Page 1











. ng

s W ffe r N O a il o c o m UP E em ess. G N IV p r S I C L U S .c r c X ww rE w fo a t

Contents Counterterroism ..........................................................3 Disaster Planning & Recovery ......................................9 Emergency Response ................................................16 General/Other ..........................................................19 Security Management ..............................................23 Page 3

Page 6

Page 16

Page 19

Visit us at to view more information and complete tables of contents for these and many other related books. Page 24

Page 13

Join the CRC Press community! Sign up for email alerts at and be the first to know about new books in your area of interest. You will also be eligible for exclusive discounts only available in our email and print promotions. Take full advantage of your insider savings and free shipping when you buy directly from

Want to maximize your buying power? Order direct from our online store and

Receive FREE Standard Shipping with every order, big or small. CWL02 5.5x8.5 MC_ISSUU

Counterterrosim New!

U.S. Government Counterterrorism A Guide to Who Does What Michael Kraft Silver Spring, Maryland, USA

Edward Marks Washington, D.C., USA

"This book will be an essential roadmap for anyone who intends to seriously study American counterterrorist policy." —Brian Michael Jenkins, Senior Advisor RAND Corporation (From the Foreword)

U.S. Government Counterterrorism: A Guide to Who Does What is the first readily available, unclassified guide to the many U.S. government agencies, bureau offices, and programs involved in all aspects of countering terrorism domestically and overseas. The authors, veterans of the U.S. government’s counterterrorism efforts, present a rare insider’s view of the counterterrorism effort, addressing such topics as government training initiatives, weapons of mass destruction, interagency coordination, research and development, and the congressional role in policy and budget issues.


Police and Military Dogs Criminal Detection, Forensic Evidence, and Judicial Admissibility John J. Ensminger Stone Ridge, New York, USA

"A solid, hands-on, quick reference source. Truly exceptional!" —Detective Jan Scofield, Master Trainer, North American Police Work Dog Association

"I think every K9 handler should have a copy of this book." —Jonni Joyce, Master Trainer, author of Jonni Joyce News and Commentary

It is essential that those in the criminal justice system understand the tasks that police dogs perform and the evidence that their work produces. Police and Military Dogs: Criminal Detection, Forensic Evidence, and Judicial Admissibility examines the use of police and military dogs for a wide variety of functions and explores canine biology and behavior as it applies to police work.

Individual chapters describe the various agencies, their bureaus, and offices that develop and implement the counterterrorism policies and programs, providing a useful unclassified guide to government officials at all levels as well as students and others interested in how the U.S. counters terrorism. The book also discusses the challenges involved in coordinating the counterterrorism efforts at federal, state, and local levels and explains how key terror events influenced the development of programs, agencies, and counterterrorism legislation. The legislative underpinnings and tools of the U.S. counterterrorism efforts are covered as are the oft-debated issues of defining terrorism itself and efforts to counter violent extremism.

The book begins with an overview of the changes that have occurred in the field in the past four decades as discoveries have been made about canine capabilities. The author examines how a canine handler’s work with a skilled police dog can affect the subsequent investigation and prosecution of the crime. He discusses optimal procedures for finding and processing evidence and describes the boundaries of admissibility of evidence produced by police dogs. The book examines the many diverse detection functions police dogs are being trained to perform, ranging from cadaver detection to the discovery of explosives. It also describes the use of dogs to apprehend criminals and in search and rescue operations.

In addition to outlining the specific agencies and programs, the authors provide unique insights into the broader context of counterterrorism efforts and developments in the last 10-plus years since 9/11 and they raise future considerations given recent landscape-altering global events.

Written for a wide audience including canine handlers, forensic scientists, attorneys, and the judiciary, this volume covers topics pertinent to all aspects of the police dog in contemporary law enforcement.

Catalog no. K12355, December 2011, 407 pp. ISBN: 978-1-4398-5143-2, $69.95 / £44.99

Catalog no. K13331, October 2011, 304 pp. ISBN: 978-1-4398-7239-0, $79.95 / £49.99

Also available as an eBook

Also available as an eBook

For more information and complete contents, visit


Counterterrosim Terrorism and Organized Hate Crime


Terrorist Suicide Bombings

Intelligence Gathering, Analysis and Investigations, Third Edition

Attack Interdiction, Mitigation, and Response Mordecai Dzikansky

Michael R. Ronczkowski

NYPD Detective First Grade (Ret.), Global Terror and Security Consultant, Ra’anana, Israel

Major & Fusion Center Director, Retired, Miami, Florida, USA

Gil Kleiman Israel National Police Superintendent (Ret.), Jerusalem, Israel

Robert Slater Jerusalem, Israel

" ... an invaluable and authoritative guide for understanding the phenomenon of suicide terrorism and how to defeat it." —Joshua Sinai in The Washington Times

Urban environments are prime targets for suicide bombings over the next decade. While the threat may be ever-present, measures are available that can empower law enforcement personnel to thwart attacks, or at least mitigate the effects by reducing casualties. Written by professionals with first-hand experience, Terrorist Suicide Bombings: Attack Interdiction, Mitigation, and Response helps first responders, law enforcement, and homeland security professionals grapple with this increasing threat. The authors offer best practices from the field and lessons learned, providing specific instructions on how to fortify possible suicide bombing targets to reduce casualties. They explain how suicide bombers operate and what weapons they are likely to employ. The book also demystifies common myths about suicide bombers that jeopardize successful interdiction. Including graphic photos depicting the aftermath of actual attacks, the book projects the reader into the chaos of a bomb scene. Chapters describe what one encounters at a site immediately after a bombing and explain what each first responder should and should not do. Case studies throughout enhance the text, explaining why certain suicide bombings succeed while others fail. This volume is a complete, must-own reference for those professionals tasked with defending against, mitigating, and responding to terrorist suicide bombing attacks.

The ability of law enforcement agencies to manage intelligence is key to fighting the war on terror, and a critical foundation of intelligence-led policing is proper analysis of the information gained. Terrorism and Organized Hate Crime: Intelligence Gathering, Analysis, and Investigations, Third Edition provides a methodical approach to analyzing homeland security needs, enabling the law enforcement community to understand the vital role it plays in the war on terrorism. Using techniques applicable to the private and the public sector, the book combines academic, research, and practitioner perspectives to establish a protocol for effectively gathering, analyzing, investigating, and disseminating criminal intelligence. The book demonstrates how to recognize the indicators of an impending act of terrorism or mass violence, how to deter an attack, and how to transform information into intelligence to meet community demands for safety and security. New chapters in this third edition focus on source development and their use in investigations, the role of fusion centers, terrorism financing, the handling of classified materials, and the National Suspicious Activity Reporting (SAR) Initiative. The book also discusses pre-incident indicators, the radicalization process, and behavioral traits associated with terrorism. A one-stop resource for the homeland security, intelligence analyst, and investigative professional, this volume arms those tasked with protecting the public with a solid blueprint for combating and investigating crimes associated with terrorism and hate. Catalog no. K13056, September 2011, 417 pp. ISBN: 978-1-4398-6759-4, $89.95 / £57.99 Also available as an eTextbook

Catalog no. K13266, October 2011, 342 pp. ISBN: 978-1-4398-7131-7, $79.95 / £49.99 Also available as an eBook


SAVE when you order online at

Counterterrosim Forthcoming!


Information Sharing Planning for Homeland Security, Emergency Preparedness and Business Continuity

Effective Surveillance for Homeland Security

David G. Kamien

Since September 11, 2001, the scientific and engineering communities have been called upon to help the world respond to security challenges. Effective Surveillance for Homeland Security Balancing Technology and Social Issues provides a comprehensive survey of stateof-the-art methods for the surveillance and protection of citizens and critical infrastructure against both natural and deliberate threats. The book focuses on current technological challenges involving multidisciplinary problem analysis and systems engineering approaches.

Mind-Alliance Systems, LLC, Roseland, New Jersey, USA

Emergencies such as terror attacks, natural disasters, and fires often reveal problems in communication, information sharing, and notification. One of the key reasons for this is the lack of a systematic framework for developing security and emergency preparedness communication plans and information sharing protocols. Information Sharing Planning for Homeland Security, Emergency Preparedness and Business Continuity provides professionals with the knowledge needed to systematically analyze information-sharing needs and plan critical information flow and communications. Combining a conceptual framework with case studies, the text offers managers guidance for managing risk through advanced planning of the information flow within and between organizations. Features: • Addresses rapid sharing of information between agencies and the protocols and systems needed to facilitate this • Covers pre-event communication planning and how to institutionalize multi-organizational information sharing plans • Examines software support systems for building information sharing plans • Provides case studies on information sharing within DHS, maritime security, transit security, and private sector business continuity Catalog no. K12914, November 2012, c. 325 pp. ISBN: 978-1-4398-6276-6, $79.95 / £49.99 Also available as an eBook

Balancing Technology and Social Issues Edited by

Francesco Flammini, Roberto Setola and Giorgio Franceschetti

The first section analyzes technical issues related to surveillance. Next, the book focuses on the legislative, organization, and management issues with a specific emphasis on privacy concerns. Finally, the contributors discuss innovative solutions and new research topics garnering heightened attention. Contents: Surveillance Technologies. Intrusion Detection / Access Control. Video, Infrared, Thermal Cameras and their Application in Homeland Security. MultiCamera Object Tracking Methods. Distributed Monitoring Through Networks of Smart Cameras and Sensors. Multi Object Tracking Methods. Surveillance Systems Design and Evaluation. Biometric Data and Face Detection/Recognition. Legislative, Organization, and Case Study. Security, Privacy and Dependability Issues in Surveillance. Physical and Cyber Security. Security Management Systems. Urban Control Application. Port, Airport, and Railway Surveillance Applications. Surveillance Technologies for Forensics. Advance Surveillance. Intelligent Real-Time Audio-Video Analytics Surveillance. Multi-Modal Surveillance and Data/Decision Fusion. Situation Awareness, Early Warning and Decision Support Systems. Look Behind Ealls, Under the Wears and Inside Objects. Use of Radar, Sonar and Audio Techniques for Surveillance of Open Space

