Atjaunināt sīkdatņu piekrišanu

E-grāmata: Introduction to Homeland Security: Understanding Terrorism Prevention and Emergency Management

5.00/5 (10 ratings by Goodreads)
(University of North Texas)
  • Formāts: EPUB+DRM
  • Izdošanas datums: 13-Sep-2018
  • Izdevniecība: John Wiley & Sons Inc
  • Valoda: eng
  • ISBN-13: 9781119430636
Citas grāmatas par šo tēmu:
  • Formāts - EPUB+DRM
  • Cena: 84,46 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Izdošanas datums: 13-Sep-2018
  • Izdevniecība: John Wiley & Sons Inc
  • Valoda: eng
  • ISBN-13: 9781119430636
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Introduces readers to the world of homeland security and provides them with up-to-date information on recent attacks, new terrorist threats, visible terrorist organizations, current dilemmas, updated research, and best practices

This book provides comprehensive coverage of issues relating to terrorism, terrorist behavior, homeland security policies, and emergency management. It offers a foundation that spans the readily apparent chasm between the homeland security and disaster communities, and covers the stages of emergency management with a focus on terrorism prevention and response. Based on both the academic literature and practical understanding, the book includes research findings, covering theory and principles as well as their application.

Introduction to Homeland Security: Understanding Terrorism Prevention and Emergency Management, Second Edition teaches how to define homeland security, understand how it changed after 9/11, and explore its relationship with emergency management; recognize the causes of terrorism and what prompts people to engage in terrorist attacks; assess the trade-offs between security and rights, and understand how terrorism exploits the tension between these two priorities; work to prevent terrorist attacks through intelligence gathering, by promoting laws that prohibit terrorism, and by protecting borders and various sectors of society; prepare for a terrorist attack by creating an advisory council, passing ordinances, acquiring monetary resources, and establishing an EOC; effectively respond to a terrorist attack through the many functions involved, including the protection of first responders and the decontamination of the victims; recover from a terrorist attack through both short-term and long-term measures; anticipate the current challenges faced in homeland security; and comprehend the various types of attacks that might take place in the future. The second edition:

  • Covers the four traditional phases of emergency response, with a focus on terrorism prevention and infrastructure protection
  • Includes new content such as recent domestic and international terrorist attacks including the attacks in Paris and Boston
  • Has a strong "practitioner" approach and draws upon a solid foundation of academic literature in the field
  • Discusses the roles and responsibilities of government agencies, non-government organizations, and individual citizens

Introduction to Homeland Security is an excellent book for all scholars, students, and practitioners interested or involved in homeland security and emergency management.

Chapter 1 Understanding a New Global Priority: Terrorism, Homeland Security, and Emergency Management
1(30)
Introduction
2(1)
1.1 Terrorism Is the New Normal
2(4)
1.1.1 Boston Marathon Bombing
2(1)
1.1.2 San Bernardino Regional Center Shooting
2(1)
1.1.3 Orlando Nightclub Shooting
3(1)
1.1.4 Other Notable Attacks
3(3)
Self-Check
6(1)
1.2 A Growing Threat
6(3)
1.2.1 Reasons to Anticipate More Attacks
7(2)
Self-Check
9(1)
1.3 9/11: A Wake-Up Call
9(2)
Self-Check
11(1)
1.4 The Nature of Homeland Security
11(5)
1.4.1 Definitions of Homeland Security
12(1)
1.4.2 Agreement About Homeland Security
12(4)
Self-Check
16(1)
1.5 Disciplines Involved in Homeland Security and the Emergency Management Profession
16(15)
1.5.1 The Role of Emergency Management
17(4)
1.5.2 Important Terminology
21(1)
Self-Check
22(1)
Summary
23(1)
Assess Your Understanding
24(1)
Applying This
Chapter
25(1)
Be a Homeland Security Professional
26(1)
Key Terms
26(2)
References
28(3)
Chapter 2 Identifying Terrorism: Ideologically Motivated Acts of Violence and Their Relation to Disasters
31(16)
Introduction
32(1)
2.1 Defining Terrorism
32(2)
Self-Check
34(1)
2.2 Common Characteristics Of Terrorism
34(1)
Self-Check
35(1)
2.3 Types of Terrorism
35(3)
Self-Check
38(1)
2.4 Relation of Terrorism to Other Disasters
38(9)
Self-Check
41(1)
Summary
42(1)
Assess Your Understanding
43(1)
Applying This
Chapter
44(1)
Be a Homeland Security Professional
44(1)
Key Terms
45(1)
References
46(1)
Chapter 3 Recognizing the Causes of Terrorism: Differing Perspectives and the Role of Ideology
47(22)
Introduction
48(1)
3.1 Frequently Mentioned Causes of Terrorism
48(3)
3.1.1 Historical Grievances
48(1)
3.1.2 US Foreign Policy
49(1)
3.1.3 Poverty
50(1)
Self-Check
51(1)
3.2 Political Causes
51(5)
3.2.1 Politics
52(1)
3.2.2 Political Systems
52(1)
3.2.3 Political Functions
53(1)
3.2.4 Political Structure
54(2)
Self-Check
56(1)
3.3 Cultural and Religious Causes
56(4)
3.3.1 Cultural Dimensions of Terrorism
56(1)
3.3.2 The Role of Religion in Terrorism
57(3)
Self-Check
60(1)
3.4 Ideology
60(9)
3.4.1 The Nature of Ideologies
61(1)
3.4.2 Ideological Dimensions of Terrorism
62(1)
Self-Check
63(1)
Summary
63(1)
Assess Your Understanding
64(1)
Applying This
Chapter
65(1)
Be a Homeland Security Professional
65(1)
Key Terms
66(2)
References
68(1)
Chapter 4 Comprehending Terrorists and Their Behavior: Who They are and What They Do
69(26)
Introduction
70(1)
4.1 Terrorists and Terrorist Organizations
70(5)
4.1.1 Terrorist Classification
73(2)
Self-Check
75(1)
4.2 Personal Characteristics
75(3)
4.2.1 Distinct Differences
76(2)
Self-Check
78(1)
4.3 The Behavior and Tactics of Terrorists
78(17)
4.3.1 Propaganda
78(1)
4.3.2 Recruiting
79(1)
4.3.3 Financing
79(2)
4.3.4 Training
81(1)
4.3.5 False Documents, Travel, and Safe Haven
82(1)
4.3.6 Code Words and Secret Communications
82(1)
4.3.7 Planning
83(2)
4.3.8 Weapons
85(1)
4.3.9 Acts of Civil Disorder or Terrorisms
86(2)
Self-Check
88(1)
Summary
88(1)
Assess Your Understanding
89(1)
Applying This
Chapter
90(1)
Be a Homeland Security Professional
91(1)
Key Terms
91(2)
References
93(2)
Chapter 5 Uncovering the Dynamic Nature of Terrorism: History of Violence and Change Over Time
95(20)
Introduction
96(1)
5.1 The Appearance of Terrorism
96(2)
Self-Check
98(1)
5.2 The Evolution of Terrorism Abroad
98(4)
Self-Check
101(1)
5.3 Terrorism and the United States
102(3)
Self-Check
105(1)
5.4 Terrorism Today
105(10)
Self-Check
109(1)
Summary
110(1)
Assess Your Understanding
111(1)
Applying This
Chapter
112(1)
Be a Homeland Security Professional
113(1)
Key Terms
113(1)
References
114(1)
Chapter 6 Evaluating a Major Dilemma: Terrorism, the Media, and Censorship
115(20)
Introduction
116(1)
6.1 Changes in the Media Over Time
116(1)
Self-Check
117(1)
6.2 Terrorists and the Media
117(3)
Self-Check
120(1)
6.3 The Media and Terrorism
120(3)
Self-Check
123(1)
6.4 Government and the Media
123(3)
Self-Check
126(1)
6.5 Censorship and Self-Censorships
126(9)
Self-Check
129(1)
Summary
129(1)
Assess Your Understanding
130(1)
Applying This
Chapter
131(1)
Be a Homeland Security Professional
132(1)
Key Terms
133(1)
References
134(1)
Chapter 7 Contemplating a Quandary: Terrorism, Security and Liberty
135(18)
Introduction
136(1)
7.1 War, Terrorism, and Law
136(2)
Self-Check
138(1)
7.2 Security and Liberty
138(4)
Self-Check
142(1)
7.3 Cases and Considerations
142(11)
Self-Check
148(1)
Summary
148(1)
Assess Your Understanding
149(1)
Applying This
Chapter
150(1)
Be a Homeland Security Professional
151(1)
Key Terms
151(1)
References
152(1)
Chapter 8 Preventing Terrorist Attacks: Root Causes, Law, Intelligence, and Counterterrorism
153(28)
Introduction
154(1)
8.1 Addressing Root Causes
154(2)
Self-Check
156(1)
8.2 Policy and Legislation
156(5)
8.2.1 Laws Prior to 9/11
157(1)
8.2.2 Legislation After 9/11
158(2)
Self-Check
160(1)
8.3 Intelligence
161(6)
8.3.1 The Need for Intelligence
161(1)
8.3.2 The Intelligence Cycle
162(1)
8.3.3 Challenges Facing the Intelligence Community
163(3)
8.3.4 Successes
166(1)
Self-Check
167(1)
8.4 Counterterrorism
167(14)
8.4.1 Risky Operations
170(1)
8.4.2 Learning from Other Nations
171(2)
8.4.3 Controversy Regarding Counterterrorism
173(1)
Self-Check
174(1)
Summary
174(1)
Assess Your Understanding
175(1)
Applying This
Chapter
176(1)
Be a Homeland Security Professional
176(1)
Key Terms
177(2)
References
179(2)
Chapter 9 Securing the Nation: Border Control and Sector Safety
181(26)
Introduction
182(1)
9.1 Border Control
182(7)
9.1.1 What Is the Border?
182(1)
9.1.2 Our Porous Border
183(2)
9.1.3 Participants Involved in Border Control
185(1)
9.1.4 Measures to Secure Borders
186(2)
Self-Check
188(1)
9.2 Protecting Air Transportation
189(3)
Self-Check
192(1)
9.3 Rail Transportation Security
192(3)
Self-Check
195(1)
9.4 Protection of Sea Ports and Maritime Transportation
195(4)
Self-Check
198(1)
9.5 Protection of Petrochemical Facilities
199(8)
Self-Check
200(1)
Summary
201(1)
Assess Your Understanding
202(1)
Applying This
Chapter
203(1)
Be a Homeland Security Professional
203(1)
Key Terms
204(2)
References
206(1)
Chapter 10 Protecting Against Potential Attacks: Threat Assessment Mitigation, and Other Measures
207(22)
Introduction
208(1)
10.1 Threat Assessment
208(9)
10.1.1 Critical Infrastructure, Key Assets, and Soft Targets
208(2)
10.1.2 Collaboration with Others to Identify Threats
210(2)
10.1.3 Points of Consideration
212(5)
Self-Check
217(1)
10.2 Structural and Nonstructural Mitigation
217(12)
10.2.1 Architectural Design and Construction
218(1)
10.2.2 Zoning and Set-back Regulations
219(1)
10.2.3 Other Protective Measures
220(3)
Self-Check
223(1)
Summary
223(1)
Assess Your Understanding
224(1)
Applying This
Chapter
225(1)
Be a Homeland Security Professional
226(1)
Key Terms
227(1)
References
228(1)
Chapter 11 Preparing For the Unthinkable: Efforts For Readiness
229(30)
Introduction
230(1)
11.1 The Importance and Nature of Preparedness
230(7)
11.1.1 Federal and State Initiatives
231(6)
Self-Check
237(1)
11.2 Foundations of Preparedness
237(5)
11.2.1 Preparedness Councils
238(1)
11.2.2 Ordinances
239(1)
11.2.3 Budgets and Grants
239(2)
11.2.4 Emergency Operations Centers
241(1)
Self-Check
242(1)
11.3 Planning
242(3)
Self-Check
245(1)
11.4 Other Measures
245(14)
11.4.1 Training
245(2)
11.4.2 Exercises
247(2)
