This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
      • Featured Products
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Store » Books » Physical Security and Environmental Protection
Physical-Security-and-Envir.gif

Physical Security and Environmental Protection

$89.95
Books
No Comments

Product Details

Published March 30, 2017
344 Pages - 40 B/W Illustrations
ISBN 9781138074934

paperback

 

Manage a Hazard or Threat Effectively and Prevent It from Becoming a Disaster

 

When disaster strikes, it can present challenges to those caught off guard, leaving them to cope with the fallout. Adopting a risk management approach to addressing threats, vulnerability, and risk assessments is critical to those on the frontline. Developed with first responders at the municipal, state, provincial, and federal level in mind, Physical Security and Environmental Protection guides readers through the various phases of disaster management, including prevention, mitigation, preparedness, response, and recovery. It contains the steps and principles essential to effectively managing a hazard or threat, preventing it from becoming a disaster.

 

From the Initial Threat Assessment to Response and Recovery Operations

 

Considering both natural and manmade disasters, this text includes sections on hazard analysis, emergency planning, effective communication, and leadership. It covers threat assessment, examines critical infrastructure protection, and addresses violent behavior. The text also outlines protection strategies; discussing strategy management, identifying suspicious behavior, and detailing how to avoid a potential attack. The text includes an overview on developing force protection plans, security plans, and business continuity plans.

 

The book also addresses response and recovery operations, explores post-incident stress management, and poses the following questions:

 

  • What hazards exist in or near the community?
  • How frequently do these hazards occur?
  • How much damage can they cause?
  • Which hazards pose the greatest threat?

 

This text includes the tools and information necessary to help readers develop business continuity, force protection, and emergency preparedness plans for their own group or organization. 

You must login or register in order to post a comment.

Report Abusive Comment

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing