語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
The science and technology of counte...
~
Young, Carl S.
FindBook
Google Book
Amazon
博客來
The science and technology of counterterrorism = measuring physical and electronic security risk /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
The science and technology of counterterrorism/ Carl S. Young.
其他題名:
measuring physical and electronic security risk /
作者:
Young, Carl S.
出版者:
Burlington :Elsevier Science, : 2015.,
面頁冊數:
1 online resource (513 p.).
內容註:
Front Cover; The Science and Technology of Counterterrorism: Measuring Physical and Electronic Security Risk; Copyright; Dedication; Contents; Acknowledgments; About the Author; Preface; Part I: Modeling Terrorism Risk; Chapter 1: Terrorism Threats, Risk, and Risk Assessments; 1.1. Introduction: Decisions and Risk; 1.2. Threats and the Components of Risk; 1.3. Risk Assessments; 1.4. Security Risk Trade-Offs; 1.5. Security Risk in Context; 1.6. Risk Factors; 1.7. Counterterrorism Controls; 1.8. Counterterrorism Methods; 1.9. Operational Requirements; 1.10. Performance Specifications.
內容註:
1.11. Security Risk Assessment Frameworks, Security Standards, and Security Risk MetricsSummary; References; Problems; Chapter 2: Organizing and Assessing Terrorism Risk; 2.1. A Taxonomy of Terrorism Threats; 2.2. Counterterrorism Standards and Risk Metrics; 2.3. The Cost of Risk Mitigation; 2.4. Medical Analogies; 2.5. Simple Risk Assessments; 2.6. Security Theatre; Summary; References; Problems; Chapter 3: Uncertainty and Terrorism; 3.1. Introduction; 3.2. Uncertainty, Entropy, and Randomness; 3.3. The Normal Distribution; 3.4. Uncertainty Applied to Terrorism; Summary; References; Problems.
內容註:
Chapter 4: Physical Models of Terrorism4.1. Introduction; 4.2. Point Sources of Radiation; 4.3. Exponential Growth and Decay; 4.4. Harmonic Motion and the Single Degree of Freedom Model; 4.5. Gaussian Plumes[1]; Summary; Reference; Problems; Chapter 5: Exploiting Terrorism Uncertainty; 5.1. Introduction: Addressing Terrorism Risk Factors; 5.2. Risk Factor-Related Incidents; Indirect Measurements of Security Risk; 5.3. The "Probability of Protection" Method; 5.3.1. The Minimum Number of Required Security Officers; 5.3.2. Explosive Blasts and the Probability of Window Protection.
內容註:
5.4. The Probability of Protection Method Summary5.5. Physical Access Control System Risk Statistics; Summary; Reference; Problems; Part 2: Measuring Terrorism Risk; Chapter 6: Conventional Explosive Threats and Risk Mitigation; 6.1. Introduction; 6.2. Applying the Single Degree of Freedom Model; 6.3. Explosive Overpressure and Impulse Parametric Scaling; 6.4. Blast Effects: A Qualitative Description; 6.5. The Effects of Distance and Payload; 6.6. Vehicle-Borne Explosives; 6.7. Vehicle-Borne Explosive Risk: A Simple Calculation; 6.8. Barriers and Bollards; 6.9. Assessing Bollard Effectiveness.
內容註:
6.10. Antiblast Film6.11. Explosive Detection; 6.12. X-Ray Inspection Technology; 6.13. The Dangling Crane: Terror Without Terrorists; Summary; References; Problems; Chapter 7: Nontraditional Terrorist Threats and Risk Mitigation; 7.1. Introduction; 7.2. Radiological Dispersion Devices (RDDs); 7.2.1. The RDD as a Weapon; 7.2.2. Dentists, Bananas, and the Natural Radiation Background; 7.2.3. Radioisotopes as Weapons; 7.2.4. Radioactive Flux, Absorption, and Shielding; 7.2.4.1. Radioactive Flux; 7.2.4.2. Radioactive Absorption; 7.2.4.3. Radioactive Absorption in Human Tissue.
標題:
Terrorism - Prevention. -
電子資源:
https://www.sciencedirect.com/science/book/9780124200562
ISBN:
9780124200616 (electronic bk.)