11.4.3 Community Education
249(2)
Self-Check
251(1)
Summary
252(1)
Assess Your Understanding
253(1)
Applying This
Chapter
254(1)
Be a Homeland Security
Professional
255(1)
Key Terms
255(3)
References
258(1)
Chapter 12 Responding to Attacks: Important Functions and Coordination Mechanisms
259(28)
Introduction
260(1)
12.1 Behavior and Major Priorities
260(10)
12.1.1 Initial Investigation and Apprehension
261(2)
12.1.2 Safety and Security
263(3)
12.1.3 Search and Rescue
266(1)
12.1.4 Medical Care and Triage
266(1)
12.1.5 Decontamination
267(1)
12.1.6 Closing the Investigation
268(2)
Self-Check
270(1)
12.2 Other Crucial Functions
270(5)
12.2.1 Warning, Intelligence, and Public Information
271(2)
12.2.2 Evacuation and Sheltering
273(1)
Self-Check
274(1)
12.3 Coordination Mechanisms
275(12)
12.3.1 The Incident Command System
275(2)
12.3.2 Strengths and Weakness of ICS
277(1)
12.3.3 Utilization of Emergency Operations Centers
278(2)
12.3.4 EOC Management
280(1)
Self-Check
281(1)
Summary
281(1)
Assess Your Understanding
282(1)
Applying This
Chapter
283(1)
Be a Homeland Security Professional
283(1)
Key Terms
284(2)
References
286(1)
Chapter 13 Recovering From Impacts: Short- and Long-Term Measures
287(24)
Introduction
288(1)
13.1 Initial Recovery Steps
288(4)
13.1.1 Damage Assessment
288(1)
13.1.2 Damage Assessment Concerns and Procedures
289(1)
13.1.3 Declaring a Disaster and Seeking Help
290(2)
Self-Check
292(1)
13.2 Key Recovery Functions
292(6)
13.2.1 Mass Fatality Management
292(2)
13.2.2 Debris Management
294(2)
13.2.3 Emotional Issues
296(1)
Self-Check
297(1)
13.3 The Importance of Disaster Assistance
298(13)
13.3.1 Volunteer and Donation Management
298(2)
13.3.2 Individual and Public Assistance
300(2)
13.3.3 Novel Approaches
302(2)
Self-Check
304(1)
Summary
304(1)
Assess Your Understanding
305(1)
Applying This
Chapter
306(1)
Be a Homeland Security Professional
307(1)
Key Terms
307(3)
References
310(1)
Chapter 14 Assessing Significant Threats: Wmd and Cyberterrorism
311(32)
Introduction
312(1)
14.1 The Future of Terrorism and WMD
312(5)
Self-Check
317(1)
14.2 Radiological Weapons
317(4)
Self-Check
321(1)
14.3 Nuclear Weapons
321(4)
Self-Check
325(1)
14.4 Biological Weapons
325(5)
Self-Check
329(1)
14.5 Chemical Weapons
330(3)
Self-Check
333(1)
14.6 Cyberterrorism
333(10)
Self-Check
337(1)
Summary
337(1)
Assess Your Understanding
338(1)
Applying This
Chapter
339(1)
Be a Homeland Security Professional
339(1)
Key Terms
340(2)
References
342(1)
Chapter 15 Looking Toward the Future: Challenges and Opportunities
343(20)
Introduction
344(1)
15.1 The Lessons of this Book
344(4)
Self-Check
348(1)
15.2 Accountability in Homeland Security
348(3)
Self-Check
351(1)
15.3 Clarification of Homeland Security Policy
351(3)
Self-Check
353(1)
15.4 Research Needs and Recommendations for the Future
354(9)
15.4.1 Direction for Researchers
354(2)
15.4.2 Guidance for Practitioners
356(2)
Self-Check
358(1)
Summary
359(1)
Assess Your Understanding
360(1)
Applying This
Chapter
361(1)
Be a Homeland Security Professional
361(1)
Key Terms
362(1)
References
362(1)
Glossary 363(14)
Index 377
DAVID A. McENTIRE, PHD, is the Dean of the College of Health and Public Service at Utah Valley University in Orem, Utah. He is responsible for the oversight of numerous undergraduate and graduate programs in the areas of emergency services, homeland security, national security, public service, aviation and health care. He has received several grants—funded by the Natural Hazards Center, the National Science Foundation, and other sources— that allowed him to conduct research in Peru, the Dominican Republic, Texas, New York, California, and Haiti.