independent computer security advisor, knows privacy. ... In her latest book, Managing an Information Security and Privacy Awareness and Training Program, Herold has collected her best advice.” —Privacy Journal
Named one of the Best Privacy Advisers in the World by Computerworld magazine, Rebecca Herold provides authoritative coverage of what it takes to create an effective information security and privacy awareness training program. She details a proven framework for creating a training program that is compliant with applicable laws and supplies case studies from a range of businesses and industries. Catalog no. K10793, August 2010, 568 pp. ISBN: 978-1-4398-1545-8, $79.95 / £52.99 Also available as an eBook
Mobile Device Security A Comprehensive Guide to Securing Your Information in a Moving World Stephen Fried
Santa Clara County District Attorney's Office, Bureau of Investigation, San Jose, California, USA
“Author Glenn P. McGovern has aggregated 900 incidents spanning from 1950 through 2008. These attacks include assassinations, contract killings, and kidnappings perpetrated around the world. He provides a global statistical breakdown of these incidents regionally and globally, further broken down by the month, day of the week, and hour in which the attack took place. ... presented in an easy-tounderstand format, making it simple for the reader to put the data in practical perspective.” — Frederick D. "Rick" Arons, CPP, CRT, Former member of the U.S. Army Special Forces, in Security Management, March 2011
Catalog no. K11195, April 2010, 331 pp. ISBN: 978-1-4398-2512-9, $99.95 / £62.99 Also available as an eBook
Information Security Risk Analysis Third Edition Thomas R. Peltier
Pewaukee, Wisconsin, USA
Demonstrating how mobile devices can create a backdoor to security threats, this book details actions that can be taken to defend against these threats. It defines the concepts essential to understanding the security threats to contemporary mobile devices, and takes readers through the policy, process, and technology decisions that must be made. Highlighting the risks inherent when mobilizing data, the text supplies a proven methodology for identifying, analyzing, and evaluating these risks. It examines the methods used to store and transport mobile data and illustrates how the security of data changes as it moves from place to place. Catalog no. K11063, June 2010, 302 pp. ISBN: 978-1-4398-2016-2, $69.95 / £46.99
Thomas R. Peltier Associates, Wyandotte, Michigan, USA
Authored by renowned security expert and certification instructor Thomas Peltier, this authoritative reference provides readers with the knowledge and the skill-set needed to achieve a highly effective risk analysis assessment in a matter of days. Peltier demonstrates how to identify threats and then determine if those threats pose a real risk. Supplemented with online access to user-friendly checklists, forms, questionnaires, sample assessments, and other documents, this work is truly a one-stop, how-to resource for industry and academia professionals. The book includes sample forms, controls, policies, letters, and spreadsheets needed to complete the risk analysis and assessment processes. Catalog no. K11810, March 2010, 456 pp. ISBN: 978-1-4398-3956-0, $83.95 / £52.99 Also available as an eBook
40
Save when you order online at www.crcpress.com
Security and Homeland Security Private Security and the Investigative Process
Intelligent Video Surveillance
Third Edition
Systems and Technology
Charles P. Nemeth
Edited by
John Jay College of Criminal Justice, New York, New York, USA
Yunqian Ma Honeywell International, Inc., Golden Valley, Minnesota, USA
Catalog no. AU8569 February 2010, 352 pp. ISBN: 978-1-4200-8569-3, $76.95 / £48.99
Gang Qian
Also available as an eBook
Arizona State University, Tempe, USA
Catalog no. K10681 December 2009, 590 pp. ISBN: 978-1-4398-1328-7, $129.95 / £82.99 Also available as an eBook
Risk Analysis and Security Countermeasure Selection Thomas L. Norman, CPP/PSP/CSC Protection Partners International, Houston, Texas, USA
Catalog no. AU7870 December 2009, 422 pp. ISBN: 978-1-4200-7870-1, $69.95 / £44.99 Also available as an eBook
Airport and Aviation Security U.S. Policy and Strategy in the Age of Global Terrorism Bartholomew Elias U.S. Congressional Research Service, Washington, DC, USA
Catalog no. AU7029 September 2009, 439 pp. ISBN: 978-1-4200-7029-3, $91.95 / £58.99 Also available as an eBook
Managing Security Overseas Protecting Employees and Assets in Volatile Regions Scott Alan Ast Security Professional, Olathe, Kansas, USA
Catalog no. K10256 August 2009, 366 pp. ISBN: 978-1-4398-0467-4, $91.95 / £58.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
41
Security and Homeland Security Port Security Management Kenneth Christopher Park University, Parkville, Missouri, USA
Catalog no. AU6892 March 2009, 336 pp. ISBN: 978-1-4200-6892-4 $99.95 / £64.99 Also available as an eBook
Lloyd's MIU Handbook of Maritime Security Edited by
Rupert Herbert-Burns, Sam Bateman, and Peter Lehr Catalog no. AU5480 September 2008, 400 pp. ISBN: 978-1-4200-5480-4, $99.95 / £64.99 Also available as an eBook
Kidnap for Ransom
Intelligent Network Video
Resolving the Unthinkable
Understanding Modern Video Surveillance Systems
Richard P. Wright Wright Security, Inc., Manassas, Virginia, USA
Fredrik Nilsson and Axis Communications Inc.
Catalog no. AU0075 January 2009, 240 pp. ISBN: 978-1-4200-8007-0, $91.95 / £58.99
Chelmsford, Massachusetts, USA
Also available as an eBook
Also available as an eBook
Aviation and Airport Security Terrorism and Safety Concerns, Second Edition Kathleen Sweet
The Complete Guide for CPP Examination Preparation James P. Muuss, CPP Reliant Protective Services Inc., Phoenix, Arizona, USA
West Fork, Arkansas, USA
Catalog no. AU8165 December 2008, 384 pp. ISBN: 978-1-4200-8816-8, $91.95 / £58.99 Also available as an eBook
Catalog no. AU6156 September 2008, 416 pp. ISBN: 978-1-4200-6156-7, $93.95 / £59.99
David Rabern, CPP International Counterintelligence Services, Scottsdale, Arizona, USA
Catalog no. 2896 June 2006, 592 pp. ISBN: 978-0-8493-2896-1, $99.95 / £62.99 Also available as an eBook
42
Save when you order online at www.crcpress.com
6000 Broken Sound Parkway, NW, Suite 300 Boca Raton, FL 33487, USA
Page 12
Page 24
For a complete list of all of our Homeland Security books, please visit www.crcpress.com
Page 3