Homeland Security

195 Results


Subject


Status


Type

Per Page:
Sort:
Transnational Security

Transnational Security

Marie-Helen Maras

October 09, 2014

Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Preventing transnational security threats has proven to be a very difficult challenge for governments and institutions around the world. Transnational Security...

Neurotechnology in National Security and Defense: Practical Considerations, Neuroethical Concerns

Neurotechnology in National Security and Defense: Practical Considerations, Neuroethical Concerns

James Giordano

September 25, 2014

Neurotechnology in National Security and Defense: Practical Considerations, Neuroethical Concerns is the second volume in the Advances in Neurotechnology series. It specifically addresses the neuroethical, legal, and social issues arising from the use of neurotechnology in national security and...

Non-Imaging Microwave and Millimetre-Wave Sensors for Concealed Object Detection

Non-Imaging Microwave and Millimetre-Wave Sensors for Concealed Object Detection

Boris Y. Kapilevich, Stuart W. Harmer, Nicholas J. Bowring

September 17, 2014

In response to the ever-increasing global threat of terrorist attacks, the personal screening industry has been growing at a rapid rate. Many methods have been developed for detecting concealed weapons and explosives on the human body. In this important new book, the authors discuss their...

Hazards Analysis: Reducing the Impact of Disasters, Second Edition

Hazards Analysis: Reducing the Impact of Disasters, Second Edition

John C. Pine

September 10, 2014

The impacts of natural and man-made disasters have increased exponentially over the past few decades. Moreover, with our global interconnectedness and the growing scale of disasters, today's catastrophic disasters can have regional, national, and even global economic consequences.Following in the...

Introduction to Crowd Science

Introduction to Crowd Science

G. Keith Still

June 30, 2014

Demonstrates Real-World Case Studies from a Range of Event Sites Introduction to Crowd Science examines the growing rate of crowd-related accidents and incidents around the world. Using tools, methods, and worked examples gleaned from over 20 years of experience, this text provides an...

Port Security Management, Second Edition

Port Security Management, Second Edition

Kenneth Christopher

June 20, 2014

Sea and freshwater ports are a key component of critical infrastructure and essential for maintaining global and domestic economies. In order to effectively secure a dynamic port facility operation, one must understand the business of maritime commerce. Following in the tradition of its bestselling...

Risk Assessment and Security for Pipelines, Tunnels, and Underground Rail and Transit Operations

Risk Assessment and Security for Pipelines, Tunnels, and Underground Rail and Transit Operations

Anna M. Doro-on

June 03, 2014

Risk Assessment and Security for Pipelines, Tunnels, and Underground Rail and Transit Operations details a quantitative risk assessment methodology for systematically analyzing various alternatives for protecting underground rail, oil and gas pipelines, pipeline freight transportation, and other...

Crime Scene Investigation Procedural Guide

Crime Scene Investigation Procedural Guide

Michael S. Maloney, Donald Housman, Ross M. Gardner

May 14, 2014

Those tasked with investigating crime scenes come from a variety of backgrounds and varying levels of experience. Crime Scene Investigation Procedural Guide gives the novice investigator the procedures for almost any crime scene imaginable while providing the seasoned pro a ready reference for...

Breaking Al-Qaeda: Psychological and Operational Techniques, Second Edition

Breaking Al-Qaeda: Psychological and Operational Techniques, Second Edition

Elena Mastors

May 12, 2014

Breaking Al-Qaeda: Psychological and Operational Techniques, Second Edition explores the background and history of al-Qaeda, covers recent developments, and explains how, why, and where the al-Qaeda network is expanding. The author examines the current state of the terrorist network and describes...

Conducting Network Penetration and Espionage in a Global Environment

Conducting Network Penetration and Espionage in a Global Environment

Bruce Middleton

April 28, 2014

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer...

Physical Security and Environmental Protection

Physical Security and Environmental Protection

John Perdikaris

April 22, 2014

Manage a Hazard or Threat Effectively and Prevent It from Becoming a Disaster When disaster strikes, it can present challenges to those caught off guard, leaving them to cope with the fallout. Adopting a risk management approach to addressing threats, vulnerability, and risk assessments is...

Crisis and Emergency Management: Theory and Practice, Second Edition

Crisis and Emergency Management: Theory and Practice, Second Edition

Ali Farazmand

March 25, 2014

More than 12 years have passed since the publication of the first edition of Crisis and Emergency Management. During that time numerous disasters—from 9/11 to massive earthquakes in Iran and China, to the giant Asian Tsunami, Hurricane Katrina, and the Fukushima Tsunami and ensuing nuclear...