Catalog no. K13920, November 2012, c. 320 pp. ISBN: 978-1-4398-8324-2, $89.95 / £57.99 Also available as an eBook

For more information and complete contents, visit


Counterterrosim Terrorist Financing, Money Laundering and Tax Evasion


Introduction to Intelligence Studies

Examining the Performance of Financial Intelligence Units

Carl J. Jensen, III, David McElreath, and Melissa Graves The University of Mississippi, University, USA

Since the attacks of 9/11, the United States Intelligence Community (IC) has undergone an extensive overhaul. Perhaps the greatest of these changes has been the formation of the Office of the Director of National Intelligence. As a cabinet level official, the Director oversees the various agencies of the IC and reports directly to the President. The IC today faces challenges as it never has before; everything from terrorism to pandemics to economic stability has now become an intelligence issue. As a result, the IC finds itself shifting its focus from a bipolar world to one in which tech-savvy domestic and international terrorists, transnational criminal organizations, failing states, and economic instability are now a way of life. Introduction to Intelligence Studies provides a solid overview of intelligence and security issues, reviewing the history of intelligence as practiced in the United States and defining critical terms. It includes a comprehensive examination of the "pillars" of American intelligence systems—collection, analysis, counterintelligence and covert operations—and demonstrates how these work together to provide "decision advantage." The book also covers such vital issues as laws and ethics, writing and briefing for the IC, and emerging threats and challenges. Features: • Provides a working definition of intelligence and a history of intelligence as practiced in the United States • Covers intelligence writing, military intelligence, the intelligence cycle, and laws governing intelligence • Includes the latest developments in Homeland Security as related to Office of the Director of National Intelligence and the intelligence community as a whole • Examines collections, analysis, counterintelligence, and covert operations • Presents emerging threats and challenges Catalog no. K14365, October 2012, c. 448 pp. ISBN: 978-1-4665-0003-7, $79.95 / £49.99


Jayesh D'Souza Florida International University, Miami, USA

Using the Balanced Scorecard method for assessment, this book explores the effectiveness of a government’s financial intelligence units in combating terrorist financing. It explores the large-scale misuse of funds to commit financial crimes, describes how easy it is for criminals, and reviews inter-jurisdictional problems. Contributions from a wide range of professionals provide various perspectives and case studies demonstrate innovative solutions and crime fighting strategies applicable to all countries. Catalog no. K11399, August 2011, 232 pp. Soft Cover ISBN: 978-1-4398-2850-2, $59.95 / £38.99 Also available as an eBook

The Counterterrorism Handbook Tactics, Procedures, and Techniques, Fourth Edition Frank Bolz, Jr., Kenneth J. Dudonis and David P. Schulz Updated to reflect an increased focus on terrorism in public transportation, this fourth edition examines the strategies, tactics, and techniques required to tackle terrorism as it exists today. With chapters on bomb threats, risk assessment, hostages, and weapons of mass destruction, it presents case studies of some of the most notorious terrorist incidents, including both World Trade Center attacks, Oklahoma City, Centennial Olympic Park, the U.S. Embassy, the U.S.S. Cole, and attacks in Madrid, London, and Glasgow. Catalog no. K12096, July 2011, 529 pp. ISBN: 978-1-4398-4670-4, $89.95 / £57.99 Also available as an eBook

SAVE when you order online at

Counterterrosim Terrorist Rehabilitation The U.S. Experience in Iraq Ami Angell and Rohan Gunaratna International Centre for Political Violence and Terrorism Research, Singapore

Because terrorists are made, not born, it is critically important to world peace that detainees and inmates influenced by violent ideology are deradicalized and rehabilitated back into society. This volume demonstrates through the actual experiences of military personnel, defense contractors, and Iraqi nationals that deradicalization and rehabilitation programs can succeed and positively impact thousands of would-be terrorists globally if utilized to their full capacity. The book describes religious, vocational training, education, creative expression, and Tanweer programs introduced to the detainee population. Catalog no. K12414, July 2011, 454 pp. ISBN: 978-1-4398-5249-1, $69.95 / £44.99 Also available as an eBook

Terrorism and WMDs

Surviving the International War Zone Security Lessons Learned and Stories from Police and Military Peacekeeping Forces Robert R. Rail Eddyville, Kentucky, USA

Few people are better able to describe how to survive in a war zone than those who have lived it firsthand. Presenting accounts written by military and police officers, this book offers an inside look at the lives of the officers and the local people living in the war zone environment. Covering many facets of daily life, the book examines topics such as surviving extreme temperatures and staying healthy, interacting with the indigenous population, and adjusting to the challenges of limited technology and resources. Catalog no. K11377, October 2010, 348 pp. ISBN: 978-1-4398-2794-9, $83.95 / £53.99 Also available as an eBook

Science and Technology of Terrorism and Counterterrorism

Awareness and Response

Second Edition

John Pichtel

Tushar K. Ghosh, Mark A. Prelas, Dabir S. Viswanath, and Sudarshan K. Loyalka

Ball State University, Muncie, Indiana, USA

An introductory manual on CBRNE weapons, this volume helps prepare emergency response, counterterrorism, and security professionals to respond to an attack quickly and effectively. Specific CBRNE weapons are discussed and each section provides a history of the weapon as well as its design, structure, properties, and behavior. The book examines the impacts of CBRNE weapons on human health and recommends safety precautions for emergency responders and the public. The final section addresses specific responder issues, personal protective equipment (PPE), decontamination, and site remediation. Catalog no. K12376, April 2011, 456 pp. ISBN: 978-1-4398-5175-3, $79.95 / £49.99 Also available as an eBook

Edited by

University of Missouri, Columbia, USA

Traditional resources on terrorism tend to focus on the social, behavioral, and legal aspects of the subject, with minimal emphasis on the scientific and technological aspects. Taking into account these practical considerations, this text discusses the nature of terrorism and the materials used by terrorists. It describes how intelligence professionals and law enforcement personnel can detect and destroy these materials, and how they can confront terrorist groups. The book covers bio-, agricultural, nuclear, chemical, and cyber-terrorism. Catalog no. AU7181, November 2009, 604 pp. ISBN: 978-1-4200-7181-8, $104.95 / £66.99 Also available as an eBook

For more information and complete contents, visit


Counterterrosim Jihadists and Weapons of Mass Destruction

Critical Infrastructure Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies

Edited by

Gary Ackerman University of Maryland, College Park, USA

Tyson Macaulay Security Liaison Officer, Bell Canada, Ottawa, Ontario

Jeremy Tamsett Center for Terrorism & Intelligence Studies, San Jose, California, USA

Written for professionals and policymakers working at the forefront of anti-terrorist efforts, this volume covers the weapons of mass destruction that jihadist terrorists have historically used and are likely to use in the future. Leading international experts examine terrorist ideology, strategy, and target selection. They describe chemical, biological, radiological, and nuclear weapons, and discuss how terrorists might acquire or manufacture them. They also address detection, prevention, and attack mitigation techniques. Catalog no. AU6964, February 2009, 494 pp. ISBN: 978-1-4200-6964-8, $87.95 / £55.99 Also available as an eBook

Terrorist Recognition Handbook A Practitioner's Manual for Predicting and Identifying Terrorist Activities, Second Edition

Also available as an eBook

Advanced Analytics & Information Sharing Technologies Christopher Westphal CEO, Visual Analytics, Frederick, Maryland, USA

Malcolm W. Nance Director, SRSI - Special Readiness Services International, Washington, D.C. USA

Written by a 20-year veteran of the U.S. intelligence community, this second edition reflects the latest geopolitical factors affecting global terrorist incidents and regional insurgencies. It includes an analysis of transformations within Al Qaeda and information on newly active global and regional terrorist groups. This book is an invaluable training tool on how to identify an attack, mitigate damage, and recognize the stages of developing terrorist plots. Catalog no. AU7183, April 2008, 480 pp. Soft Cover ISBN: 978-1-4200-7183-2, $64.95 / £41.99


Catalog no. AU6835, August 2008, 344 pp. ISBN: 978-1-4200-6835-1, $89.95 / £57.99

Data Mining for Intelligence, Fraud & Criminal Detection


Also available as an eBook

Critical Infrastructures (CIs) are considered fundamental to the functioning of modern economies. Moving beyond definitions, this volume looks at the iron triangle within CI: power, telecom, and finance. It introduces the concept of CIs as industrial and enterprise risk conductors, highlighting the fact that a CI failure can propagate an impact throughout an enterprise. This text rethinks the concept of a CI according to contemporary factors, providing guidance for mitigating risk within the framework of national economies.

Every organization, bureau, agency, and corporation has fundamental analytical needs that traditionally require a significant amount of data integration and resources. Whether investigating money laundering, insider trading, insurance fraud, or terrorist behavior, the analytical processes and systems architectures are very similar. This book reviews the commonality, framework, and infrastructures necessary to implement complex analytical systems. It addresses analytical approaches, technologies, and methodologies as well as information sharing and the design of today’s fusion centers. Catalog no. AU6723, December 2008, 440 pp. ISBN: 978-1-4200-6723-1, $79.95 / £50.99 Also available as an eBook

SAVE when you order online at

Disaster Planning & Recovery New!

