Homeland Security

Counterterrorism

Per Page:
Sort:

New Developments in Biological and Chemical Terrorism Countermeasures

Featured

Ronald J. Kendall, Steven M. Presley, Seshadri S. Ramkumar
February 17, 2016

A science-based text, New Developments in Biological and Chemical Terrorism Countermeasures presents research that addresses the growing threat of chemical and biological terrorism as well as the need for improvements in the implementation of countermeasures. This new textbook building upon Advances...

Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level

Florian Skopik
October 11, 2017

Threat intelligence is a surprisingly complex topic that goes far beyond the obvious technical challenges of collecting, modelling and sharing technical indicators. Most books in this area focus mainly on technical measures to harden a system based on threat intel data and limit their scope to...

Private Security: An Introduction to Principles and Practice

Charles P. Nemeth
September 25, 2017

There are few textbooks available that outline the foundation of security principles while reflecting the modern practices of private security as an industry. Private Security: An Introduction to Principles and Practice takes a new approach to the subject of private sector security that will be...

Terrorism and Organized Hate Crime: Intelligence Gathering, Analysis and Investigations, Fourth Edition

Michael R. Ronczkowski
August 29, 2017

The ability of law enforcement agencies to manage and act upon intelligence is the key to countering terrorism. Likewise, a critical foundation of intelligence-led policing is the proper analysis of all information gained. Terrorism and Organized Hate Crime: Intelligence Gathering, Analysis, and...

Practical Bomb Scene Investigation, Third Edition

James T. Thurman
July 18, 2017

Now in its Third Edition, Practical Bomb Scene Investigation explores the investigative process that improvised explosive device (IED) specialists undertake at the scene of an explosion. Providing easy-to-understand, step-by-step procedures for managing and processing a bomb scene, it enables...

A History of Cyber Security Attacks: 1980 to Present

Bruce Middleton
July 14, 2017

Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how...

Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings

Glenn P. McGovern
June 16, 2017

Drawn from case examples of incidents from around the world, Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings is the most complete resource of information on the attack methodologies, tactics used, and groups responsible for targeted...

Terrorist Rehabilitation: The U.S. Experience in Iraq

Ami Angell, Rohan Gunaratna
June 13, 2017

Because terrorists are made, not born, it is critically important to world peace that detainees and inmates influenced by violent ideology are deradicalized and rehabilitated back into society. Exploring the challenges in this formidable endeavor, Terrorist Rehabilitation: The U.S. Experience in...

Social Media Warfare: Equal Weapons for All

Michael Erbschloe
May 08, 2017

Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and...

Non-Imaging Microwave and Millimetre-Wave Sensors for Concealed Object Detection

Boris Y. Kapilevich, Stuart W. Harmer, Nicholas J. Bowring
March 29, 2017

In response to the ever-increasing global threat of terrorist attacks, the personal screening industry has been growing at a rapid rate. Many methods have been developed for detecting concealed weapons and explosives on the human body. In this important new book, the authors discuss their...

Cybersecurity: Geopolitics, Law, and Policy

Amos N. Guiora
March 10, 2017

This book examines the legal and policy aspects of cyber-security. It takes a much needed look at cyber-security from a geopolitical perspective. Through this lens, it seeks to broaden the reader's understanding of the legal and political considerations of individuals, corporations, law enforcement...

Understanding Personal Security and Risk: A Guide for Business Travelers

Charles E. Goslin
March 02, 2017

Uniting broad, time-tested security principles and the author’s 35-plus years of experience with international security, intelligence, and foreign affairs, Understanding Personal Security: A Guide for Business Travelers offers a detailed yet practical framework on which to develop personal security...

Ion Mobility Spectrometry - Mass Spectrometry: Theory and Applications

Charles L. Wilkins, Sarah Trimpin
February 27, 2017

The analytical power of ion mobility spectrometry-mass spectrometry (IMS-MS) instruments is poised to advance this technology from research to analytical laboratories. Exploring these developments at this critical juncture, Ion Mobility Spectrometry-Mass Spectrometry: Theory and Applications covers...

Conferences

Year: