Карточка | Таблица | RUSMARC | |
Homeland security series (Lanham, Md.).
|
Права на использование объекта хранения
Место доступа | Группа пользователей | Действие | ||||
---|---|---|---|---|---|---|
Локальная сеть Финуниверситета | Все | |||||
Интернет | Читатели | |||||
Интернет | Анонимные пользователи |
Оглавление
- Cover
- Commercial Facilities Protection and Homeland Security
- Commercial Facilities Protection and Homeland Security
- Copyright page
- Contents
- Acronyms and Abbreviations
- To the Reader
- Preface
- Prologue
- Chapter 1
- Introduction
- Setting the Stage
- Sector Overview
- CS SECTOR GOALS, PRIORITIES, AND ACTIVITIES
- BENCHMARKING
- THE BOTTOM LINE
- References and Recommended Reading
- Chapter 2
- Sector Profile
- INTRODUCTION
- KEY SECTOR OPERATING CHARACTERISTICS
- COMMERICIAL SERVICES SECTOR SNAPSHOT
- SECTOR COMPONENTS AND ASSETS
- References and Recommended Reading
- Chapter 3
- Resilience Measurement Index
- INTRODUCTION
- THE 411 ON THE RMI
- RISK, VULNERABILITY, AND RESILIENCE
- RMI METHODOLOGY
- REFERENCES AND RECOMMENDED READING
- Chapter 4
- Active Shooters
- IS AN ACTIVE SHOOTER A TERRORIST?
- SELECT ACTIVE SHOOTER INCIDENTS IN THE COMMERCE SECTOR FROM 2000 to 2017
- REFERENCES AND RECOMMENDED READING
- Chapter 5
- Critical Infrastructure Security and Resilience
- MR. GRASSHOPPER AND MR. RABBIT
- INTRODUCTION
- CS SECTOR SECURITY GOALS AND ATTRIBUTES
- HOMELAND SECURITY DIRECTIVES
- ASSESSING CHALLENGES
- ASSESSING CONSEQUENCES
- REFERENCES AND RECOMMENDED READING
- Chapter 6
- Vulnerability Assessment (VA)
- INTRODUCTION
- ASSESSING VULNERABILITIES
- INSIDER THREAT VULNERABILITY
- THE VULNERABILITY ASSESSMENT
- VA METHODOLOGY
- VA PROCEDURES
- VULNERABILITY ASSESSMENT: CHECKLIST PROCEDURE
- REFERENCES AND RECOMMENDED READING
- Chapter 7
- Preparation
- INTRODUCTION
- THREATS AND INCIDENTS
- Response to Threats
- Preparation
- THE BOTTOM LINE
- REFERENCES AND RECOMMENDED READING
- Chapter 8
- Cybersecurity
- INTRODUCTION
- CYBERSPACE
- THE BOTTOM LINE
- REFERENCES AND RECOMMENDED READING.
- Chapter 9
- Emergency Response
- CS SECTOR CONTINGENCY PLANNING
- CRISIS COMMUNICATIONS PLAN
- THE BOTTOM LINE
- REFERENCES AND RECOMMENDED READING
- Chapter 10
- Security Techniques and Hardware
- SHOPPING IN THE BRICK AND MOTAR STORE
- THE MULTIPLE BARRIER APPROACH
- SECURITY HARDWARE DEVICES
- COMMUNICATION INTEGRATION
- CYBER PROTECTION DEVICES
- REFERENCES AND RECOMMENDED READING
- Chapter 11
- The Paradigm Shift
- Fourteen Features of Active and Effective Security
- References and Recommended Reading
- Glossary
- Index
Статистика использования
Количество обращений: 0
За последние 30 дней: 0 Подробная статистика |