Homeland Security

Page 1


Contents Counterterrorism ..............................................3 Disaster Planning & Recovery ..........................6 Emergency Response ......................................10 General ..........................................................12 Page 13

Page 20

Security Management ....................................15

Page 7

Page 9

Want to maximize your buying power? Order direct from our online store and

Receive FREE Standard Shipping Page 5

with every order big or small.

Visit us at

www.crcpress.com

to view more information and complete tables of contents for these and many other related books.

MBCHSM0 MC_4/1210gtr

Page 3


Counterterrorism Advances in Biological and Chemical Terrorism Countermeasures Edited by

Ronald J. Kendall, Steven M. Presley, Galen P. Austin, and Philip N. Smith Texas Tech University, Lubbock, USA

Includes 16-Page Color Insert with Tables, Illustrations, & Diagrams

Critical Infrastructure Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies Tyson Macaulay CISSIP, CISA, ISSPCS, Ottawa, Ontario, Canada

Emphasizes the U.S. & Canada

Based on the findings of a multidisciplinary toxicology research program, this book explores improved methods of implementing countermeasures to biological and chemical terrorism. The authors focus on modeling, simulation, and visualization; environmental protection; personal protection and therapeutics; and the mechanistic and toxic effects of weapons.

Moving beyond definitions, this volume looks at the iron triangle within critical infrastructures: power, telecom, and finance. It introduces the concept of CIs as industrial and enterprise risk conductors, highlighting the fact that a CI failure can propagate an impact throughout an enterprise. This text rethinks the concept of a CI according to contemporary factors, providing guidance for mitigating risk within the framework of national economies.

Catalog no. 7654X, 2008, 304 pp. ISBN: 978-1-4200-7654-7, $135.95 / £86.00 $115.56 / £73.10

Catalog no. AU6835, 2009, 344 pp. ISBN: 978-1-4200-6835-1, $83.95 / £52.99 $71.36 / £45.04

NEW!

Data Mining for Intelligence, Fraud and Criminal Detection

Border Security in the Al-Qaeda Era Edited by

John A. Winterdyk and Kelly W. Sundberg Mount Royal College, Calgary, Canada

Covers Border Security in Nine Countries Providing an overview of how al-Qaeda and other terrorist groups have impacted the way nations protect their borders, this book examines border security organizations in the U.S., Canada, UK, France, Germany, Italy, Australia, Austria, and Iran. Each chapter includes a review of each nation’s border security, a discussion of the impact of changes in security, the steps taken to protect the country, and an assessment of whether or not the al-Qaeda threat has contributed to those changes. Catalog no. 85441, January 2010, 344 pp. ISBN: 978-1-4200-8544-0, $89.95 / £54.99 $76.46 / £46.74

Advanced Analytics & Information Sharing Technologies Christopher Westphal CEO, Visual Analytics, Frederick, Maryland, USA

Provides All the Steps & Information Needed to Implement Complex Analytical Systems “… this book should be mandatory reading for every crime analyst. I’ve seen a lot of this info before, but never in one place before nor with the level of explanation and examples.” —Michael P. Ley, Antiterrorism Officer (ATO) & Intelligence Coordinator, U.S. Marine Corps Support Facility-Blount Island, Jacksonville, Florida, USA

Catalog no. AU6723, 2009, 440 pp. ISBN: 978-1-4200-6723-1, $73.95 / £46.99 $62.86 / £39.94

For more information and complete contents, visit www.crcpress.com

3


Counterterrorism NEW EDITION!

NEW!

Drug Interdiction

Philippine Security in the Age of Terror

Partnerships, Legal Principles, and Investigative Methodologies for Law Enforcement, Second Edition

National, Regional, and Global Challenges in the Post-9/11 World Rommel C. Banlaoi

George S. Steffen Pinellas County Sheriff’s Office, Largo, Florida, USA

Samuel M. Candelaria Albuquerque Police Department, New Mexico, USA

Conveys How to Use Business Partnerships to Assist Law Enforcement in Identifying Potential Violators Exploring issues that confront today’s drug interdiction officer, this book explains how to initiate specific domestic drug interdiction programs. It examines consensual encounters, drug canines, and interdictions involving trains, buses, airports, rental vehicles, hotels, storage units, and parcel systems. It also discusses currency seizures, report writing, and courtroom testimony. Each chapter includes relevant case law that supports the protocol described. Catalog no. 9176X, April 2010, 320 pp. ISBN: 978-1-4200-9176-2, $99.95 / £63.99 $84.96 / £54.39

Jihadists and Weapons of Mass Destruction

Philippine Institute for Political Violence and Terrorism Research, Pasig City

Examining government response to terrorist threats, this rigorously revised and updated handbook and policy guide begins with Filipinospecific issues, including politics and national identity, globalization, and local and military security. Part Two covers bilateral security issues involving China, Australia, and the US. Part Three examines selected global, regional, and multilateral issues including maritime security, piracy, and the ASEAN Regional Forum. Catalog no. K10796, January 2010, 376 pp. ISBN: 978-1-4398-1550-2, $89.95 / £57.99 $76.46 / £49.29

NEW EDITION!

Science and Technology of Terrorism and Counterterrorism Second Edition

Edited by

Edited by

Gary Ackerman

Tushar K. Ghosh, Mark A. Prelas, Dabir S. Viswanath, and Sudarshan K. Loyalka

University of Maryland, College Park, USA

Jeremy Tamsett

University of Missouri, Columbia, USA

Center for Terrorism & Intelligence Studies, San Jose, California, USA

Discusses the Nature of Terrorism & the Materials Used by Terrorists

“… a detailed, well-thought-out analysis of the situation as it exists today and is intended for the serious reader or researcher.”

—Books-On-Line

“… provides an overview of nonproliferation policies designed to keep WMD out of the hands of jihadists, conducts a groundbreaking quantitative empirical analysis of jihadist behavior, and includes leading experts’ estimates of the future WMD threat from jihadists.” —ASIS International

Catalog no. AU6964, 2009, 494 pp. ISBN: 978-1-4200-6964-8, $79.95 / £49.99 $57.96 / £42.49

4

Taking into account practical considerations, this text describes how intelligence professionals and law enforcement personnel can detect and destroy terrorist materials and how they can confront terrorist groups. After exploring the origin and nature of terrorism, the book goes on to examine bioterrorism and agricultural, nuclear, chemical, and cyber-terrorism. It also discusses personal protective equipment, and the role of government and international agencies. Catalog no. AU7181, January 2010, 604 pp. ISBN: 978-1-4200-7181-8, $99.95 / £60.99 $84.96 / £51.84

Get 15% off when you order online at www.crcpress.com


Counterterrorism

The War on Terrorism A Collision of Values, Strategies, and Societies Thomas A. Johnson University of New Haven, Connecticut, USA

Terrorist Recognition Handbook A Practitioner’s Manual for Predicting and Identifying Terrorist Activities, Second Edition Malcolm W. Nance Executive Director, International Anti-Terrorism Center for Excellence, USA

Nance is a 20-Year Veteran of the U.S. Intelligence Community “... extraordinarily valuable and perhaps the definitive text on terrorist recognition….” —Ben Rothke, CISSP, PCI QSA, Senior Security Consultant, NY Metro / BT Global Services, in Slashdot.org

“ … highly recommended for those in charge of security and community library military collections.” —The Midwest Book Review

“ … Malcolm Nance has acquired a level of understanding that surpasses that of many senior government officials … an excellent introduction to terrorist methodologies for both vigilant first responders and personnel who are preparing for deployment.” —Chris Graham in The Counter Terrorist

“… This outstanding book is replete with useful charts, case studies, diagrams, and information valuable in every aspect of security or counterterrorism programs from individual training, exercises, and red teaming, to the response to a real-world attack. If you bear any responsibility, direct or indirect, for protecting people and property against terrorist attack, you should read this book.” —Col. Christopher G. Essig in Security Management

Catalog no. AU7183, 2008, 480 pp., Soft Cover, ISBN: 978-1-4200-7183-2, $62.95 / £40.99 $53.51 / £34.84 Visit the book’s website at ittoday.info/catalog/Nance.htm

Describes Roles of All 16 U.S. Intelligence Agencies Confronting the possible collapse of societies and the potential for religious warfare, this book provides a thought-provoking discussion of terrorism and the clash of civilizations. The text analyzes counter-terrorism control strategies and terrorist ideology. A look at the role of the intelligence community in the collection and analysis of data provides important information for shaping national security policy. Catalog no. 79875, 2009, 392 pp. ISBN: 978-1-4200-7987-6, $83.95 / £52.99 $71.36 / £45.04

Violence Assessment and Intervention The Practitioner’s Handbook, Second Edition James S. Cawood Factor One, Inc., San Leandro, California, USA

Michael H. Corcoran The Work-Threat Group, LLC, Newport Beach, California, USA

Grounded in the Authors’ Experience of Successfully Managing Thousands of Cases This practical handbook provides a precise methodology for analyzing potential threat situations and taking immediate action. It begins with the initial call and proceeds through the steps that determine the appropriate response. It covers information gathering, victimology, and formulas and tools for risk assessment, while also exploring organizational influences, ethics, security and consultation issues, and laws related to violence risk assessment. Catalog no. 71122, 2009, 392 pp. ISBN: 978-1-4200-7112-2, $89.95 / £57.99 $76.46 / £49.29

For more information and complete contents, visit www.crcpress.com

5


Disaster Planning & Recovery Building Vulnerability Assessments Industrial Hygiene and Engineering Concepts Edited by

Martha Boss and Dennis W. Day URS Corporation, Omaha, Nebraska, USA

Chemical, biological, and radioactive (CBR) threats are generally only recognized after a catastrophic event such as terrorism or sabotage occurs. However, many buildings and facilities throughout the world already have these current known risk factors. Presenting structural vulnerability issues in a concise format, this resource aids building owners and operators in quickly determining appropriate risk management during normal operation and when emergencies occur. Catalog no. 78348, 2009, 436 pp. ISBN: 978-1-4200-7834-3, $99.95 / £63.99 $84.96 / £54.39

Business Resumption Planning Second Edition Edited by

Leo A. Wrobel TelLAWCom Labs, Inc., Ovilla, Texas, USA

Includes CD with Worksheets & Audit Forms Offering practical advice along with templates, checklists, and directions to public domain information, Leo Wrobel assists in creating a solid disaster response and recovery plan for any size organization – including ground zero events. Presenting methods for the implementation and maintenance of infrastructure continuity planning, he offers updated techniques for conducting an impact analysis and computing the probability of a disaster. He also discusses the Sarbanes-Oxley act. Catalog no. AU1459, 2009, 512 pp. ISBN: 978-0-8493-1459-9, $94.95 / £60.99 $80.71 / £51.84

6

Communicating Emergency Preparedness Strategies for Creating a Disaster Resilient Public Damon P. Coppola Bullock and Haddow, LLC, Reston, Virginia, USA

Erin K. Maloney Michigan State University, East Lansing, USA

Includes Examples of Successful Programs An examination of pre-disaster awareness communication, this volume provides an overview and history of public disaster preparedness education and then proceeds to explore risk management and the development of a campaign strategy. It includes specific instruction on how those charged with developing these programs can obtain funding from donors, foundations, and government grants. The book includes case studies which identify various public awareness campaigns that have been successfully conducted in different communities. Features • Historical facts and figures about public awareness and preparedness campaigns and their influence on behavior • Step-by-step instruction on planning and conducting a public education effort • Case studies that clearly illustrate what works and what doesn’t Abridged Contents* Public Disaster Preparedness: In Theory and In Practice. Managing Risk, Emergencies, and Disasters. The Campaign—Step 1: Early Planning. Step 2: Develop a Campaign Strategy. Campaign Implementation and Evaluation. Program Support. Emergency Management Public Education Case Studies. Appendix: Websites and Downloadable Guides Found on the Internet. *Complete contents available at www.crcpress.com.

Catalog no. AU6510, 2009, 264 pp. ISBN: 978-1-4200-6510-7, $69.95 / £42.99 $59.46 / £36.54

Get 15% off when you order online at www.crcpress.com


Disaster Planning & Recovery NEW EDITION!

NEW!

Critical Infrastructure

Disaster Management

Homeland Security and Emergency Preparedness, Second Edition

Rajib Shaw

Robert Radvanovsky CIPS, Infracritical, Geneva, Illinois, USA

Allan McDougall Evolutionary Security Management Inc., Arnprior, Ontario, Canada

Keeping pace with changes in laws and policies made by the Department of Homeland Security, this new edition continues to provide an invaluable resource for emergency managers, disaster response professionals, safety officials, and those involved with maintaining infrastructure. It adds information to reflect the development of the Incident Command System (ICS) and the total revision of National Response Plan (NRP), which were implemented in 2008.

Global Problems and Local Solutions Graduate School of Global Environmental Studies, Kyoto University, Japan

R.R. Krishnamurthy Department of Applied Geology, University of Madras, Chennai, India

While a global perspective of disaster management is necessary, it is also important to emphasize local solutions. This volume targets some of the key issues of disaster management on the local level, focusing on innovative research and applications. An up-to-date reference book for researchers and practitioners, this text explores different types of hazards and disasters and examines the interrelated themes of risk and vulnerability, technology, education, and community. Catalog no. N10107, January 2010, 608 pp. ISBN: 978-1-4398-1430-7, $99.95 / £63.99 $84.96 / £54.39

Catalog no. AU9527, January 2010, 318 pp. ISBN: 978-1-4200-9527-2, $99.95 / £63.99 $84.96 / £54.39

Disaster Management Handbook Edited by

Disaster Recovery

Jack Pinkowski

Brenda D. Phillips

Nova Southeastern University, Fort Lauderdale, Florida, USA

Oklahoma State University, Stillwater, USA

Discusses How to Rebuild Stronger, More Resilient Communities An analytical critique of the multidisciplinary issues involved in anticipating and rebuilding from disasters, this book introduces the theoretical constructs and conceptual foundations of disaster management. Contributors examine case studies of natural disasters around the world, and compare and contrast the efficacy of different management strategies from national, provincial, and local governments, as well as non-governmental agencies. Catalog no. AU5862, 2008, 624 pp. ISBN: 978-1-4200-5862-8, $99.95 / £66.99 $84.96 / £56.94

This core text tackles the myriad recovery issues faced by federal, state, and local emergency managers in a long-term disaster recovery situation. Topics include recovery planning, housing, debris management, public and private sector recovery, and historical and cultural preservation. The author also discusses environmental recovery, social and psychological recovery and services, voluntary organizations, federal assistance programs, grant-writing, and donations management. Each chapter features key terms, learning objectives, highlighted practical applications, review questions, a summary, and references. Catalog no. AU7420, 2009, 546 pp. ISBN: 978-1-4200-7420-8, $69.95 / £42.99 $59.46 / £36.54

For more information and complete contents, visit www.crcpress.com

7


Disaster Planning & Recovery Global Warming, Natural Hazards, and Emergency Management Edited by

Jane A. Bullock and George D. Haddow

NEW!

Bullock and Haddow, LLC, Reston, Virginia, USA

GIS in Hospital and Healthcare Emergency Management Ric Skinner, GISP

Kim S. Haddow Sierra Club, Washington, D.C., USA

Provides a Clear Procedural Roadmap for Emergency Managers, Policy Makers, & Community Officials

The Stonybrook Group, LLC, Sturbridge, Massachusetts, USA

“... belongs on every emergency manager’s bookshelf.” —Angela Devlen, Co-Founder Business Continuity Planning Workgroup for Healthcare Organizations

“... deserves a place of prominence on the shelves of all those concerned with health/GIS, emergency preparedness, hospital management, and public health response systems.” —Omar A. Khan, American Public Health Association (APHA)

“… should be required reading for every emergency manager.” —Hal Newman, Managing Partner, TEMS

“… takes a bold leap into operationalizing the importance of GIS in all four phases of disaster: preparedness, response, mitigation and recovery for hospitals and healthcare.“ —James L. Paturas, LP, CEM, CBCP, FACCP, Deputy Director, Yale New Haven Center for Emergency Preparedness and Disaster Response

“… Ric Skinner is the real deal, one of America’s best minds on the subject of pragmatic GIS applications.“ —John J Shaw, DMD, Program Director, (Hartford, CT) Capitol Region Metropolitan Medical Response System, and Chair, RESF 8, Capitol Region Emergency Planning Committee

Catalog no. K11128, April 2010, 279 pp. ISBN: 978-1-4398-2129-9, $99.95 / £63.99 $84.96 / £54.39

“The book’s case study of flooding in Tulsa, Oklahoma, is particularly instructive of the tenacity and long-term political involvement needed to deal thoroughly with even the most obvious and universally acknowledged hazard… offers a wide variety of additional resources on climate change and hazards….“ –Natural Hazards Observer

Catalog no. AU1829, 2009, 304 pp., Soft Cover, ISBN: 978-1-4200-8182-4, $62.95 / £40.99 $53.51 / £34.84

Natural Hazards Analysis Reducing the Impact of Disasters John C. Pine Appalachian State University, Boone, North Carolina, USA

Covers Every Step, from Planning to Recovery Response With an emphasis on hazard analysis, this volume assesses critical preparedness issues that emergency personnel must face in the event of a natural or man-made disaster. The author discusses the nature and consequences of such hazards and examines strategies at the individual, organization, community, and regional levels. He presents a systematic process for hazards identification, vulnerability determination, and consequence assessment for natural, built, and human environments. Catalog no. AU7038, 2009, 304 pp. ISBN: 978-1-4200-7038-5, $83.95 / £52.99 $71.36 / £45.04

8

Get 15% off when you order online at www.crcpress.com


Disaster Planning & Recovery

NEW!

The Human Side of Disaster Thomas E. Drabek

Pandemic Influenza Emergency Planning and Community Preparedness Edited by

Jeffrey R. Ryan Institute for Emergency Preparedness, Jacksonville State University, Alabama, USA

“… The graphs, photos, glossaries, resource lists, and tables… make this a handy manual for both emergency management professionals and laypeople.” —K.H. Jacobsen, George Mason University, in CHOICE

“... targeted primarily at public health planners involved in preparing community responses to the next influenza pandemic. … covers some of the less documented and less understood aspects of pandemic planning. … will improve [planners’] ability to inform communities and businesses to ‘fight back’ when the ‘big one’ hits.” —Alex J. Elliot, Real-Time Syndromic Surveillance Team, Health Protection Agency West Midlands–Regional Surveillance Unit, Birmingham, West Midlands, UK, in CID

Outlines the Containment & Response Capabilities Needed to Effectively Plan & Prepare for a Widespread Outbreak Addressing clinical factors and public health challenges, the authors examine critical issues such as the types of influenza (including H1N1) and related health implications, outbreak prevention and mass prophylactic measures, medical supply and fatality management, response actions for various emergency service disciplines, and the potential economic effects of a pandemic outbreak. Mirroring the goals of the U.S. National Strategy for Pandemic Influenza, the text underscores the importance of expanding the health care system’s capacity to provide adequate triage and medical care.

University of Denver, Colorado, USA

“… the culmination of a career-long quest to translate decades of research findings to students, emergency management professionals, and the general population. … [Drabek] has succeeded with a style of writing that is personal, non-technical, and highly informative.” —Gary Kreps, The College of William and Mary Visit our website to see how you can adopt this book for classroom use.

