,

Surveillance and Threat Detection

Prevention versus Mitigation

Specificaties
Gebonden, blz. | Engels
Elsevier Science | 2014
ISBN13: 9780124077805
Rubricering
Elsevier Science e druk, 2014 9780124077805
€ 75,34
Levertijd ongeveer 9 werkdagen
Gratis verzonden

Samenvatting

Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.

Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs.

Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, fixed site facility can be integrated into an overall security footprint for any organization.

Specificaties

ISBN13:9780124077805
Taal:Engels
Bindwijze:Gebonden

Inhoudsopgave

<p>Preface</p> <p>Section I: Introduction</p> <p>Chapter 1: Definitions</p> <p>Chapter 2 Scope </p> <p>Chapter 3 Use Case Assumptions</p> <p>Chapter 4 Executive Summary of the Surveillance and Threat Detection Methodology</p> <p>Section 2: Overview and Understanding</p> <p>Chapter 5 Historical Overview of Surveillance, Counter Surveillance, and Surveillance Detection</p> <p>Chapter 6 The Terrorist Attack Cycle</p> <p>Section 3: Case Studies</p> <p>Chapter 7 Criminals</p> <p>Chapter 8 Terrorists</p> <p>Section 4: Conducting Surveillance Detection</p> <p>Chapter 9 The Basics</p> <p>Section 5: Advanced Surveillance and Threat Detection Applications</p> <p>Chapter 10 Infusion of Surveillance Detection into Current Operations</p> <p>Chapter 11 Incorporation of Video Technology</p> <p>Chapter 12 Surveillance Detection Training</p> <p>Chapter 13 Surveillance Detection on the Horizon</p> <p>Chapter 14 Surveillance Detection over the Horizon</p> <p>Appendices</p>
€ 75,34
Levertijd ongeveer 9 werkdagen
Gratis verzonden

Rubrieken

    Personen

      Trefwoorden

        Surveillance and Threat Detection