This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
SDMmag logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
SDMmag logo
  • Magazine
    • Digital Editions
    • Current Issue
    • Archives
    • Monitoring Today
  • COVID-19
  • Products
  • News
  • Exclusives
    • SDM 100 Report
    • Top Systems Integrators Report
    • Annual Industry Forecast
    • State of the Market Series
    • Dealer of the Year
    • Systems Integrator of the Year
    • TMA Monitoring Center Excellence Awards
    • Blog
    • PSA Leadership Institute
  • Topics
    • Trends & Industry Issues
    • Video Solutions
    • Access Control & Identification
    • Smart Home
    • More SDM Topics
  • Columns
    • Editor's Angle
    • 5-Minute Tech Quiz
    • Security & the Law
    • Integration Spotlight
    • Security Networkings
    • Digital Shuffle
    • Technology @ Work
    • Insider News & Business
    • Technology Solutions & Skills
    • Marketing Madmen
  • Events
    • Industry Calendar
    • SDM 100 Gala @ ESX
    • Webinars
  • More
    • Videos
    • Podcasts
    • Polls
    • Photo Galleries
    • Newsletters
    • Classified Ads
    • SDM Store
    • White Papers
    • Sponsor Insights
    • More Resources
  • Directories
    • Buyers Guide
    • Take a Tour
    • Guide to Distributors
    • Guide to Central Stations & Monitoring
  • Contact
  • Advertise
Home » Store » Books » Surveillance and Threat Detection 1st Edition
threat and detection.jpg

Surveillance and Threat Detection 1st Edition

$69.95
Books

Product Details

Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.

Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs. View more >

Key Features

  • Understand the terrorist/criminal cycle and how to interrupt that cycle to prevent an attack
  • Understand how to encapsulate criminal and terrorist surveillance, analyze suspicious activity reports, and use an all-hazard, threat-based surveillance detection protection program
  • Access a full ancillary package, including instructor's manual, test banks, and student study exams

Readership

Physical security practitioners, Security Managers and Directors, military personnel, Antiterrorism professionals, and  Counterterrorism professionals, both domestic and international, as well as Federal, State, and Local Law Enforcement leadership and management and college students studying in these fields.

Table of Contents

  • Digital Assets
  • For the Instructor
  • For the Student
  • Acknowledgments
  • 1. Preface and Introduction
    • Abstract
    • 1.1 Definitions
    • 1.2 Scope
    • 1.3 Audience and Use Case Assumptions
    • 1.4 Executive Summary
  • 2. Overview and Understanding
    • Abstract
    • 2.1 Historical Overview of Surveillance, Countersurveillance, and Surveillance Detection
    • 2.2 The Terrorist Attack Cycle
  • 3. Case Studies
    • Abstract
    • 3.1 Criminals
    • 3.2 Terrorists
  • 4. Conducting Surveillance Detection
    • Abstract
    • 4.1 The Basics—Exploiting the Terrorist Preattack and Attack Methodology
    • 4.2 Incorporation of Video Technology
    • 4.3 Surveillance Detection on the Horizon
  • Glossary
  • Index

Details

No. of pages:
264
Published:
14th January 2014
Hardcover ISBN:
9780124077805

SDM Magazine

_CVR1_SDM0121 Cover 144x192

2021 January

In January 2021 issue, SDM is celebrating its 50th anniversary, "Despite Pandemic, Security Industry Seen as Financially Sound", and much more.

Check back throughout the month for new content!

View More Create Account
  • Resources
    • List Rental
    • Online Exclusives
    • Industry Innovations
    • Partners
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2021. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing