The integrated physical security handbook II / written and compiled by Don Philpott & Shuki Einstein.
Manual for commercial and government building and facility security managers responsible for developing their security plans based on estimated risks and threats, natural or terrorist. Explains how to conduct crucial risk and threat assessments, and incorporates a methodology to ensure that the core...
Saved in:
Main Author: | |
---|---|
Language: | English |
Published: |
Longboat Key, Fla. :
Government Training,
[2011], ©2011.
|
Edition: | Second edition. |
Subjects: | |
Physical Description: | x, 216 pages : illustrations, forms ; 24 cm |
Variant Title: |
Integrated physical security handbook two.
Integrated physical security handbook 2. |
Format: | Book |
MARC
LEADER | 00000nam a2200000Ia 4500 | ||
---|---|---|---|
001 | in00005005424 | ||
003 | OCoLC | ||
005 | 20220616035241.0 | ||
008 | 120530t20112011flu 000 0 eng d | ||
020 | |a 9780983236108 | ||
020 | |a 0983236100 | ||
035 | |a 729754869 | ||
035 | |a (CaEvSKY)sky247877634 | ||
035 | |a (OCoLC)729754869 | ||
040 | |a THD |c THD |d THD |d EEM |d UtOrBLW | ||
043 | |a n-us--- | ||
049 | |a EEMR | ||
090 | |a TH9705 |b .P45 2011 | ||
100 | 1 | |a Philpott, Don. |0 http://id.loc.gov/authorities/names/n87117760 | |
245 | 1 | 4 | |a The integrated physical security handbook II / |c written and compiled by Don Philpott & Shuki Einstein. |
246 | 1 | |a Integrated physical security handbook two. | |
246 | 1 | |a Integrated physical security handbook 2. | |
250 | |a Second edition. | ||
260 | |a Longboat Key, Fla. : |b Government Training, |c [2011], ©2011. | ||
300 | |a x, 216 pages : |b illustrations, forms ; |c 24 cm | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a unmediated |b n |2 rdamedia | ||
338 | |a volume |b nc |2 rdacarrier | ||
500 | |a "Five-step process to assess and secure critical infrastructure from all hazards/threats"--Cover. | ||
505 | 0 | |a Foreword -- Introduction -- The five step process -- Step one: The model facility -- Step two: Gap analysis -- Step three: Gap closure -- Step four: Security strategic plan -- Step five: Implementation -- Worksheet samples: Critical asset worksheet no. 1 sample -- Design basis threat worksheet no. 2 sample -- Facility vulnerability assessment worksheet no. 3 sample -- Scenario assessment worksheet no. 4 sample --- Worksheet: vulnerability rating -- Worksheet: Site functional pre-assessment matrix -- Scenario V mitigation worksheet no. 5 sample -- Master mitigation worksheet no. 6 sample. | |
520 | |a Manual for commercial and government building and facility security managers responsible for developing their security plans based on estimated risks and threats, natural or terrorist. Explains how to conduct crucial risk and threat assessments, and incorporates a methodology to ensure that the core business function of the facility is not adversely impacted. | ||
650 | 0 | |a Buildings |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh2009117123 | |
650 | 0 | |a Terrorism |z United States |x Planning. |0 http://id.loc.gov/authorities/subjects/sh2001009946 | |
650 | 0 | |a Terrorism |z United States |x Prevention. |0 http://id.loc.gov/authorities/subjects/sh2008112795 | |
650 | 0 | |a Emergency management |z United States. |0 http://id.loc.gov/authorities/subjects/sh2008102968 | |
907 | |y .b91703116 |b 210903 |c 120203 | ||
998 | |a rs |b 120530 |c m |d a |e - |f eng |g flu |h 4 |i 2 | ||
999 | f | f | |i 72fee546-939e-5552-9a17-fb20963fc5f8 |s 83b1afbf-b07c-5ebc-b2eb-c35177b22ead |t 0 |
952 | f | f | |p Can Circulate |a Michigan State University-Library of Michigan |b Michigan State University |c MSU Remote Storage |d MSU Remote Storage |t 0 |e TH9705 .P45 2011 |h Library of Congress classification |i Printed Material |m 31293032460564 |n 1 |