Books > Business & Economics > Business & management > Management of specific areas > Management of real estate, property & plant
|
Buy Now
Threats in Context - Identify, Analyze, Anticipate (Hardcover)
Loot Price: R3,699
Discovery Miles 36 990
|
|
Threats in Context - Identify, Analyze, Anticipate (Hardcover)
Expected to ship within 12 - 17 working days
|
Threats in Context: Identify, Analyze, Anticipate begins with the
premise that a risk assessment is relevant primarily-and hinges
upon-the correct evaluation of the threat. According to the author,
all the other stages of the risk evaluation are, in fact, dependent
on getting the understanding and measurement of the threat right.
Despite this truism, many risk assessment methods (i.e., the
process of determining the threat) tend to rush through a vague
typology, offer minimal classifications, utilize an often-outdated
list of potential malevolent actions-all of which are based on
precedent occurrences. There should be a way to improve on this: a
way to provide security practitioners and analysts better tools to
deal with the task of analyzing threats and risk and to prepare for
such contingencies appropriately. The book begins with a
retrospective on the threats from the 1960s through to the present.
The list is long and includes hijackings and airport attacks,
piracy, drug smuggling, attacks on trains, pipelines, city-wide
multi-site attacks, road attacks, workplace shootings, lone wolf
attacks, drone attacks, bombings, IEDs, sniper attacks, random
stabbings, and more. Terrorism, workplace violence, and active
shooter scenarios all present asymmetric problems and unique
challenges that require new ways of thinking, operationally, of
risk to properly prevent, mitigate, and respond to such threats.
The author demonstrates how to develop an appropriate methodology
to define both current and emerging threats, providing a five-step
process to self-evaluate-to determine an organization's, a
location's, or a facility's threats and to plan risk mitigation
strategies to accurately identify, minimize, and neutralize such
threats. Coverage progressively builds from correctly identifying
the root threats-both global and local-to a subsequent
understanding of the corollary relationship between threat,
vulnerability, and risk, with the threat serving as the fundamental
cornerstone of the risk evaluation. As such, Threats in Context
will serve as a pivotal resource to security professionals from all
backgrounds serving in a variety of fields and industries.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|