Threats in Context
English


LOOKING TO PLACE A BULK ORDER?CLICK HERE

Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
Fast Delivery
Fast Delivery
Sustainably Printed
Sustainably Printed
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.

About The Book

<p>Threats in Context: Identify Analyze Anticipate begins with the premise that a risk assessment is relevant primarily—and hinges upon—the correct evaluation of the threat. According to the author all the other stages of the risk evaluation are in fact dependent on getting the understanding and measurement of the threat<i> right</i>. </p><p>Despite this truism many risk assessment methods (i.e. the process of determining the threat) tend to rush through a vague typology offer minimal classifications utilize an often-outdated list of potential malevolent actions—all of which are based on precedent occurrences. There should be a way to improve on this: a way to provide security practitioners and analysts better tools to deal with the task of analyzing threats and risk and to prepare for such contingencies appropriately. </p><p>The book begins with a retrospective on the threats from the 1960s through to the present. The list is long and includes hijackings and airport attacks piracy drug smuggling attacks on trains pipelines city-wide multi-site attacks road attacks workplace shootings lone wolf attacks drone attacks bombings IEDs sniper attacks random stabbings and more. </p><p>Terrorism workplace violence and active shooter scenarios all present asymmetric problems and unique challenges that require new ways of thinking operationally of risk to properly prevent mitigate and respond to such threats. The author demonstrates how to develop an appropriate methodology to define both current and emerging threats providing a five-step process to self-evaluate—to determine an organization’s a location’s or a facility’s threats and to plan risk mitigation strategies to accurately identify minimize and neutralize such threats. </p><p>Coverage progressively builds from correctly identifying the root threats—both global and local—to a subsequent understanding of the corollary relationship between threat vulnerability and risk with the threat serving as the fundamental cornerstone of the risk evaluation. As such <b>Threats in Context</b> will serve as a pivotal resource to security professionals from all backgrounds serving in a variety of fields and industries. </p>
downArrow

Details