Catalog no. K10428, January 2010, 288 pp. ISBN: 978-1-4398-0864-1, $59.95 / £38.99 $50.96 / £33.14

Transportation Systems Security Allan McDougall Evolutionary Security Management Inc., Arnprior, Ontario, Canada

Robert Radvanovsky CIPS, Infracritical, Geneva, Illinois, USA

This comprehensive text presents strategic, practical, and operational applications for the physical, procedural, and psychological safeguards that are needed to secure all modes of transportation. Topics include performance issues, risk assessment, drills, compliance, and shared information. Each chapter features questions and case scenarios, and a fictitious company is used to demonstrate theoretical concepts. Catalog no. 63782, 2008, 280 pp. ISBN: 978-1-4200-6378-3, $73.95 / £46.99 $62.86 / £39.94

Catalog no. 60872, 2009, 280 pp. ISBN: 978-1-4200-6087-4, $73.95 / £46.99 $62.86 / £39.94

For more information and complete contents, visit www.crcpress.com

9


Emergency Response

COMING SOON!

Cross-Training for First Responders Gregory S. Bennett Helmetta, New Jersey, USA

Covering exercises, training curricula, and costeffective recommendations, this manual prepares first responders to face multiple threats from multiple sources. Applying the concept of cross-training to round out skill-sets, it prepares these diverse outfits to assist each other and overcome traditional philosophical and logistical boundaries. Through table-top scenarios, case examples, and discussion of common sticking points, this innovative book enables response professionals and practitioners to be more effective and better equipped in the face of increased threats and threat potential from multi-faceted disaster scenarios. Features: • Provides additional training for each of the responder communities to support the basic training received • Offers response agency decision-makers with low cost and federally funded training alternatives • Presents “tabletop” scenarios and case examples in which multiple agencies and disciplines can apply their training and expand their skill sets • Illustrates the benefits of cross-training to iron out philosophical and logistical differences • Addresses certain issues among stake-holders within the community that may hinder a cohesive response in-crisis Catalog no. K11295, June 2010, c. 279 pp. ISBN: 978-1-4398-2653-9, $69.95 / £44.99 $59.46 / £38.24

10

Field Confirmation Testing for Suspicious Substances Rick Houghton Consultant, Saint Johns, Michigan, USA

Use Precision Testing To Confirm the Identity of Hazardous Materials Divided into three sections, the book begins by exploring physical confirmation tests which use methods that involve measurement of temperature, vapor density, radioactivity, and other factors. The author then examines chemical confirmation tests suitable for field use, providing over 400 different analyses, most of which provide a colorimetric result. The book also includes a section on instrumentation. It offers an overview of the technologies used to analyze materials and presents the strengths and weaknesses of the technology so that the corresponding weak or strong result can be used in the overall analysis. The appendix provides two detailed sections on drug and explosives tests. A Complete Range of Testing Protocols The tests in this book can immediately generate valuable information in the field which can be used to save lives, conserve property, provide environmental protection, and assist law enforcement in apprehending those responsible for disseminating hazardous substances. Features: • Provides a system of field tests using commonly available equipment, reagents, and instrumentation to confirm or deny the purported identity of a substance • Introduces proven tests that take readers through the process of analysis • Includes illustrations and commonplace examples that aid understanding of principles • Supplies crossing references by both test and target compound for easy use during testing Catalog no. 86154, 2009, 453 pp. ISBN: 978-1-4200-8615-7, $139.95 / £85.00 $118.96 / £72.25

Get 15% off when you order online at www.crcpress.com


Emergency Response Medical Disaster Response A Survival Guide for Hospitals in Mass Casualty Events Edited by

David Goldschmitt and Robert Bonvino New York Downtown Hospital, USA

Addresses the Critical Medical Planning & Response Issues Involved in a Mass Casualty Disaster Before, During, & After the Event This book presents a comprehensive medical disaster management plan that provides readers with a framework to develop individual policies to suit their particular institution. It offers a powerful and unique case example through a chronology of the events of September 11th, offering a firsthand account and insight into the quintessential test case for disaster response effectiveness. Catalog no. 61224, 2009, 864 pp. ISBN: 978-1-4200-6122-2, $99.95 / £60.99 $84.96 / £51.84

NEW!

Radiation Threats and Your Safety

NEW!

Social Vulnerability to Disasters Edited by

Brenda D. Phillips, Deborah S.K. Thomas, Alice Fothergill, and Lynn Blinn-Pike Based on materials developed for the FEMA Higher Education Project, this book explores how vulnerable social groups cope with hazardous events. The authors examine historical, geographical, social, and cultural factors that threaten people before, during, and after disasters.

Features: • Details deficiencies in current disaster preparedness plans and policies for special needs and vulnerable populations • Presents practical information on buidling community-based disaster resiliency • Provides insights into the life cycle of emergency management including preparedness, planning, response, recovery, and mitigation Abridged Contents*

A Guide to Preparation and Response for Professionals and Community Armin Ansari Centers for Disease Control and Prevention, Atlanta, Georgia, USA

“… efficiently presents a lot of valuable information in understandable terms. … very useful ….” —Richard J. Martin, J.D.

“I found it to be a great resource … for the non-radiation expert.” —Adela Salame-Alfie, Ph.D., New York State Department of Health

Catalog no. C8361, January 2010, 344 pp. ISBN: 978-1-4200-8361-3, $69.95 / £44.99 $59.46 / £38.24

Understanding Social Vulnerability. Theoretical Framing of Worldviews, Values, and Structural Dimensions of Disasters. The Intrinsic Link of Vulnerability to Sustainable Development. Class. Race and Ethnicity. Gender. Age. Disability. Health. Language and Literacy. Households. Violence and Disaster Vulnerability. Nature of Human Communities. Measuring and Conveying Social Vulnerability. New Ideas for Practitioners. Promoting Empowerment: Social Change in Disasters. *Complete contents available at www.crcpress.com. Ancillary education materials available with qualifying course adoption

Catalog no. AU7856, January 2010, 406 pp. ISBN: 978-1-4200-7856-5, $69.95 / £44.99 $59.46 / £38.24

For more information and complete contents, visit www.crcpress.com

11


General

NEW!

