The integrated physical security handbook II / written and compiled by Don Philpott & Shuki Einstein.

Manual for commercial and government building and facility security managers responsible for developing their security plans based on estimated risks and threats, natural or terrorist. Explains how to conduct crucial risk and threat assessments, and incorporates a methodology to ensure that the core...

Full description

Saved in:
Bibliographic Details
Main Author: Philpott, Don
Language:English
Published: Longboat Key, Fla. : Government Training, [2011], ©2011.
Edition:Second edition.
Subjects:
Physical Description:x, 216 pages : illustrations, forms ; 24 cm
Variant Title:
Integrated physical security handbook two.
Integrated physical security handbook 2.
Format: Book

MARC

LEADER 00000nam a2200000Ia 4500
001 in00005005424
003 OCoLC
005 20220616035241.0
008 120530t20112011flu 000 0 eng d
020 |a 9780983236108 
020 |a 0983236100 
035 |a 729754869 
035 |a (CaEvSKY)sky247877634 
035 |a (OCoLC)729754869 
040 |a THD  |c THD  |d THD  |d EEM  |d UtOrBLW 
043 |a n-us--- 
049 |a EEMR 
090 |a TH9705  |b .P45 2011 
100 1 |a Philpott, Don.  |0 http://id.loc.gov/authorities/names/n87117760 
245 1 4 |a The integrated physical security handbook II /  |c written and compiled by Don Philpott & Shuki Einstein. 
246 1 |a Integrated physical security handbook two. 
246 1 |a Integrated physical security handbook 2. 
250 |a Second edition. 
260 |a Longboat Key, Fla. :  |b Government Training,  |c [2011], ©2011. 
300 |a x, 216 pages :  |b illustrations, forms ;  |c 24 cm 
336 |a text  |b txt  |2 rdacontent 
337 |a unmediated  |b n  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
500 |a "Five-step process to assess and secure critical infrastructure from all hazards/threats"--Cover. 
505 0 |a Foreword -- Introduction -- The five step process -- Step one: The model facility -- Step two: Gap analysis -- Step three: Gap closure -- Step four: Security strategic plan -- Step five: Implementation -- Worksheet samples: Critical asset worksheet no. 1 sample -- Design basis threat worksheet no. 2 sample -- Facility vulnerability assessment worksheet no. 3 sample -- Scenario assessment worksheet no. 4 sample --- Worksheet: vulnerability rating -- Worksheet: Site functional pre-assessment matrix -- Scenario V mitigation worksheet no. 5 sample -- Master mitigation worksheet no. 6 sample. 
520 |a Manual for commercial and government building and facility security managers responsible for developing their security plans based on estimated risks and threats, natural or terrorist. Explains how to conduct crucial risk and threat assessments, and incorporates a methodology to ensure that the core business function of the facility is not adversely impacted. 
650 0 |a Buildings  |x Security measures.  |0 http://id.loc.gov/authorities/subjects/sh2009117123 
650 0 |a Terrorism  |z United States  |x Planning.  |0 http://id.loc.gov/authorities/subjects/sh2001009946 
650 0 |a Terrorism  |z United States  |x Prevention.  |0 http://id.loc.gov/authorities/subjects/sh2008112795 
650 0 |a Emergency management  |z United States.  |0 http://id.loc.gov/authorities/subjects/sh2008102968 
907 |y .b91703116  |b 210903  |c 120203 
998 |a rs  |b 120530  |c m  |d a   |e -  |f eng  |g flu  |h 4  |i 2 
999 f f |i 72fee546-939e-5552-9a17-fb20963fc5f8  |s 83b1afbf-b07c-5ebc-b2eb-c35177b22ead  |t 0 
952 f f |p Can Circulate  |a Michigan State University-Library of Michigan  |b Michigan State University  |c MSU Remote Storage  |d MSU Remote Storage  |t 0  |e TH9705 .P45 2011  |h Library of Congress classification  |i Printed Material  |m 31293032460564  |n 1