Extent: | Online Ressource (1368 KB, 288 S.) |
---|---|
Type of publication: | Book / Working Paper |
Language: | English |
Notes: | Description based upon print version of record Cover; Contents; Preface; Acknowledgments; Introduction; Section I: The Global World of Terrorism; Chapter 1: What Is Terrorism?; Introduction to the Term Terrorism; Definitions; Academic Research; Causes of Terrorism; Types of Terrorism; Freedom Fighters; International Terrorism; Summary; Endnotes; Chapter 2: A Short History of Terrorism; Introduction to the Use of Terror; Terrorist Methods; Motivation; Early Terrorism; The Concept of Modern Terrorism; European Terrorists; Terrorism in Ireland; Middle Eastern Terrorism; Terrorism in the United States; Recent Events Countries that Sponsor TerrorismSummary; Endnotes; Chapter 3: Old and New Groups; Old Terrorist Groups; Domestic Terrorism-Within North America; Foreign Terrorist Groups-Outside of North America; New Terrorist and Extremist Groups; Counterterrorism; Forecasting Terrorism; Summary; Useful Terrorism Resources; Chapter 4: Case Studies of Terrorist Attacks; Attacks Against Nations; Attacks Against Corporations; Attacks Against People; Narcoterrorism; Use of the Internet by Terrorists; Summary; Endnotes; Section II: Establishing and Managing a Corporate Antiterrorist Program Chapter 5: Determining the Corporate Risks to Terrorist AttacksWhat Does an Increase in the Number of Acts of Terror and the Spread of Terrorism Mean to Corporations and Businesses Operating in a Global Economy?; The World Is a Dangerous Place, so What Is a Security Executive to Do?; Terrorist Risk Assessment; Risk Mitigation; Gathering Information and Producing Intelligence Related to Terrorist Threats; Summary; Endnotes; Chapter 6: Physically Securing Corporate Premises in Order to Mitigate Attacks; Physical Security Controls; Security in Layers; Grounds; Roads and Highways Fences, Walls, Gates, and Other BarriersBuildings and Doors; Parking; Lighting; Surveillance; Intrusion Detection Systems (IDS); Inner Layers; Buildings, Doors, Windows, and Glass; Locks and Keys; Roofs; Access Control; Personal Identification and Identity Management; Begin Planning with a Physical Security Checklist; Physical Defenses Against Terrorists; Summary; Endnotes; Chapter 7: Protecting Employees from Terrorist Attacks; Employee Protection Outside the Corporate Facilities; Better Safe than Sorry!; Reasons Why a Corporation Should Protect Its Employees; The Fundamentals Security Awareness, Training, and Education (SATE) ProgramProtecting Employees in the Workplace and on Company Property While in the Home Country: A Summary; Leaving the Protective Confines of the Home Country; While on Travel; Case Scenario; Summary; Endnotes; Chapter 8: Preparing for a Terrorist Attack: Emergency Planning and Implementation; Contingency Planning; Definition of Terms; Contingency Planning Program; Contingency Plans; Emergency Response; Crisis Management; Business Continuity; Business Recovery; Business Resumption; Case Scenario; Summary; Endnotes Chapter 9: Operational Security Methods for Mitigating Terrorist Attacks |
ISBN: | 0-7506-8257-4 ; 0-08-055188-2 ; 978-0-08-055188-3 ; 978-0-7506-8257-2 |
Source: | ECONIS - Online Catalogue of the ZBW |
Persistent link: https://www.econbiz.de/10012674397