Airport and Aviation Security

Aviation and Airport Security

U.S. Policy and Strategy in the Age of Global Terrorism

Terrorism and Safety Concerns, Second Edition

Bartholomew Elias

Kathleen Sweet

U.S. Congressional Research Service, Washington, DC, USA

University of Maryland, College Park, USA

Strategic Approaches to Strengthening Aviation Security Beginning with a historical backdrop describing the dawn of the age of global terrorism in the 1960s and continuing up until the present time, this volume demonstrates the broad social and political context underlying the aviation security system that was in place on September 11th and the system that has evolved in response to those attacks. Examining ongoing threats and vulnerabilities, the book describes how they have come to shape U.S. policy and strategy. Topics discussed include legislation, intelligence gathering, best practices for risk management, in-flight security measures, and passenger, baggage, and employee screening methods. Addressing the homeland security challenges facing the U.S. in the age of terrorism, this text explores: • • • • • • • • • • •

Security protocol prior to 9/11 Precursors to 9/11 The rising threat of Al Qaeda Tactical and congressional response to 9/11, including new legislation The broader context of risk assessment Intelligence gathering Airport security, including passenger, baggage, and employee screening Airline in-flight security measures Airport perimeter security The threat of shoulder-fired missiles Security for GA (general aviation) operations and airports

Catalog no. AU7029, January 2010, 439 pp. ISBN: 978-1-4200-7029-3, $79.95 / £49.99 $67.96 / £42.49

12

The Definitive Handbook on Terrorist Threats to Commercial Airline & Airport Security USAF Lieutenant Colonel Kathleen Sweet’s seminal resource is now updated to include an analysis of modern day risks. She covers the history of aviation security and compares current in-flight security practices with those of other countries. Covering Transportation Security Administration changes in security, policy, and training since 9/11, this reference discusses several aviation terrorist incidents, determines how security considerations are factored into business processes, and offers extensive background information on various terrorist groups. Features • Discusses a broad range of terrorist incidents • Considers aviation security in the present geopolitical climate • Addresses cargo and passenger security • Determines how security considerations are factored into business processes • Details new regulations for the TSA • Documents the history of aviation security • Includes extensive background information on various terrorist groups Visit our website for information on adopting this resource for classroom use.

Catalog no. AU8165, 2009, 384 pp. ISBN: 978-1-4200-8816-8, $81.95 / £51.99 $69.67 / £44.19

Get 15% off when you order online at www.crcpress.com


General Homeland Security and Private Sector Business Corporations’ Role in Critical Infrastructure Protection Elsa Lee Advantages SCI, El Segundo, California, USA

“… Elsa Lee provides not only a wise manual for homeland security, but a commentary on the painful counter-terror road the States has taken since 9/11.” —Mark Rowe in Professional Security

Using helpful case studies and exercises, this book presents invaluable instruction on how to establish, implement, and reinforce terrorism awareness and readiness while maintaining regulatory compliance with national critical infrastructure interests. It reviews threat factors, risk mitigation, readiness plans, prevention approaches, human factors, and training methods. Catalog no. AU7078, 2009, 264 pp. ISBN: 978-1-4200-7078-1, $83.95 / £52.99 $71.36 / £45.04

NEW!

Homeland Security An Introduction to Principles and Practice Charles P. Nemeth Chair and Professor of Legal Studies, Homeland Security and Criminal Justice at California University of Pennsylvania, USA

Authored by a respected pioneer in homeland security education, this text fills the need for an objective resource on the DHS. Briefly touching on DHS history, Charles Nemeth focuses on the identity, organization, and mission of the department and its security initiatives as they are being defined by recent trends and policies. Free from agenda, the book offers insight into the roles of multi-jurisdictional agencies and various stakeholders, including law enforcement, the military, the intelligence community, emergency managers, and the private sector. Abridged Contents

Homeland Security Handbook Edited by

Jack Pinkowski Nova Southeastern University, Fort Lauderdale, Florida, USA

Taking a sober, analytical look at policies, results, and lessons learned, this comprehensive reference combines theory and practice to address concerns in border and transportation security, emergency preparedness and response, science and technology, information analysis, and infrastructure protection. Presenting practical, reasoned arguments, it reviews both global and specific threats, case studies, expert advice, and the economic cost and fallout of homeland security. Catalog no. AU7926, 2008, 480 pp. ISBN: 978-0-8493-7926-0, $99.95 / £66.99 $84.96 / £56.94

The Idea and Origin of Homeland Security. Terror, Threat, and Disaster Post-9/11: A New Paradigm of Homeland Security. Homeland Security Law, Regulations, and Budgeting. Risk Management, Threats, and Hazards. Training and Exercises in Homeland Security. DHS Challenges: National vs. State and Local, National Security vs. Homeland Security. FEMA, Response and Recovery. Intelligence. Border Security, U.S. Citizenship and Immigration Services. Transportation Security. Homeland Security and Public Health. The Future of Homeland Security. Notes. Appendices. Ancillary material including PowerPoint® slides and an instructor’s manual with test bank questions are available for those instructors wishing to adopt this resource for classroom use

Catalog no. AU8567, January 2010, 542 pp. ISBN: 978-1-4200-8567-9, $69.95 / £44.99 $59.46 / £38.24

For more information and complete contents, visit www.crcpress.com

13


General Lloyd’s MIU Handbook of Maritime Security Edited by

Rupert Herbert-Burns Lloyd’s MIU, London, UK

Sam Bateman Centre for Maritime Policy, University of Wollongong, Australia

Peter Lehr School of International Relations, St. Andrews, Scotland

“… offers an important collection of thoroughlyresearched and impressive essays that examine a diverse range of maritime security concerns. … of interest to all, whether commercial, legal, military or governmental, in ensuring the security of the world’s shipping, ports, and sea lanes of communication.” —Admiral Sir Mark Stanhope KCB OBE, Commander-in-Chief Fleet

“… strongly recommended to those involved in policy making on security issues, students of maritime affairs and industry professionals.” —Ambassador Barry Desker, Dean, S. Rajaratnam School of International Studies, Nanyang Technological University, Singapore

Catalog no. AU5480, 2009, 400 pp. ISBN: 978-1-4200-5480-4, $94.95 / £60.99 $80.71 / £51.84

Terrorism and Homeland Security Thinking Strategically About Policy Edited by

Paul Viotti and Michael Opheim University of Denver, Colorado, USA

Nicholas Bowen Brooklyn, New York, USA

Since the Department of Homeland Security (DHS) was established, it has remained a workin-progress. This volume examines the strategy that characterized the DHS’s first five years. It includes contributions from top military, international relations, and security experts. A variety of issues are addressed, including nuclear terrorism, WMDs, military force vs. diplomacy, and intelligence as a means of countering terrorism. It examines preventive measures and explores the delicate balance between national security and the protection of privacy and civil liberties. Offering original writings from top military, policy, and security professionals, this seminal work:

Port Security Management Kenneth Christopher Park University, Parkville, Missouri, USA

Focusing on organizational structure, risk and vulnerability analysis, and operations oversight, this book explores security management in the port facility environment. Reflecting both the needs of business and homeland safety, the book addresses the ground-level issues that must be managed by security managers in concert with port directors and law enforcement. It also addresses cargo security, personnel security, guard force management, and the role of technology.

• Provides a critique of the initial creation and recent developments in DHS • Discusses views on prevention, and the creation of a prudent global policy that balances military force and diplomacy, including the use of intelligence as a means to counter terrorism • Considers preparedness for man-made and natural disasters, as well as for terrorism Catalog no. AU7773, 2008, 352 pp., Soft Cover ISBN: 978-1-4200-7773-5, $62.95 / £40.99 $53.51 / £34.84

Catalog no. AU6892, 2009, 336 pp. ISBN: 978-1-4200-6892-4, $89.95 / £54.99 $76.46 / £46.74

14

Get 15% off when you order online at www.crcpress.com


Security Management NEW!

Building an Enterprise-Wide Business Continuity Program Kelley Okolita

21st Century Security and CPTED Designing for Critical Infrastructure Protection and Crime Prevention Randall I. Atlas Atlas Safety and Security Design, Inc., Fort Lauderdale, Florida, USA

Apply Real-World Concepts, Principles, & Processes for Building Security & CPTED Offering an important answer to concerns about violence and terrorism, this book examines trends in the developing field of Crime Prevention through Environmental Design (CPTED). It includes contributions from the world’s top practitioners. Highly relevant to critical infrastructure protection, the book addresses application of CPTED to high-security environments, as well as public and private sector buildings. Facilitating understanding across fields, it serves as a practical guide for architects, security directors, law enforcement, Homeland Security professionals, and building and property managers, as well as criminal justice, architecture, and security students. Features:

MBCP (Master Business Continuity Planner), Worcester, Massachusetts, USA

Sell Your Continuity Program to Senior Leadership Drawing on over two decades of experience creating continuity plans and using them in actual recoveries, Kelley Okolita goes beyond theory to provide planners with the tools needed to build a continuity program in any enterprise. The book offers guidance on each step of the process, including how to validate the plan, time-tested tips for keeping the plan actionready over the course of time, and how to sell the program to senior leadership. Catalog no. AU8645, January 2010, 344 pp. ISBN: 978-1-4200-8864-9, $79.95 / £49.99 $67.96 / £42.49

How to Develop and Implement a Security Master Plan Timothy D. Giles Newnan, Georgia, USA

• Presents a definitive collection of CPTED writings from the most knowledgeable CPTED practitioners in the world today • Outlines contemporary national building security codes, best practices, and standards of care in private and public buildings • Includes sample security and real-world applications of CPTED theory and practice • Examines architectural surety from the perspective of risk analysis and liability • Explores next generation CPTED practices based on emerging security and safety concerns and trends • Provides more than 400 photos along with diagrams, tables, and checklists

“This practical guide details how to construct a customized, comprehensive, five-year corporate security plan that synchronizes with the strategies of any business or institution.”

Catalog no. AU6807, 2008, 560 pp. ISBN: 978-1-4200-6807-8, $94.95 / £60.99 $80.71 / £51.84

Catalog no. AU6251, 2009, 352 pp. ISBN: 978-1-4200-8625-6, $83.95 / £52.99 $71.36 / £45.04

—ASIS Dynamics

Written for corporation security officers, this work is designed to help them garner executive support and increased funding for their security programs. It provides a thorough understanding of the Security Master Planning process, explaining how to develop appropriate risk mitigation strategies, and how to focus on both effectiveness and efficiency while conducting a site security assessment.

For more information and complete contents, visit www.crcpress.com

15


Security Management

BESTSELLER!

NEW!

Intelligent Network Video

Intelligent Video Surveillance

Understanding Modern Video Surveillance Systems

Systems and Technology

Fredrik Nilsson and Communications Axis

Edited by

Axis Communications Inc., Chelmsford, Massachusetts, USA

Yunqian Ma

“… the first complete reference for developing, implanting, and maintaining the latest surveillance systems … Nilsson guides readers through a wellorganized tour of the building blocks of modern video surveillance systems, including network cameras, video encoders, storage, servers, sensors, and video management.” —ASIS Dynamics

Features • Covers advanced digital networking, intelligent video capabilities, and optimization in detail • Provides specifications on MPEG-4 and other digital video formats • Includes a checklist for designing a network video system and a systems design tool on DVD

Honeywell International, Inc., Minnesota, USA

Gang Qian Arizona State University, Tempe, USA

From streets in London to subway stations in New York City, hundreds of thousands of surveillance cameras are constantly collecting videos. The latest implementation of surveillance cameras calls for advanced video systems that can autonomously recognize people, detect movements, and identify targeted activities in real-time. In response to such demand, this book examines the fundamental principles of current intelligent video surveillance systems. The text provides a comprehensive look at the algorithmic design and system implementation for intelligent video surveillance. The authors cover computational principles, system implementation issues, and practical applications of present and future systems.

Contents

Features

The Evolution of Video Surveillance Systems. The Components of Network Video. Network Cameras. Camera Technologies. Video Compression Technologies. Audio Technologies. Video Encoders. Wired Networks. Wireless Networks. Networking Technology. Servers and Storage. Video Management. Intelligent Video. Intelligent Video Applications. System Design Considerations. The Cost of a Network Video System.

• Addresses cutting-edge advances in intelligent video design and intelligent functions being incorporated into digital video surveillance systems • Details the algorithms and technical underpinnings of the technology • Covers implementation, application, and implications for future capabilities • Includes examples of successful, real-world applications of intelligent video technologies

Catalog no. AU6156, 2009, 416 pp. ISBN: 978-1-4200-6156-7, $83.95 / £52.99 $71.36 / £45.04

16

Catalog no. K10681, January 2010, 590 pp. ISBN: 978-1-4398-1328-7, $119.95 / £72.99 $101.96 / £62.04

Get 15% off when you order online at www.crcpress.com


Security Management

Introduction to Executive Protection Second Edition Dale L. June Henley-Putnam University, California, USA

NEW!

“… a must for your library; the perspective is unmistakenly American … updated to cover emerging threats including suicide bombers. … comprehensive with a number of useful appendices including advance party checklists. …this is an excellent book ….” —Baron James Shortt of Castleshort, Director General, Law Enforcement or Security, Ireland

Exploring the psychology, philosophy, and professionalism of the modern close personal protection agent, the author uses the real-life experiences of veterans in the field to highlight key considerations that will take security and protection into the future. Catalog no. 43455, 2008, 480 pp. ISBN: 978-1-4200-4345-7, $89.95 / £57.99 $76.46 / £49.29

Kidnap for Ransom Resolving the Unthinkable Richard P. Wright Wright Security, Inc., Manassas, Virginia, USA

“… extensive case histories … examines the kidnap for ransom phenomenon and reveals the process from the moment of abduction until the victim’s safe return. … an invaluable tool for those charged with kidnap prevention as well as for law enforcement agents mitigating the potential consequences of an abduction in progress.” —ASIS Dynamics

Catalog no. AU0075, 2009, 240 pp. ISBN: 978-1-4200-8007-0, $79.95 / £48.99 $67.96 / £42.49

Managing Security Overseas Protecting Employees and Assets in Volatile Regions Scott Alan Ast Security Professional, Olathe, Kansas, USA

Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBIrecognized subject matter expert, this text details the recommended protocol for protecting people and assets in hostile global settings. Scott Alan Ast offers wisdom and insight gleaned from 28 years of hands-on experience in international security management. He supplies the fundamental understanding and advanced tools required to ensure business is conducted safely regardless of the risk level, identifying the various threats that loom in international projects, and walking readers through a logical framework to design and implement a safety and security program. Providing a blueprint for establishing a safety and security program, this book explains how to: • Identify the risks (natural and man-made), liabilities, and security threats to employees and assets outside of the country • Create pre-deployment training programs to provide personnel with resources to keep them safe • Establish policies, procedures, programs, and technologies for locating employees at a moment’s notice • Gear programs toward employees who do not feel the need to be protected • Develop crisis management and security plans for overseas projects • Liaison with foreign law enforcement, government agencies and militaries Catalog no. K10256, January 2010, 366 pp. ISBN: 978-1-4398-0467-4, $79.95 / £49.99 $67.96 / £42.49

For more information and complete contents, visit www.crcpress.com

17


Security Management

NEW EDITION!

NEW!

Private Security and the Investigative Process

Risk Analysis and Security Countermeasure Selection

Third Edition

Thomas L. Norman, CPP/PSP/CSC

Charles P. Nemeth

Protection Partners International, Houston, Texas USA

Chair and Professor of Legal Studies, Homeland Security and Criminal Justice at California University of Pennsylvania, USA

Details the Five Core Principles of the Risk Analysis Lifecycle

Detailing best practice techniques and trade secrets for private sector security investigations, Private Security and the Investigative Process, Third Edition provides complete coverage of the investigative process. Fully updated, this edition covers emerging technology, revised legal and practical considerations for conducting interviews, and new information on case evaluation. Written by a recognized expert in security, criminal justice, ethics, and the law, this updated edition covers concepts and techniques that can be applied to a variety of investigations including fraud, insurance, private, and criminal. It details the collection and preservation of evidence, the handling of witnesses, surveillance techniques, background investigations, and report writing. Features • Provides modern investigative concepts and ways to utilize the latest surveillance technologies in investigative processes • Establishes procedures by which investigations should be conducted and the standards to which investigators should hold themselves • Outlines time-tested methodologies and strategies for use in a variety of investigative scenarios including insurance fraud, theft, internal corporate, and private investigations

Using easy-to-understand language, this volume explains how to evaluate the appropriateness of countermeasures from a cost effectiveness perspective. It details the five core principles of the risk analysis lifecycle through the use of numerous case illustrations that guide readers from basic principles to complex processes. This complete resource includes an adaptable graphic risk analysis tool that readers can apply in public or private industry. Features • Details the 5 core principles of the risk analysis lifecycle • Evaluates all DHS-approved risk assessment methods, including Carver, Carver + Shock, RAMCAP, and various Sandia methodologies • Explains why terrorism threats require a unique risk assessment model • Presents a risk analysis methodology applicable to public and private industry, as well as critical infrastructure • Introduces a user-friendly graphic risk analysis tool that can be adapted to most situations Catalog no. AU7870, January 2010, 422 pp. ISBN: 978-1-4200-7870-1, $59.95 / £38.99 $50.96 / £33.14

Visit our website for information on adopting this reference for classroom use.

Catalog no. AU8569, February 2010, 352 pp. ISBN: 978-1-4200-8569-3, $69.95 / £44.99 $59.46 / £38.24

18

Get 15% off when you order online at www.crcpress.com


Security Management

NEW!

NEW!

Security Manager’s Guide to Disasters

Targeted Violence

Managing Through Emergencies, Violence, and Other Workplace Threats Anthony D. Manley Wantagh, New York, USA

Whether the cause of a disaster is a terrorist or criminal attack, fire emergency, civil or geographic disruption, or major electrical or electronic failure, security professionals must be aware of how such a crisis would affect all they are employed to protect. This volume examines the most significant emergencies that may confront the security, business continuity, or risk manager in the protection of people, property, the prevention of crime, and in the avoidance of liability. The book includes ways to prevent or reduce the severity of the incident, suggests how to properly interact with governmental agencies, and provides managers with a system for stabilization, recovery, and restoration. Features • Examines the fundamental role and need for disaster and emergency management policies and procedures • Presents an array of various types of natural disasters and man-made events that can occur • Provides a framework for successfully confronting each and every one of these occurrences • Offers instruction on the recovery and restoration of the business enterprise

A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings Glenn P. McGovern Santa Clara County District Attorney’s Office, Bureau of Investigation, San Jose, California, USA

Drawn from case examples spanning the past 60 years, this book examines incidents of targeted violence, including contract killings, assassinations, and planned kidnappings. Complete with 35 case studies, the text explores numerous attack methodologies employed around the world and regionally. The author, a former SWAT and JTTF team member, analyzes the modus operandi of individual assailants and groups to highlight the commonalities between targeted victims and why certain groups tend to target specific types of individuals. The book concludes with a chapter on victimology. Abridged Contents Chronology of Attacks. Global Statistics. Attack Methodology. Attack Locations. Methods of Operation. Victimology. Case Studies of Attacks on Motorcades. Case Studies of Attacks on Pedestrians. Conclusion. Bibliography. Catalog no. K11195, April 2010, 331 pp. ISBN: 978-1-4398-2512-9, $89.95 / £57.99 $76.46 / £49.29

Catalog no. K10448, January 2010, 408 pp. ISBN: 978-1-4398-0906-8, $99.95 / £60.99 $84.96 / £51.84

For more information and complete contents, visit www.crcpress.com

19


Security Management NEW!