The science and technology of counterterrorism = measuring physical and electronic security risk /
Young, Carl S.
The science and technology of counterterrorism
measuring physical and electronic security risk /[electronic resource] :Carl S. Young. - Burlington :Elsevier Science,2015. - 1 online resource (513 p.).
Includes bibliographical references and index.
Front Cover; The Science and Technology of Counterterrorism: Measuring Physical and Electronic Security Risk; Copyright; Dedication; Contents; Acknowledgments; About the Author; Preface; Part I: Modeling Terrorism Risk; Chapter 1: Terrorism Threats, Risk, and Risk Assessments; 1.1. Introduction: Decisions and Risk; 1.2. Threats and the Components of Risk; 1.3. Risk Assessments; 1.4. Security Risk Trade-Offs; 1.5. Security Risk in Context; 1.6. Risk Factors; 1.7. Counterterrorism Controls; 1.8. Counterterrorism Methods; 1.9. Operational Requirements; 1.10. Performance Specifications.
Scientists with little or no background in security and security professionals with little or no background in science and technology often have difficulty communicating in order to implement the best counterterrorism strategies. The Science and Technology of Counterterrorism offers the necessary theoretical foundation to address real-world terrorism scenarios, effectively bridging the gap. It provides a powerful security assessment methodology, coupled with counterterrorism strategies that are applicable to all terrorism attack vectors. These include biological, chemical, radiological, electromagnetic, explosive, and electronic or cyber attacks. In addition to rigorous estimates of threat vulnerabilities and the effectiveness of risk mitigation, it provides meaningful terrorism risk metrics.
ISBN: 9780124200616 (electronic bk.)
LCCN: 2013043384Subjects--Topical Terms:
588483
Terrorism
--Prevention.Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: HV6433 .E85
Dewey Class. No.: 363.3
The science and technology of counterterrorism = measuring physical and electronic security risk /
LDR
:04933cmm a2200349 a 4500
001
2223570
006
o d
007
cnu|unuuu||
008
210114s2015 vtu ob 001 0 eng d
010
$a
2013043384
020
$a
9780124200616 (electronic bk.)
020
$a
0124200613 (electronic bk.)
020
$a
9780124200562
020
$a
0124200567
035
$a
(OCoLC)871780938
035
$a
EL2020300
040
$a
MHW
$b
eng
$c
MHW
$d
EBLCP
$d
OPELS
$d
N$T
$d
OCLCQ
$d
OCLCO
$d
OCLCF
$d
OCLCQ
$d
YDXCP
$d
B24X7
$d
DEBSZ
$d
OCLCQ
$d
MERUC
$d
OCLCQ
$d
U3W
$d
D6H
$d
OTZ
$d
AU@
$d
OCLCQ
$d
WYU
$d
VT2
$d
C6I
$d
OCLCQ
$d
VLB
$d
OCL
041
0
$a
eng
050
4
$a
HV6433 .E85
050
1 4
$a
HV6431
$b
.Y68 2015
082
0 4
$a
363.3
$a
363.32094
100
1
$a
Young, Carl S.
$3
3463171
245
1 4
$a
The science and technology of counterterrorism
$h
[electronic resource] :
$b
measuring physical and electronic security risk /
$c
Carl S. Young.
260
$a
Burlington :
$b
Elsevier Science,
$c
2015.
300
$a
1 online resource (513 p.).
504
$a
Includes bibliographical references and index.
505
0
$a
Front Cover; The Science and Technology of Counterterrorism: Measuring Physical and Electronic Security Risk; Copyright; Dedication; Contents; Acknowledgments; About the Author; Preface; Part I: Modeling Terrorism Risk; Chapter 1: Terrorism Threats, Risk, and Risk Assessments; 1.1. Introduction: Decisions and Risk; 1.2. Threats and the Components of Risk; 1.3. Risk Assessments; 1.4. Security Risk Trade-Offs; 1.5. Security Risk in Context; 1.6. Risk Factors; 1.7. Counterterrorism Controls; 1.8. Counterterrorism Methods; 1.9. Operational Requirements; 1.10. Performance Specifications.
505
8
$a
1.11. Security Risk Assessment Frameworks, Security Standards, and Security Risk MetricsSummary; References; Problems; Chapter 2: Organizing and Assessing Terrorism Risk; 2.1. A Taxonomy of Terrorism Threats; 2.2. Counterterrorism Standards and Risk Metrics; 2.3. The Cost of Risk Mitigation; 2.4. Medical Analogies; 2.5. Simple Risk Assessments; 2.6. Security Theatre; Summary; References; Problems; Chapter 3: Uncertainty and Terrorism; 3.1. Introduction; 3.2. Uncertainty, Entropy, and Randomness; 3.3. The Normal Distribution; 3.4. Uncertainty Applied to Terrorism; Summary; References; Problems.
505
8
$a
Chapter 4: Physical Models of Terrorism4.1. Introduction; 4.2. Point Sources of Radiation; 4.3. Exponential Growth and Decay; 4.4. Harmonic Motion and the Single Degree of Freedom Model; 4.5. Gaussian Plumes[1]; Summary; Reference; Problems; Chapter 5: Exploiting Terrorism Uncertainty; 5.1. Introduction: Addressing Terrorism Risk Factors; 5.2. Risk Factor-Related Incidents; Indirect Measurements of Security Risk; 5.3. The "Probability of Protection" Method; 5.3.1. The Minimum Number of Required Security Officers; 5.3.2. Explosive Blasts and the Probability of Window Protection.
505
8
$a
5.4. The Probability of Protection Method Summary5.5. Physical Access Control System Risk Statistics; Summary; Reference; Problems; Part 2: Measuring Terrorism Risk; Chapter 6: Conventional Explosive Threats and Risk Mitigation; 6.1. Introduction; 6.2. Applying the Single Degree of Freedom Model; 6.3. Explosive Overpressure and Impulse Parametric Scaling; 6.4. Blast Effects: A Qualitative Description; 6.5. The Effects of Distance and Payload; 6.6. Vehicle-Borne Explosives; 6.7. Vehicle-Borne Explosive Risk: A Simple Calculation; 6.8. Barriers and Bollards; 6.9. Assessing Bollard Effectiveness.
505
8
$a
6.10. Antiblast Film6.11. Explosive Detection; 6.12. X-Ray Inspection Technology; 6.13. The Dangling Crane: Terror Without Terrorists; Summary; References; Problems; Chapter 7: Nontraditional Terrorist Threats and Risk Mitigation; 7.1. Introduction; 7.2. Radiological Dispersion Devices (RDDs); 7.2.1. The RDD as a Weapon; 7.2.2. Dentists, Bananas, and the Natural Radiation Background; 7.2.3. Radioisotopes as Weapons; 7.2.4. Radioactive Flux, Absorption, and Shielding; 7.2.4.1. Radioactive Flux; 7.2.4.2. Radioactive Absorption; 7.2.4.3. Radioactive Absorption in Human Tissue.
520
$a
Scientists with little or no background in security and security professionals with little or no background in science and technology often have difficulty communicating in order to implement the best counterterrorism strategies. The Science and Technology of Counterterrorism offers the necessary theoretical foundation to address real-world terrorism scenarios, effectively bridging the gap. It provides a powerful security assessment methodology, coupled with counterterrorism strategies that are applicable to all terrorism attack vectors. These include biological, chemical, radiological, electromagnetic, explosive, and electronic or cyber attacks. In addition to rigorous estimates of threat vulnerabilities and the effectiveness of risk mitigation, it provides meaningful terrorism risk metrics.
588
0
$a
Print version record.
650
0
$a
Terrorism
$x
Prevention.
$3
588483
650
0
$a
Terrorism
$x
Prevention
$x
Technological innovations.
$3
875412
650
0
$a
Computer security.
$3
540555
650
0
$a
Risk management.
$3
540477
650
0
$a
Security systems.
$3
767564
655
4
$a
Electronic books.
$2
lcsh
$3
542853
856
4 0
$u
https://www.sciencedirect.com/science/book/9780124200562
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9396101
電子資源
11.線上閱覽_V
電子書
EB HV6433 .E85 .Y68 2015
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入