Surveillance and threat detection prevention versus mitigation
Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks,...
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Waltham, MA
Butterworth-Heinemann
© 2014
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 100801 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220025558.0 | ||
| 008 | 221104 2014 maua i 000 0 eng d | ||
| 020 | |a 9780124077805 | ||
| 020 | |a 0124077803 | ||
| 039 | 9 | |a 202211041126 |b VLOAD |c 201411171643 |d faezah |c 201411171643 |d faezah |c 201410132030 |d syarifuddin |y 201410132030 |z syarifuddin | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a HV 7432 |b .K57 2014 | ||
| 100 | 1 | |a Kirchner, Richard, Jr. |e author | |
| 245 | 1 | 0 | |a Surveillance and threat detection |b prevention versus mitigation |c Richard Kirchner, Jr. |
| 264 | 1 | |a Waltham, MA |b Butterworth-Heinemann |c © 2014 | |
| 300 | |a ix, 253 pages |b illustrations |c 24 cm | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 500 | |a Includes index | ||
| 505 | 0 | |a Chapter 1. Preface and Introduction -- Definitions -- Scope -- Audience and Use Case Assumptions -- Executive Summary -- Chapter 2. Overview and Understanding -- Historical Overview of Surveillance, Countersurveillance, and Surveillance Detection -- The Terrorist Attack Cycle -- Chapter 3. Case Studies -- Criminals -- Terrorists -- Chapter 4. Conducting Surveillance Detection -- The Basics : Exploiting the Terrorist Preattack and Attack Methodology -- Incorporation of Video Technology -- Surveillance Detection on the Horizon | |
| 520 | |a Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate | ||
| 592 | |a 00013726 |b 04/11/2014 |c RM 279.80 |h PVK | ||
| 650 | 0 | |a Crime prevention |z United States | |
| 650 | 0 | |a Terrorism |z United States |x prevention | |
| 650 | 0 | |a Surveillance detection | |
| 650 | 0 | |a National security |z United States | |
| 650 | 0 | |a Internal security |z United States | |
| 999 | |a vtls000052946 |c 100801 |d 100801 | ||