The Elements of Private Investigation An Introduction to the Law, Techniques, and Procedures Anthony Manley Wantagh, New York, USA

NEW!

Terrorism and Public Safety Policing Implications for the Obama Presidency James F. Pastor Securelaw Ltd., Chicago, Illinois, USA

Complete with Supporting Statistics, Graphics, and Photos Merging public policy analysis with an understanding of human nature, this volume examines the current state of policing and reviews recent events to identify troublesome trends and potential vulnerabilities that must be addressed. The text introduces a new model of policing that accounts for the changes already underway and offers an organized and provocative response to the new breed of problems on the horizon.

Catalog no. K10791, January 2010, 448 pp. ISBN: 978-1-4398-1542-7, $79.95 / £49.99 $67.96 / £42.49

Threat Assessment and Management Strategies Identifying the Howlers and Hunters

Features • Analyzes contemporary circumstances in relation to the current policing model • Explains and illustrates systematic change taking place in extremist mindsets and the attendant consequences of such • Examines current events and trends to identify potential public safety implications • Provides a road map for avoiding the difficulties related to large-scale ideological movements • Proposes a series of recommendations relating to important decisions that must be made, including balancing the fundamental principles of security and privacy rights Catalog no. K10810, January 2010, 480 pp. ISBN: 978-1-4398-1580-9, $79.95 / £49.99 $67.96 / £42.49

20

Today’s litigious society puts investigators at greater risk than ever before as they confront a multitude of rules, requirements, and civil and criminal laws that impact what they can and cannot do in the performance of their job. This comprehensive resource provides current guidelines and best practices on private investigations for investigators, loss prevention officers, and security professionals. The text covers interviewing, interrogation, covert operations, wiretaps, criminal investigations, liability, and privacy rights.

Frederick S. Calhoun Threat Management Consultant, Arlington, Virginia, USA

Steve W. Weston California Highway Patrol, Sacramento, USA

Knowledge of the individuals involved is a crucial factor in any threat management process. This book helps those who interact with questionable populations to identify problem behaviors and associate these behaviors with either hunters (those who truly intend violence) or howlers (those who intend only to threaten or draw attention to themselves). Through case studies and analyses, the book explains the best practices for assessing problem individuals and recommends the optimal response and management strategy. Catalog no. 87312, 2009, 216 pp., Soft Cover ISBN: 978-1-4200-8731-4, $73.95 / £46.99 $59.16 / £39.94

Get 15% off when you order online at www.crcpress.com


Security Management

REVISED AND EXPANDED!

NEW!

Understanding Surveillance Technologies

Vein Pattern Recognition

Spy Devices, Privacy, History, & Applications, Revised and Expanded Second Edition J.K. Petersen Computer Consultant, Writer, Educator, Bellingham, Washington, USA

This volume reflects developments in aerial, radio, and telecommunications that affect government, local security, and corporations. It features information on RFID chips, face recognition systems, U.S. Department of Homeland Security initiatives and legislation, mass surveillance methods, voiceover IP technology, higher resolution satellite images, radar imaging, and privacy issues. Additional material includes forensic methods of chemical detection of blood and fingerprints as well as DNA surveillance and portable DNA kits. Profusely illustrated with extensive references and indexes, the book lays the groundwork for more specialized study on specific technologies.

Features • Reflects developments in strategies, policies, and legislation in national, local, and private security • Discusses hotly debated personal security and privacy issues regarding mass surveillance strategies • Covers RFID identification chips, cell phones with GPS systems, computerized methods for scientific imaging with radar, and Voice over IP (VoIP) • Discusses DNA surveillance and portable DNA detection kits • Includes a free downloadable curriculum guide to the website for further information and instruction

A Privacy-Enhancing Biometric Chuck Wilson Director, Identity Verification Business Practice, ii2P, Southlake, Texas, USA

“... provides a clear road map for the past, present, and future of biometrics ... a practical guide to biometrics in a clear and easy to understand form, even for nontechnicians. This thoroughly researched book covers the main technologies in use today and explains the principles of operation and appropriate uses of each. For the technically oriented reader, it provides significant details for each system. However, it is not simply a technical reference, but also a guide for the practitioner or even the average person who is interested in understanding the field. ... Read this book and get a glimpse of how bright the future can be if we are all empowered rather than encumbered by technology.” —Kevin R. Walsh, Senior Vice President R&D, Oracle Corporation, Asia Pacific Division

Accessible Guide to Biometric Systems & VPR Exploring privacy issues and the general concept of personal identity, this book delves into realworld biometrics applications and discusses the emergence of this reliable but underutilized technology. The author, Chuck Wilson, an industry veteran with more than 25 years of experience in the biometric and electronic security fields, introduces the myriad applications of VPA technology and its current implementations— including its widespread use in the Japanese banking industry for accessing cardholder accounts. Catalog no. K11132, March 2010, 307 pp. ISBN: 978-1-4398-2137-4, $79.95 / £49.99 $67.96 / £42.49

Catalog no. AU8319, 2007, 1024 pp. ISBN: 978-0-8493-8319-9, $109.95 / £69.99 $93.46 / £55.99

For more information and complete contents, visit www.crcpress.com

21


From The Editor

If you are looking for books on private sector security, investigations, electronic security systems, Homeland Security, emergency planning and preparedness, disaster management, terrorism and counterterrorism, transportation security, and critical infrastructure protection—well, you’ve come to the right place. We are the leading publisher of books on topics you won’t find from any other publisher—books that cover securing property and assets as well as those that address safety, protection, and welfare of every citizen, both through security measures as well as emergency management planning and preparedness operations. Our books are written by top experts who are experienced in the field. We have a variety of titles geared to all levels, from introductory textbooks for classroom use to advanced topic resources for the professional. Our goal is to be your one-stop shop—THE publisher—for valuable textbook and reference resources that will serve you throughout your career. We value you as a customer and would love to hear your feedback. Prospective authors with book ideas are urged to e-mail me at mark.listewnik@ taylorandfrancis.com for author guidelines on how to get started on a project. Thank you for your business, and thank you for choosing CRC Press.

Mark Listewnik Senior Editor Security, Homeland Security, and Emergency Management

22

Get 15% off when you order online at www.crcpress.com



SAVE 15%!

Use this Promo Code when ordering to

6000 Broken Sound Parkway, NW, Suite 300 Boca Raton, FL 33487, USA

Page 13

Page 18

For a complete list of Security, Homeland Security, & Emergency Management books, please visit www.crcpress.com

Page 11

Presorted Standard US Postage PAID Permit 382 South Holland IL


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.