Disasters 2.0 The Application of Social Media Systems for Modern Emergency Management Adam Crowe Johnson County Emergency Management & Homeland Security, Olathe, Kansas, USA

Emergencies and disasters of all sizes, scopes, and complexity have been heavily impacted by social media and web 2.0 technologies. Emergency managers have only begun to understand that social media must be planned for and adopted as a valuable tool in all phases of emergency management to ensure it is efficiently and effectively utilized in an emergency. Disasters 2.0: The Application of Social Media Systems for Modern Emergency Management explains how to use social media as a powerful tool for all phases of disaster management. It highlights citizen use and expectations, and policies, procedures, and challenges to the adoption of social media in a disaster event. The author explains how to integrate national models of disaster response and existing outreach and communication strategies. He also identifies the tools and systems that will allow emergency managers to develop virtual communities for preparedness, response, recovery, and mitigation. Features: • Provides a foundation in social media and Web 2.0 applications • Examines the capabilities and impact of social media on emergencies and disasters • Illustrates the strength and resiliency of social media and Web 2.0 systems built into the virtual cloud and how it strengths emergency management utilization • Examines the utilization of video, voice, and mobile technologies for information flow before, during, and after emergencies and disasters • Covers social geolocation systems on tertiary emergency management systems, including damage assessment, debris management, and responder safety and accountability

Social Media, Crisis Communication, and Emergency Management Leveraging Web 2.0 Technologies Connie White School of Media Arts, Columbia College Chicago, Illinois, USA

“ … a book to be read and not to become another bookshelf dust target.” —Dean Larson, Ph.D., CEM, in IAEM Bulletin

Social Media, Crisis Communication, and Emergency Management: Leveraging Web 2.0 Technologies teaches emergency management professionals how to use social media to improve emergency planning, preparedness, and response capabilities. The book supplies cutting-edge methods for leveraging these technologies to manage information more efficiently, reduce information overload, inform the public, and ultimately save lives. Features: • Covers popular social media technologies and applications that are freely available— including Facebook, Twitter, and YouTube • Includes case studies that illustrate the various ways social media can help emergency managers save lives • Identifies best practices unique to incident and disaster management • Introduces collaborative mapping tools that can be customized to readers’ specific needs • Explores free and open-source disaster management systems, including Sahana and Ushahidi From crowdsourcing and digital volunteers to mapping and collective intelligence, this volume facilitates a clear understanding of the essential principles of social media. The book also includes hands-on exercises that supply readers with models for building their own sites and groups— making it a must-read for anyone who wants to learn more about the communication and information structures supported by social media.

Catalog no. K13449, May 2012, c. 328 pp. ISBN: 978-1-4398-7442-4, $69.95 / £44.99

Catalog no. K12470, September 2011, 329 pp. ISBN: 978-1-4398-5349-8, $69.95 / £44.99

Also available as an eBook

Also available as an eBook

For more information and complete contents, visit


Disaster Planning & Recovery New! New!

Mass Fatalities

Managing Emerging Risk

Managing the Community Response Peter R. Teahen

The Capstone of Preparedness

International Mass Fatalities Center, Cedar Rapids, Iowa, USA

Kevin D. Burton KDB Legacy Holdings, LLC., Scottsdale, Arizona, USA

From Main Street to Mumbai, Managing Emerging Risk: The Capstone of Preparedness considers the new global drivers behind threats and hazards facing all those tasked with protecting the public and private sector. The text delves into the global mindset of public and private sector emergency managers and presents a new risk landscape vastly different from the one existing ten years ago. The book begins by presenting a series of fictitious scenarios each resulting in mass destruction and fatalities. These are each followed by actual news stories that support the scenarios and demonstrate that the proposed events—seemingly unthinkable—have the potential to occur. Next, the author identifies two drivers in the practice of emergency management and general preparedness today that constitute our view of the future and the new face of risk. The first is the Disaster Halo Effect—the idea that modern threats exhibit more than one event. The second is the worldview of our nation as a Market State focused on the trading of goods, services, and ideas among the nation-states. The book also reviews the history of preparedness and discusses its relationship with large-scale threats, establishing that hindsight bias has hurt our ability to plan and respond to the unexpected. The chapters that follow explore what is needed to better cultivate, design, develop, and operate emerging management and preparedness thinking in the current environment. Each chapter begins with key terms and objectives and ends with thought-provoking questions. Introducing a new paradigm of thought that takes into account the chief influencers of global threats, the book arms emergency and business operations managers with the ammo needed to successfully confront emerging threats in the 21st century. Catalog no. K11272, December 2011, 287 pp. Soft Cover ISBN: 978-1-4398-2641-6, $59.95 / £38.99 Also available as an eBook

A mass fatalities response goes far beyond returning the remains of a loved one to surviving family members. Those charged with this grim but critical responsibility will find themselves immersed in multiple tasks involving diverse individuals, organizations, and priorities. Mass Fatalities: Managing the Community Response examines complex issues while providing practical guidance to communities and responders as they plan for, respond to, and recover from a mass fatalities incident. This book explores the immense array of tasks such as: • Managing resources and personnel • Protecting a potential crime scene • Conducting a comprehensive search and recovery of the remains • Identifying and returning the remains and personal effects • Ensuring family members of the deceased are treated with compassion, dignity, and respect • Making sure responders have the proper tools to complete their responsibilities • Providing family members, responders, and the impacted community the necessary support to cope with the physical, spiritual, and emotional stressors of a mass fatalities incident The book explains the functions performed at the mass fatalities operational sites. It provides organizational charts with job descriptions detailing the roles and responsibilities for an effective leadership team and describes the management of the disaster site, presenting step-by-step procedures for search and recovery. The book also discusses notification of death and covers best practices for the Victim Identification Center operations. Throughout, chapters emphasize the need for mental health services— exploring the essential elements of providing effective and compassionate support to surviving family members, to responders and their families, and to the community. Catalog no. K12215, October 2011, 421 pp. ISBN: 978-1-4398-4902-6, $69.95 / £44.99 Also available as an eBook


SAVE when you order online at

Disaster Planning & Recovery New!

Mass Notification and Crisis Communications Planning, Preparedness, and Systems Denise C. Walker, Ph.D. Lone Star College System, The Woodlands, Texas, USA

Mass communication in the midst of a crisis must be done in a targeted and timely manner to mitigate the impact and ultimately save lives. Based on sound research, real-world case studies, and the author’s own experiences, Mass Notification and Crisis Communications: Planning, Preparedness, and Systems helps emergency planning professionals create a crisis communications plan that works by establishing upfront relationships with responders, enacting protocols, and utilizing technology to effectively message the intended audience. Providing communication best practices to professionals, the book: • Reviews the challenges organizations face with communications in the face of various types of disasters • Helps to outline the target audience of the communiqué • Describes different communication techniques used throughout history during peace and wartime • Provides methods for getting the right message across the first time • Explores how social media can be a powerful tool in message dissemination • Examines the legal landscape to ensure managers are in compliance with international, federal, state, and local regulatory requirements Aligned with the U.S. Department of Homeland Security’s National Emergency Communications Plan—as well as the U.S. strategic plan to improve emergency response communications—the book provides recommendations to key decision makers given all considerations that must be weighed and factored in during a crisis.


Emergency Management The American Experience, 19002010, Second Edition Claire B. Rubin Arlington, Virginia, USA

Emergency Management: The American Experience, 1900-2010, Second Edition provides a history and analysis of the political and policy processes of federal government involvement in emergency management from 1900 through 2010. This updated edition provides background and context for understanding political, policy, and other essential aspects of emergency management, including identifying and developing the key time bands of information about emergency management from the start of the past century to the present. The book includes updates to protocol and shifts in the DHS and FEMA and includes responses to disasters over the last 5+ years, including considerable coverage of the BP oil spill. Contents: Introduction: 110 Years of Disaster Response and Emergency Management in the U.S.; Claire B. Rubin Focusing Events in the Early Twentieth Century; David Butler The Expanding Role of the Federal Government: 1927-1950; David Butler The Formative Years: 1950-1978; Keith Bea Federal Emergency Management Comes of Age: 1979-2001; Richard Sylves Emergency Management Restructured; John R. Harrald 2005 Events and Outcomes; Melanie Gall and Susan L. Cutter BP Explosion and Oil Spill; John R. Harrald Summary of Events; Gary Wamsley and Patrick Roberts From a Painful Past to an Uncertain Future; Wamsley and Roberts References Index

Cat no. K15114, August 2012, c. 288 pp. ISBN: 978-1-4665-1753-0, $44.95 / £28.99

Catalog no. K13446, December 2011, 550 pp. ISBN: 978-1-4398-7438-7, $79.95 / £49.99 Also available as an eBook

For more information and complete contents, visit


Disaster Planning & Recovery New!


Behavioral Health Response to Disasters

Natural Hazard Mitigation Alessandra Jerolleman Senior Hazard Mitigation Planner, James Lee Witt Associates, Louisiana, USA

Edited by

Julie Framingham and Martell L. Teasley

John J. Kiefer University of New Orleans, Louisiana, USA

Tallahassee, Florida, USA

Providing effective and culturally competent short-term and long-term care and treatment for disaster survivors is a challenging task. Examining the current organizational structure of disaster behavioral health services, this book focuses on culture, race, ethnicity, gender, socioeconomic status, and age as factors to incorporate within treatment modalities and service delivery systems. The book not only heightens awareness of culturally competent care, but also provides valuable training on how to conduct interventions to meet the psychological needs of survivors from diverse backgrounds. Catalog no. K11125, May 2012, c. 464 pp. ISBN: 978-1-4398-2123-7, $89.95 / £57.99 Also available as an eBook

Catastrophic Impact and Loss Kevin D. Burton KDB Legacy Holdings, LLC, Scottsdale, Arizona, USA

Providing a true understanding of what it is to be "in harm’s way", this book details the loss and impact that both public and private enterprise must be prepared for in the event of a catastrophe. Offering a means to measure impact events and communicate mission objectives and goals, it emphasizes forward planning and appropriate messaging in advance of the impact event. It also addresses the challenge of generating accurate and informed impact analyses and outlines various factors associated with modeling future impact. Catalog no. K14534, September 2012, c. 288 pp. ISBN: 978-1-4665-0464-6, $59.95 / £38.99


Features: • Contains contributions from a top-notch author team and contributors that provide a solid foundation on the topic • Presents an up-to-date look at the changing nature of disasters • Covers concepts and case studies based in real-world mitigation applications • Includes learning objectives, cases examples, key terms, and end-of-chapter questions


Also available as an eBook

As one of the core phases of the emergency management cycle (planning/preparedness, mitigation, response, recovery), the mitigation process plays a critical role. Focusing on hazard mitigation from a practical perspective, Natural Hazard Mitigation provides expert guidance on the implementation and selection of hazard mitigation projects. The text educates the reader in the value and potential of mitigation, as well as how to convince others of that value, and how to better involve the community and tailor solutions to unique local situations. It also demonstrates how mitigation fits into the emergency management cycle.

Selected Contents: Introduction. Mitigation Tools. Hazard Mitigation as a Field. DMA 2000 Policy Analysis (including current grant programs). Making the best use of NFIP resources. Changing Frontiers - New Rep Loss Legislation and Pilot Programs. Involving the Community in Mitigation / Outreach. Intergovernmental Relationships in Mitigation. The Growing Role of the Private Sector in Mitigation. Mitigation and Emergency Management. Non-FEMA Mitigation - State, local, and personal measures. Public/Private Partnerships in Local Mitigation Initiatives. Persuasion/Policy. Leveraging Non-profits and Volunteers in Hazard Mitigation. Compendium of Links and Resources. Catalog no. K11574, October 2012, c. 384 pp. ISBN: 978-1-4398-3493-0, $69.95 / £44.99 Also available as an eBook

SAVE when you order online at

Disaster Planning & Recovery

Coming Soon!

Emergency Planning Guide for Utilities Second Edition Samuel Mullen Absecon, New Jersey, USA

Providing utility-wide risk assessment and improvement strategies, this indispensible guide assists utility planners, trainers, and responders to effectively improve the level of resilience and therefore mitigate the impact of disaster events on infrastructure, people, and resources. It presents both new and seasoned approaches to plan development, assessment, and management and addresses issues of compliance. Emphasizing communication with emergency management organizations, it discusses computer and web-based outage and control systems and presents auditing tactics and metrics. Catalog no. K14544, September 2012, c. 288 pp. ISBN: 978-1-4665-0485-1, $89.95 / £57.99 Also available as an eBook

Disaster Victim Identification Experience and Practice Edited by

Sue Black, L. Hackman, and X. Mallett University of Dundee, Nethergate, Scotland

G. Sunderland Cumbria Police Authority, Penrith, UK

Disaster management has become an increasingly global issue, with victim identification now receiving greater attention. This volume presents a selection of key historical incidents in the United Kingdom and includes candid discussions of potential areas for improvement in preparedness and future deployment capabilities. Each chapter addresses a specific disaster and covers a number of main points in relation to the incident, honestly assessing events and providing concrete recommendations. Catalog no. 94122, May 2011, 272 pp. ISBN: 978-1-4200-9412-1, $129.95 / £82.00

Managing Children in Disasters Planning for Their Unique Needs Jane A. Bullock, George Haddow, and Damon P. Coppola Bullock and Haddow, LLC, Reston, Virginia, USA

“The authors cite the latest studies and best practices on the subject, referencing the current list of resources available from leading children advocacy organizations. The result offers an invaluable resource on the challenges of providing for the needs of children during crises and natural hazard events.” —Mark K. Shriver, Chairman of the National Commission on Children in Disasters and Senior Vice President of Save the Children's U.S. Programs

Highlighting the infrastructure that supports children in a safe and secure community, Managing Children in Disasters begins by identifying the special needs of children, including physical security, emotional stability, family unity, and ongoing education. It looks at how hazard mitigation actions can reduce the long term impact of a disaster on this infrastructure, and outlines the many steps that can be taken by parents, emergency managers, school officials, and child care providers to prepare for a future incident. The book reviews what agencies and organizations can do to ensure that children are protected and families remain intact. It examines evacuation plans and processes, emergency shelters, and the recovery and rebuilding process. The final chapter provides a list of resources in emergency planning, psychosocial recovery, training and education courses, technical assistance, and other organizations and examples of existing programs, reports, sample plans, and guides written for children. Providing guidance for the family and community, this book discusses the types of efforts that can be undertaken in all phases of emergency management including preparation, immediate response, and recovery. Catalog no. K11712, December 2010, 394 pp. ISBN: 978-1-4398-3766-5, $83.95 / £53.99 Also available as an eBook

Also available as an eBook

For more information and complete contents, visit


Disaster Planning & Recovery Community Disaster Recovery and Resiliency

Disaster Management Global Problems and Local Solutions

Exploring Global Opportunities and Challenges

Rajib Shaw Graduate School of Global Environmental Studies, Kyoto University, Japan

Edited by

R.R. Krishnamurthy

DeMond Shondell Miller and Jason David Rivera Rowan University, Glassboro, New Jersey, USA

Emphasizing non-traditional approaches to disaster recovery and rebuilding communities, this book brings together leading research on the ways various societies have experienced disasters, learned from them, and revised their thinking about building resiliency pre- and postdisaster. It includes numerous case studies that illustrate the difficulties that persist as societies attempt to overcome challenges and rebuild more disaster-resilient communities. All chapters offer diverse community examples that form a framework for comparing best practices. Catalog no. AU8822, October 2010, 634 pp. ISBN: 978-1-4200-8822-9, $99.95 / £63.99

Department of Applied Geology, University of Madras, Chennai, India

Data in recent years shows an increase in the physical, social, and economic impacts of natural disasters. While a global perspective of disaster management is necessary, it is also important to emphasize local solutions. This volume targets some of the key issues of disaster management on the local level, focusing on innovative research and applications. It explores different types of hazards and disasters and examines the interrelated themes of risk and vulnerability, technology, education, and community. Catalog no. N10107, August 2009, 608 pp. ISBN: 978-1-4398-1430-7, $102.95 / £65.99

Also available as an eBook

Critical Infrastructure Homeland Security and Emergency Preparedness, Second Edition

The Human Side of Disaster

Robert Radvanovsky

Thomas E. Drabek

CIPS, Infracritical, Geneva, Illinois, USA

University of Denver, Colorado, USA

Allan McDougall Evolutionary Security Management Inc., Arnprior, Ontario, Canada

Keeping pace with changes in laws and policies made by the Department of Homeland Security, this new edition continues to provide an invaluable resource for emergency managers and disaster response professionals as well as public safety officials and those involved with maintaining infrastructure. It adds information to reflect the development of the Incident Command System (ICS) and the total revision of National Response Plan (NRP), which were implemented in 2008. Catalog no. AU9527, December 2009, 318 pp. ISBN: 978-1-4200-9527-2, $99.95 / £65.99 Also available as an eBook


Based on years of research, this volume scientifically evaluates human responses in the face of disasters in ways that that will inform emergency response teams and teach them how to anticipate human response. The book presents four stories, each one rooted in actual events surrounding a particular disaster. They look at how attention to preparedness, response, recovery, and mitigation affect outcome and consider whether one can predict how any two people will respond. The book also examines long-term effects and issues of recovery. Catalog no. K10428, August 2009, 288 pp. ISBN: 978-1-4398-0864-1, $64.95 / £41.99 Also available as an eBook

SAVE when you order online at

Disaster Planning & Recovery Communicating Emergency Preparedness Strategies for Creating a Disaster Resilient Public Damon P. Coppola Bullock and Haddow, LLC, Reston, Virginia, USA

Erin K. Maloney Michigan State University, East Lansing, USA

An examination of pre-disaster awareness communication, this volume delineates the best ways to communicate disaster risk factors, response plans, and emergency procedures to the public without fomenting panic. The authors provide an overview and history of public disaster preparedness education and then proceed to explore risk management, the development of a campaign strategy, and how to obtain funding. The book includes case studies that identify various public awareness campaigns that have been successfully conducted in different communities. Catalog no. AU6510, May 2009, 264 pp. ISBN: 978-1-4200-6510-7, $75.95 / £47.99 Also available as an eBook

Disaster Recovery

Global Warming, Natural Hazards, and Emergency Management Edited by

Jane A. Bullock, George D. Haddow and Kim S. Haddow Scientists predict that the frequency and severity of weather-related disaster events will increase dramatically. This book provides a clear procedural roadmap demonstrating how to reduce the impacts of future disaster events which may be intensified by the effects of global warming. Case studies describe real-world experiences in community-based hazard mitigation and illustrate how efforts should be designed and implemented. The authors explain how to develop community partnerships that include all stakeholders and identify staffing and resource requirements for successful programs. Catalog no. AU1829, October 2008, 304 pp. Soft Cover ISBN: 978-1-4200-8182-4, $67.95 / £43.99 Also available as an eBook

Natural Hazards Analysis Reducing the Impact of Disasters

Brenda D. Phillips

John C. Pine

Oklahoma State University, Stillwater, USA

Appalachian State University, Boone, North Carolina, USA

This core text tackles the myriad recovery issues faced by federal, state, and local emergency managers in a long-term disaster recovery situation. Topics include recovery planning, housing, debris management, public and private sector recovery, and historical and cultural preservation. The author also discusses environmental recovery, social and psychological recovery and services, voluntary organizations, federal assistance programs, grant-writing, and donations management. Each chapter features key terms, learning objectives, highlighted practical applications, review questions and case studies.

With an emphasis on hazard analysis, this volume assesses critical preparedness issues that emergency personnel must face in the event of a disaster. The author discusses the nature and consequences of such hazards and examines strategies at the individual, organizational, community, and regional levels. He presents a systematic process for hazard identification, vulnerability determination, and consequence assessment for natural, built, and human environments. Covering every step, from planning and preparedness to mitigation, response, and recovery, the book provides information on modeling, loss estimation, risk perception and definition, and sustainability.

Catalog no. AU7420, May 2009, 546 pp. ISBN: 978-1-4200-7420-8, $75.95 / £47.99

Catalog no. AU7038, October 2008, 304 pp. ISBN: 978-1-4200-7038-5, $89.95 / £57.99

Also available as an eBook

Also available as an eBook

For more information and complete contents, visit


Emergency Response New!


Principles of Emergency Management

Critical Incident Management A Complete Response Guide, Second Edition

Hazard Specific Issues and Mitigation Strategies

Vincent Faggiano, John McNall, and Tom Gillespie

Edited by

BowMac Educational Services, Inc., Honeoye Falls, New York, USA

Michael J. Fagel Aurora Safety, Illinois, USA

Principles of Emergency Management: Hazard Specific Issues and Mitigation offers preparedness and mitigation recommendations for advanced emergency planning. Because disasters are so unpredictable, advance planning is needed to effectively respond to and mitigate the potential effects of such events. Whether a disaster is natural or man-made, accidental or deliberate, the best way to protect the public is by implementing an integrated emergency management system incorporating all potential stakeholders through all phases of the event. As such, the book suggests best practices for drills, exercises, and pre-event team building and communication. More than a dozen contributors offer their professional expertise on a wide variety of topics, including: • Emergency operations center management • Continuity planning of vital services in the aftermath of a disaster • The role of the public health official • Developing public-private partnerships • Specific types of disasters, including terrorism, agroterrorism, pandemics, and active shooter incidents • Mass care, sheltering, and human services • The special needs of children in disasters • Traditional and social media and their impact on emergency management The book is a valuable planning resource for those tasked with managing operations to prepare for, mitigate, and respond to disasters. Catalog no. K13259, December 2011, 585 pp. ISBN: 978-1-4398-7120-1, $89.95 / £57.99 Also available as an eBook

Filled with tactical direction designed to prevent, contain, manage, and resolve emergencies efficiently and effectively, this volume provides proven methodologies applicable to a host of scenarios. Topics include stabilizing the scene, leadership style and techniques, guidelines for responding to hazardous materials and weapons of mass destruction incidents, stress management, maintaining continuity of business, and the roles of high-level personnel in setting policy and direction for the response and recovery efforts. Catalog no. K13455, November 2011, 246 pp. ISBN: 978-1-4398-7454-7, $79.95 / £49.99 Also available as an eBook


Radiation Injury Prevention and Mitigation in Humans Kedar N. Prasad, Ph.D. Premier Micronutrient Corporation, Antioxidant Research Institute, Novato, California, USA

Nuclear bomb explosions by terrorists and unintentional nuclear conflicts remain possibilities as long as nations have nuclear arsenals. At present, there are no strategies to provide biological protection before and/or after radiation exposure. This book identifies and examines nontoxic and cost-effective agents that could be effective in preventing and mitigating acute radiation damage before and after exposure. The text discusses the implementation of physical and biological protection strategies for first responders at risk for exposure. Catalog no. K13439, March 2012, 302 pp. ISBN: 978-1-4398-7424-0, $89.95 / £57.99 Also available as an eBook


SAVE when you order online at

Emergency Response Forthcoming!

Hazardous Material (HAZMAT) Life Cycle Management Corporate, Community and Organizational Planning and Preparedness Robert Jaffin American Military University, New York, New York, USA

Focusing on lifecycle management of hazardous materials, this book promotes an understanding of the relevant supply chain management principles from a logistics perspective. This approach has the potential to reduce or eliminate hazardous materials, organizational liability, and hazardous waste management and disposal costs. The text collectively addresses threat and vulnerability assessment/ mitigation, hazardous material evaluation and management techniques, and methods for minimizing disruptions to the daily flow of activities and risks to people, the environment, and property. Catalog no. K13422, September 2012, c. 448 pp. ISBN: 978-1-4398-7387-8, $119.95 / £76.99 Also available as an eBook


Preparedness and Response for Catastrophic Disasters Rick Bissell University of Maryland, Baltimore, USA

Hurricane Katrina provided clear evidence that catastrophes are both qualitatively and quantitatively different from other disasters, illustrating that we are not prepared for events that simultaneously affect multiple states, large and diverse populations, multiple sectors of infrastructure, and the global economy. This book examines how catastrophes can dramatically affect human populations; discusses the unique logistical, planning, and response challenges posed by catastrophic disasters; and addresses new ways of preparing for these events and their aftermath. Catalog no. K14860, September 2012, c. 525 pp. ISBN: 978-1-4665-1189-7, $79.95 / £49.99

Managing Spontaneous Community Volunteers in Disasters A Field Manual Lisa Orloff World Cares Center, New York, USA

“Lisa Orloff has done an excellent job in both identifying a significant opportunity in emergency response and meticulously outlining how that opportunity can best be leveraged.” —Dr. Michael Chumer, New Jersey Institute of Technology

History has demonstrated that it is not only possible, but extremely cost effective, to organize and empower community volunteers to serve their own neighborhoods during times of crisis. Laying out the rationale and process by which emergency managers, community leaders, and non-governmental aid organizations can effectively harness volunteer resources, Managing Spontaneous Community Volunteers in Disasters: A Field Manual explains how to engage, train, and utilize spontaneous unaffiliated community volunteers (SUCVs). Complete with templates that can be modified to suit the needs of any community, this accessible manual provides the tools to: • Assess an agency’s needs and challenges • Develop internal and external protocols to manage SUCs • Establish effective spot screening and selection methods • Engage community members in information-sharing and outreach campaigns Designed to prepare leaders to handle any scale of emergency, the book supplies the skill set needed to enable volunteers to respond to hazards safely and effectively. Integrating Orloff’s on-the-ground experience with community organizing, a decade of research data on disaster management protocols, and recent psychosocial research, the book makes a strong case as to why community involvement in disaster response has such a positive impact on a community’s resilient recovery. Catalog no. K10962, April 2011, 323 pp. ISBN: 978-1-4398-1833-6, $79.95 / £49.99 Also available as an eBook

For more information and complete contents, visit


Emergency Response The Four Stages of Highly Effective Crisis Management

Cross-Training for First Responders

How to Manage the Media in the Digital Age

Gregory S. Bennett

Jane Jordan-Meier

Helmetta, New Jersey, USA

Jane Jordan & Associates, Green Valley, California, USA

Presenting cutting-edge media communication solutions, this book explains how to choose the appropriate language and media outlet to properly convey a critical message during and after a crisis. Unveiling the secrets of how to manage the media in a crisis, it examines how rapidly evolving social media and Web 2.0 technologies have changed the crisis management landscape. The text includes a wealth of helpful tools, including guidelines, checklists, and case studies that illustrate best practices. Catalog no. K12481, March 2011, 320 pp. ISBN: 978-1-4398-5373-3, $59.95 / £38.99

Enabling first responders to be better prepared in an emergency, this volume explains the training required to prevent a lack of situational awareness by those thrust into unfamiliar territory during crisis events. Covering exercises and training curricula, it prepares first responders to face multiple threats from multiple sources. It also discusses how to turn conflicts between various responding agencies into collaboration and explores grant opportunities and the rising trend of on-line training courses. Catalog no. K11295, June 2010, 283 pp. ISBN: 978-1-4398-2653-9, $72.95 / £45.99 Also available as an eBook

Also available as an eBook

Principles of Emergency Management and Emergency Operations Centers (EOC)

Social Vulnerability to Disasters Edited by

Brenda D. Phillips, Deborah S.K. Thomas, Alice Fothergill, and Lynn Blinn-Pike

Michael J. Fagel, PhD, CEM Aurora Safety, Founder, CEO, Illinois, USA

The culmination of many years of experience, this book discusses the process and systems to be considered in emergency planning and preparedness efforts. The author details the needs for appropriate training and planning, stressing the importance of consistency with the various national preparedness initiatives. The book covers the federal guidelines of the National Incident Management System (NIMS) and the standards of the Incident Command System (ICS) and includes helpful checklists and sample documents for improving operations.

An examination of the social construction of disasters, this book demonstrates how the characteristics of an event alone do not create the tragedies that unfold. It explores why social vulnerabilities exist, what can be done to foster change, and how to reduce damage. Each chapter provides strategies for community-based mitigation by engaging those populations most at risk. Based on materials developed for the FEMA Higher Education Project, the book is an empirically-based guide on incorporating social aspects of disasters into emergency management, public administration, and social service programs.

Catalog no. K11747, December 2010, 430 pp. ISBN: 978-1-4398-3851-8, $83.95 / £53.99

Catalog no. AU7856, August 2009, 406 pp. ISBN: 978-1-4200-7856-5, $75.95 / £47.99

Also available as an eBook

Also available as an eBook


SAVE when you order online at

General/Other New!

Introduction to Emergency Management Brenda D. Phillips and David M. Neal Oklahoma State University, Stillwater, USA

Gary R. Webb University of North Texas, Denton, USA

The ultimate goal of every emergency management professional is to help citizens and communities prepare for natural, technological, or terrorist threats in order to mitigate damage and save lives. Providing an insider’s glimpse into this rewarding career, Introduction to Emergency Management engages readers in real-life case studies, integrating scientific findings with practitioner viewpoints to reveal the challenge of a field in service of communities and people at risk from disasters. Beginning with a history of emergency management, the book defines core concepts to help readers understand the field, explore the relevance and types of disaster research, and examine trends behind disasters and new and emerging hazards. From there, it goes on to outline various career tracks within emergency management with a focus on core competencies, ethical practice standards, certification issues, and the responsibilities of the emergency manager. Boxed features written by graduates of emergency management programs and expert practitioners from around the world provide real world insights. The book discusses in detail the various phases of the disaster cycle—including preparedness and planning, the response phase, short- and long-term recovery, and structural and nonstructural mitigation. Core chapters conclude with guidance on working and volunteering in each of these phases. Final chapters explore the role of public and private sector partnerships and non-governmental organizations in emergency management. A concluding chapter offers guidance to students seeking careers and further study in the field.


Pandemic Planning J. Eric Dietz and David R. Black Purdue University, West Lafayette, Indiana, USA

Preparedness and rigorous planning on community, state, and regional levels are critical to containing the threat of pandemic illness. This volume describes the processes necessary for the efficient and effective preparation, prevention, response, and recovery from a pandemic threat. It guides plan development and provides solutions to common strategic, ethical, and practical challenges to pandemic preparedness. The authors’ collaboration with national research leaders and community stakeholders has enabled them to assemble the most current and essential information available. Catalog no. K12692, March 2012, 330 pp. ISBN: 978-1-4398-5765-6, $79.95 / £49.99 Also available as an eBook


Smart Grid Security An End-to-End View of Security in the New Electrical Grid Gilbert N. Sorebo SAIC, McLean, Virginia, USA

Michael C. Echols Utility Security Professional, Litchfield Park, Arizona, USA

Throughout the book, contributors from around the world offer their insight and experience on a host of disasters. Each chapter begins with learning objectives and includes discussion questions, references, and additional resources.

The Smart Grid has the potential to revolutionize electricity delivery systems. Therefore, the security of its infrastructure is a vital concern. This volume explores the important techniques, challenges, and forces that will shape how we achieve a secure twenty-first century electric grid. The authors discuss how metering technology is being implemented and the likely threats and vulnerabilities that utilities will face. They address the home area network (HAN) and examine distribution and transmission along with distributed generation, micro-grids, and operations.

Catalog no. K11506, October 2011, 517 pp. ISBN: 978-1-4398-3070-3, $59.95 / £38.99

Catalog no. K12610, December 2011, 328 pp. ISBN: 978-1-4398-5587-4, $79.95 / £49.99

Also available as an eBook

Also available as an eBook

For more information and complete contents, visit




Homeland Security

Transportation Security Handbook

What Is It and Where Are We Going?

Daniel C. Goodrich and Frances L. Edwards

Amos N. Guiora

Cupertino, California,USA

The University of Utah, Salt Lake City, USA

Few transportation professionals are trained to ensure the continuity of service of transportation assets. This book addresses the challenges of developing a comprehensive security program in the interrelated environment of emergency management, continuity of operations, continuity of business, and supply chain management. The text covers a broad range of topics, including natural hazards, technological hazards, and humancaused hazards, to equip professional transportation managers with the knowledge to effectively manage the security of transportation assets.

With the ten-year anniversary of 9/11 now behind us, one critical question persists. Have policies enacted to protect us from terrorist attacks made us safer, or have they merely mollified the concerned public with a false sense of security? This volume combines professional experiences, personal reflections, and academic scholarship to provide a realistic assessment of current policy effectiveness. It suggests ways to prioritize limited resources and offers insight into what should be the predominant considerations.

Catalog no. K12044, September 2012, c. 384 pp. ISBN: 978-1-4398-4576-9, $69.95 / £44.99

Catalog no. K11730, August 2011, 199 pp. ISBN: 978-1-4398-3818-1, $79.95 / £49.99

Also available as an eBook

Also available as an eBook


Risk Assessment for Water Infrastructure Safety and Security

Death, Decomposition, and Detector Dogs From Science to Scene Susan M. Stejskal

Anna Doro-on

Recover K9 Search and Rescue, Inc., Vicksburg, Michigan, USA

RAMCO Companies, Inc., Ventura, California, USA

This volume helps police investigators and Human Remains Detection K9 handlers understand the basics of forensic taphonomy and how to most effectively use a human remains detection (HRD) K9 as a locating tool. The book covers basic anatomy and the physiology of canine olfaction along with the unique characteristics that allow a dog to work. Using concise explanations and numerous photographs, it discusses the stages of decomposition, the chemical profile of odor from human remains, factors affecting odor dispersion, and the use of mapping and weather data. The final chapter provides case reports about decedents found in different locations in a variety of environmental conditions.

A critical infrastructure vital to the security of the United States, the water supply system remains largely unprotected from terrorist threat. This volume provides a quantitative risk assessment methodology for protection against terrorist contamination, vandalism, and other threats to water supply systems. It includes processes and models for security and safe facility operations; an integrated model to the risk assessment of surface water, dams, wells, wastewater treatment facilities, reservoirs, and aqueducts of large urban regions; and a discussion on the development of intelligence analysis incorporating risk assessment for terrorism prevention.

Catalog no. K13653, August 2012, Soft Cover ISBN: 978-1-4398-7837-8, $59.95 / £38.99

Catalog no. K12466, August 2011, 431 pp. ISBN: 978-1-4398-5341-2, $119.95 / £76.99

Also available as an eBook

Also available as an eBook


SAVE when you order online at


Healthcare Crime Investigating Abuse, Fraud, and Homicide by Caregivers Kelly M. Pyrek

Terrorism and Homeland Security Perspectives, Thoughts, and Opinions Edited by

Dale L. June

Glendale, Arizona, USA

Henley-Putnam University, Los Angeles, California, USA

Through in-depth personal interviews with a notable list of forensic experts, this book covers equivocal deaths in healthcare settings. It describes the red flags indicating illicit behavior of medical professionals; considers contributing factors such as personnel shortages and lack of oversight; catalogs methods of injury, assault, and murder along with descriptions of forensic evidence for each; and provides insight on other healthcare-related crimes including assisted suicide and narcotics theft. Practical advice from experts covers the intervention, prevention, and prosecution of perpetrators.

This volume brings together the work of academic researchers and law enforcement and intelligence personnel to present a sober appraisal of the issues surrounding the current state of our security infrastructure. Topics discussed include the history of terrorism and the rise of transnational anti-Western Islamism, an analysis of a captured Al Qaeda training manual, suicide bombing, political propaganda, cooperative antiterrorism efforts among nations, insider threats, intelligence gathering, and terrorist threats south of the border.

Catalog no. K11074, January 2011, 332 pp. ISBN: 978-1-4398-2033-9, $79.95 / £49.99

Catalog no. 93061, September 2010, 395 pp. ISBN: 978-1-4200-9306-3, $83.95 / £53.99

Also available as an eBook


Practical Bomb Scene Investigation

Homeland Security

Second Edition

An Introduction to Principles and Practice

James T. Thurman

Charles P. Nemeth

Eastern Kentucky University, Richmond, USA

John Jay College of Criminal Justice, New York, USA

Now in its second edition, this volume explores the investigative process that improvised explosive device (IED) specialists undertake at the scene of an explosion, enabling investigators to find the evidence and then make sense of what is found. This edition includes information on detonation pressure and chapters on estimating the explosives weight of the IED and investigating a post-blast scene in a hostile environment. It also includes a glossary and instructions on how to prepare an Investigative Report.

Covering recent developments in the make-up, organization, and strategic mission of the U.S. Department of Homeland Security, this book offers valuable insights into the roles of multijurisdictional agencies and various stakeholders at all levels of government, providing objective treatment of each of the core components that encompass the DHS’s mission. The book presents a complete overview of DHS organizational and strategic initiatives, explores the challenges facing government agencies, and identifies the role DHS should play in national and domestic security.

Catalog no. K11031, January 2011, 519 pp. ISBN: 978-1-4398-1959-3, $99.95 / £63.99 Also available as an eBook

Catalog no. AU8567, December 2009, 542 pp. ISBN: 978-1-4200-8567-9, $75.95 / £47.99 Also available as an eBook

For more information and complete contents, visit


General/Other Airport and Aviation Security


Aviation and Airport Security

U.S. Policy and Strategy in the Age of Global Terrorism Bartholomew Elias

Terrorism and Safety Concerns, Second Edition

U.S. Congressional Research Service, Washington, D.C., USA

Kathleen Sweet West Fork, Arkansas, USA

Beginning with a historical backdrop describing the dawn of the age of global terrorism in the 1960s and continuing up until the present time, this volume demonstrates the broad social and political context underlying the aviation security system that was in place on September 11th and the system that has evolved in response to the 9/11 attacks. Examining ongoing threats and vulnerabilities, the book describes how they have come to shape U.S. policy and strategy.

Considered the definitive handbook on the terrorist threat to commercial airline and airport security, USAF Lieutenant Colonel Kathleen Sweet’s seminal resource examines the history of aviation security and compares current security practices with those of other countries. It also covers TSA changes in security, policy, and training since 9/11; discusses several aviation terrorist incidents; shows how security considerations are factored into business processes; and explores various terrorist groups.

Catalog no. AU7029, September 2009, 439 pp. ISBN: 978-1-4200-7029-3, $87.95 / £55.99 Also available as an eBook

Catalog no. AU8165, December 2008, 384 pp. ISBN: 978-1-4200-8816-8, $87.95 / £55.99 Also available as an eTextbook

Lloyd's MIU Handbook of Maritime Security

Port Security Management

Edited by

Rupert Herbert-Burns

Kenneth Christopher

Lloyd's MIU, London, UK

Park University, Parkville, Missouri, USA

Sam Bateman

Focusing on organizational structure, risk and vulnerability analysis, and operations oversight, this book explores security management in the port facility environment. Beginning with a historical perspective and addressing the needs of business and homeland safety, the book explores the ground-level issues that must be managed by security managers in concert with port directors and law enforcement. It also examines cargo security, personnel security, guard force management, and the role of technology. Catalog no. AU6892, March 2009, 336 pp. ISBN: 978-1-4200-6892-4, $96.95 / £61.99 Also available as an eBook

Centre for Maritime Policy, University of Wollongong, Australia

Peter Lehr School of International Relations, St. Andrews, Scotland

Authored by a team of expert contributors, this book identifies and assesses the relevant issues inherent in developing and implementing maritime security measures. It examines the new maritime security environment, including the different but complementary interests of the shipping industry and national regulatory agencies. The coverage includes analyses of the different threats to maritime security and how they are perceived by different actors in the maritime domain. Catalog no. AU5480, September 2008, 400 pp. ISBN: 978-1-4200-5480-4, $97.95 / £61.99 Also available as an eBook


SAVE when you order online at

Security Management Forthcoming!

21st Century Security and CPTED Designing for Critical Infrastructure Protection and Crime Prevention, Second Edition Randall I. Atlas Atlas Safety and Security Design, Inc., Fort Lauderdale, Florida, USA

Based on the tenets of Crime Prevention Through Environmental Design (CTPED), the updated edition of 21st Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention blends new design elements with the latest best-practice security measures. Illustrated with hundreds of photographs and line drawings, the text emphasizes consideration of security aspects throughout the design process, including how to take stock of open spaces, avoid blind corners, and use landscaping to create secure spaces. The author updates these classic principles to include the latest design capabilities given new security and building construction technologies. New to this Edition:


Managing the Insider Threat No Dark Corners Nick Catrantzos University of Alaska, Fairbanks, USA

The first book to treat insider threat defense as a management challenge, Managing Insider Threat: No Dark Corners offers practical tips on how to develop a positive ears-to-the-ground work culture, utilize metrics, improve personnel assessments, and identify warning indicators. It also explains how to utilize a host of other techniques to combat potential internal dangers. Addressing the area the Secret Service, FBI, and NSA termed the Number 1 security threat to organizations and enterprises, the author combines theory with real-world practices to counter insider threat. Chapters cover IT/information security, but also focus on other internal threats to security. Features: • Combines theory with real-world practices • Treats insider threats as a management challenge • Demonstrates how to use metrics and recognize warning indicators • Includes questions and exercises for group projects • Presents case studies to clarify material

• Chapter on connecting the dots between theory and practice • Updated chapter on the ATRiM Risk assessment model • Updated chapter on Codes and Standards and a Smart Growth Urban Planning Code for CPTED • Chapter entitled Lean, Green, and Mean: Security versus Sustainability • Revised chapters on lighting to include LED, induction lighting, Dark Skies, and Light Pollution • Fast Food or Fast Money?: a case study of Dunkin Donuts stores repeatedly robbed and burglarized • Updated chapter on measuring success • Updated chapter on implementing CPTED • Update on current terrorist threats and evolving technologies for mitigation

The Problem and Limits of Accepted Wisdom New Research and Contrarian Findings Agents of Change—Corporate Sentinels Agents of Change—Leaders and Copilots Rethinking Background Investigations Deception and the Insider Threat Lawful Disruption of the Insider Threat Existential Insider Threats Other Insider Threats Consulting for No Dark Corners Implementation Answer Guide Appendices

Catalog no. K13768, July 2012, c. 640 pp. ISBN: 978-1-4398-8021-0, $99.95 / £63.99

Catalog no. K13375, May 2012, c. 363 pp. ISBN: 978-1-4398-7292-5, $69.95 / £44.99

Also available as an eBook

Also available as an eBook


For more information and complete contents, visit


Security Management New!


Handbook of Surveillance Technologies

Psychological Aspects of Crisis Negotiation

Third Edition

Second Edition

J.K. Petersen

Thomas Strentz, PhD

Computer Consultant, Writer, Educator, Bellingham, Washington, USA

Forensic Behavioral Sciences Inc., Fredericksburg, Virginia, USA

From officially sanctioned, high-tech operations to budget spy cameras and cell phone video, this updated and expanded edition of a bestselling handbook reflects the rapid and significant growth of the surveillance industry. The Handbook of Surveillance Technologies, Third Edition is the only comprehensive work to chronicle the background and current applications of the full range of surveillance technologies—offering the latest in surveillance and privacy issues. This volume updates its bestselling predecessor with discussions on social media, GPS circuits in cell phones and PDAs, new GIS systems, Google street-viewing technology, satellite surveillance, sonar and biometric surveillance systems, and emerging developments. Presenting comprehensive coverage from sonar and biometric surveillance systems to satellites, it considers spy devices, legislation, and privacy issues from their historical origins to current applications. It includes recent controversies and changes in the structure of the intelligence community at home and abroad. The chapters are designed to be read in any order, enabling readers to browse as a professional reference on an as-needed basis, or use as a text for Surveillance Studies courses Using a narrative style and more than 950 illustrations, this handbook will help journalists/ newscasters, privacy organizations, and civic planners grasp technical aspects while also providing professional-level information for surveillance studies, sociology and political science educators, law enforcement personnel, and forensic trainees. It includes extensive resource information for further study at the end of each chapter. Covers the full spectrum of surveillance systems, including:

"… should be mandatory reading for any crisis negotiator who considers him/herself a professional." —Russ Moore, Sergeant, San Diego Sheriff’s Department

While there are many books on crisis negotiation, most of the current literature focuses on the history and mechanics of this dynamic process, leaving out critical elements that are required for a successful encounter with a hostage-taker or other malfeasant. Psychological Aspects of Crisis Negotiation, Second Edition explores the methods and strategies for confronting the nine types of subjects typically encountered in hostage/suicide sieges by correctional staff and law enforcement crisis negotiators. Drawn from articles published by Thomas Strentz while serving at the FBI Academy* along with written versions of lectures developed and delivered since his retirement, the book highlights psychological dynamics of negotiations as they apply to the negotiator, the hostage, and the subject. It discusses the predictors of surrender versus the need for a tactical intervention and examines the phases of a hostage crisis and the changing focus as the crisis develops. Referencing historical events such as The Bay of Pigs invasion and the Challenger and Columbia incidents, the book demonstrates how faulty group decision making can spell tragedy. Enhanced with case studies to put the material into context, this second edition also includes new chapters on the first responder, hostage survival, and the Islamic belief system and culture. Steeped in sage advice from a national expert, this volume arms those tasked with confronting dangerous offenders with the knowledge and tools they need to subvert disaster and ensure the preservation of human life.

Radar • Sonar • RF/ID • Satellite • Ultraviolet • Infrared • Biometric • Genetic • Animal • Biochemical • Computer • Wiretapping • Audio • Cryptologic • Chemical • Biological • X-Ray • Magnetic

*Articles were reviewed by the Academy Editorial/Review Board and approved by the Bureau for publication.

Catalog no. K13389, January 2012, 1040 pp. ISBN: 978-1-4398-7315-1, $139.95 / £89.00

Catalog no. K13758, December 2011, 367 pp. ISBN: 978-1-4398-8005-0, $69.95 / £44.99

Also available as an eBook

Also available as an eBook


SAVE when you order online at

Security Management New! New!

Investigations in the Workplace Second Edition Eugene F. Ferraro, J.D., CPP Business Controls, Inc., Greenwood Village, Colorado, USA

The process of investigation is dynamic and fluid. The approach must be reasonable and the investigator flexible. However, in order to be successful, every investigation must have a meaningful purpose and be executed ethically and lawfully. Inevitably, employers must invest time, money, and patience to ensure they obtain demonstrable and actionable results. To achieve this and reduce the exposure to unnecessary business disruptions and litigation, every workplace investigation must by driven by process. Investigations in the Workplace, Second Edition provides both novice and experienced investigators with the most insightful and useful information available on the methods and processes for the proper and safe investigation of workplace crime and misconduct. Gleaned from Eugene Ferraro’s nearly three decades of experience, the book is designed for easy reading and use—dispelling common myths and presenting new approaches, methods, and strategies. Revised and updated with more methods, techniques, and case studies, this powerful book also includes new diagrams, checklists, and visuals to help readers put the material in context and make their investigations soar. Each chapter begins with Key Learning Points and is supplemented with boxed Tips, Traps, and Common Mistakes. An exhaustive appendix includes a glossary of common investigative terms, sample surveillance and investigative reports, advice on digital evidence, and more. This volume is a must-read for corporate investigators and security professionals, human resources and law enforcement personnel, attorneys, and anyone else tasked with conducting or supervising workplace investigations. Catalog no. K10762, February 2012, 603 pp. ISBN: 978-1-4398-1480-2, $79.95 / £49.99 Also available as an eBook

Pre-Employment Background Investigations for Public Safety Professionals Frank A. Colaprete Justice Systems Solutions, LLC, Rochester, New York, USA

This comprehensive guide is designed to meet the contemporary needs of pre-employment screeners in public safety organizations. The book describes processes, techniques, and information sources that also have implications for many private sector organizations that conduct these types of investigations. The unique presentation provides complete guidance on the investigative, legal, procedural, organizational, and social issues that must be considered when completing the screening process of bringing new employees into the organizational fold. It also addresses medical and psychological standards. Catalog no. K14195, May 2012, c. 608 pp. ISBN: 978-1-4398-9385-2, $99.95 / £63.99 Also available as an eBook

Coming Soon!

Power, National Security, and Transformational Global Events Challenges Confronting America, China, and Iran Edited by

Thomas A. Johnson University of Wisconsin-Parkside, Kenosha, USA

The massive economic changes that have occurred as a result of the 2008 recession have impacted not only America but the entire world. This book identifies major challenges confronting America as a result of the major transformational global events occurring in China, Iran, and the Middle East. Expert contributors provide unique insights into current and future possibilities that can impact the United States. They also describe the immense policy problems and limited choices that America faces. Catalog no. K13956, June 2012, c. 400 pp. ISBN: 978-1-4398-8422-5, $99.95 / £49.99 Also available as an eBook

For more information and complete contents, visit


Security Management Forthcoming!

Trade Secret Theft, Industrial Espionage, and the China Threat


Security Training and Education Clinton L. Rand Rand & Associates, Inc., Thornton, New Hampshire, USA

Carl Roper

Designed for general security and Homeland Security programs as well as private sector and government training programs, Security Training and Education examines optimal teaching and training methodologies, including how to best organize an engaging and relevant curricula. It explains the roots of security education and the different requirements for training adult learners versus academic curricula. Reflecting the influx of professionals returning to school to obtain higher education degrees, the text also discusses the growing number of online learning programs.

China may be the greatest threat to the world when it comes to the theft of economic information, be it business, scientific and technical inventions, patents, or R&D secrets. News articles and recent headlines abound reveal how China is targeting and breaching private companies' security measures.

Richmond, Virginia, USA

Contents: Toward a More Secure Future. Security in the United States. Security in a Complex World. An Introduction to Learning. Security in Training and Education. How Security Professionals Learn and Acquire Expertise. Institutional Approaches and Methods of Instruction. Program and Training Development Strategies and Goals. Methods of Instruction and Evaluation in Adult Education. Forms of Educative Activities. Security in Higher Education. Changing Landscape of Security Higher Education. Curriculum Development. Teaching Methodologies, Techniques and Aids. Fulfilling Course Objectives and Preparing Students for the "Real World”. Conclusions. The Future of Security Training and Education. Appendix: Sources of Security Education Material. Selected References. Index.

About the Author: Clint Rand is a retired FBI special agent. In 23 years with the FBI, Rand worked foreign counter-intelligence and counterterrorism matters in several major U.S. cities. He developed the FBI's first foreign counter-intelligence training program in New York City and developed and taught disaster management and other security related courses at several police academies and colleges around the country. He is currently the founder and president of Rand & Associates, Inc., which has provided a variety of security services to a number of institutions.

Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage, beginning with a current look at espionage around the world by other nations, and then concentrating on the China threat. The book examines what information China has targeted for its massive collection effort, how they prepare for collection, and what our Congress and various federal agencies are saying about this phenomenon. It discusses what they have learned during various Congressional Hearings about China's massive effort and provides expert data from both the CIA and the FBI. Finally, the book discusses what individuals and corporations should be doing to protect valuable information, both here and abroad. Contents: Introduction. A Half-Century of Chinese Intelligence-Gathering Activities. We Are Not Alone: Economic Espionage Around the World. The Background of Economic Espionage. The Economic Espionage Act. The U.S. Response. Who China Targets. The China Spy Manual. The Intelligence Cycle and the Collection Effort. Corporate Rivals. Sources of Information. Internet Exploitation: The Web, Your Computer, and your IT System. Intellectual Property Protection in China. Patents, Copyrights, Inventions and Trade Secrets. Protecting your Data in China and at Home.

Catalog no. K14353, November 2012, c. 320 pp. ISBN: 978-1-4398-9938-0, $59.95 / £38.99 Also available as an eBook

Catalog no. K14422, August 2012, c. 224 pp. ISBN: 978-1-4665-0217-8, $69.95 / £44.99 Also available as an eBook


SAVE when you order online at

Security Management Forthcoming!

Security ROI Security Program Value Creation and Demonstration Thomas L. Norman, CPP/PSP/CSC Protection Partners International, Houston, Texas, USA & Beirut, Lebanon

Tackling a notorious problem for C-level- and security executives, Security ROI: Security Program Value Creation and Demonstration explores how to determine the "right" budget for an organization's security program. The book introduces a value demonstration model, applicable to security, which will be instrumental in guiding executives away from a Pure-ROI discussion about the security program and towards a "Business Value" analysis. This approach allows executives to better judge the results of all their investments, including the security program, and helps them to look at security not as a cost line item, but something that adds to the continuity of operations and business resiliency and reduces exposure to risk and liability. Features: • Helps readers determine the unrealized value of their organization's security program • Presents methods for improving the value of a security program to an organization • Explains how to craft a financial model that illustrates present and future program goal values • Supplies useful metrics for determining how a program fulfills its mission • Includes tools to help readers reinforce the value of their security program to upper management Contents (Abridged): What is Security ROI? Security and ROI. ROI vs. Value. The ROI Value Funnel. Security Program Value Creation. Security's Business Value. The Value of Crime Prevention. Business Sustainability Value Factors. AntiTerrorism Value Factors. Security Program Value Demonstration. Business Impact Analysis Approach. Business Mission Analysis Approach. AntiTerrorism Analysis Approach. ...

Catalog no. K13261, September 2012, c. 475 pp. ISBN: 978-1-4398-7125-6, $69.95 / £44.99

Comparative Emergency Management Examining Global and Regional Responses to Disasters Edited by

DeMond Shondell Miller and Jason David Rivera Rowan University, Glassboro, New Jersey, USA

A host of natural and man-made disasters have plagued the world in the 21st century, many with significant global impact. The need for better emergency management policies, procedures, and cooperation among nations is evident. This volume demonstrates ways to recognize and reduce regional infrastructure vulnerability through collaboration among different geographical areas of the world. It examines ways different societies have responded to environmental threats using innovative methods to cope with their vulnerabilities to disaster. Catalog no. K10271, June 2011, 469 pp. ISBN: 978-1-4398-0491-9, $99.95 / £63.99 Also available as an eBook

Protective Operations A Handbook for Security and Law Enforcement Glenn P. McGovern Santa Clara County District Attorney's Office, Bureau of Investigation, San Jose, California, USA

A reference for law enforcement and security organizations tasked with protecting the welfare of an individual or groups of individuals, this volume offers suggestions and guidance for confronting high-threat scenarios as well as the more mundane protective details. Detailing the essence of protective operations that are run, in large part, covertly, the book explores operational security, situational awareness, and surveillance detection and includes examples from real-world attacks occurring over the past sixty years. Catalog no. K12374, March 2011, 224 pp. ISBN: 978-1-4398-5171-5, $79.95 / £49.99 Also available as an eBook

Also available as an eBook

For more information and complete contents, visit


Security Management Practical Methods for Legal Investigations

Targeted Violence A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings

Concepts and Protocols in Civil and Criminal Cases

Glenn P. McGovern

Dean A. Beers, CLI

Santa Clara County District Attorney's Office, Bureau of Investigation, San Jose, California, USA

Associates in Forensic Investigations, LLC, La Porte, Colorado, USA

" … an information-packed, all inclusive "Legal Investigator’s Manual" providing a thorough understanding of the knowledge, skills and practices required in order to become the successful, highly valued investigator on any legal team. … should be a ‘must-read’ for every new investigator making his or her way into criminal defense and civil negligence matters. … The wealth of information in this book is both comprehensive and timeless." —Pursuit Magazine

Catalog no. K11990, February 2011, 382 pp. ISBN: 978-1-4398-4484-7, $89.95 / £57.99 Also available as an eBook

Drawn from case examples spanning the last 60 years, this book examines incidents of targeted violence, including contract killings, assassinations, and planned kidnappings. Complete with 35 case studies, the text explores numerous attack methodologies. The author, a former SWAT and JTTF team member, analyzes the modus operandi of individual assailants and groups to highlight the commonalities between targeted victims and explain why certain groups tend to target specific types of individuals. Catalog no. K11195, April 2010, 331 pp. ISBN: 978-1-4398-2512-9, $94.95 / £59.99 Also available as an eBook

Intelligent Video Surveillance

Advanced Concepts in Defensive Tactics

Systems and Technology Edited by

A Survival Guide for Law Enforcement

Yunqian Ma Honeywell International, Inc., Minnesota, USA

Chuck Joyner

Gang Qian

FBI, Houston, Texas, USA

Arizona State University, Tempe, USA

Realistically addressing the limited training that law enforcement officers receive, this volume focuses on avoiding the initial encounter, moving to safety, deploying a secondary weapon, and surviving the attack. Concepts are based upon extensive research, a landmark study by the International Association of Chiefs of Police, and street experience. The book stresses proper body mechanics and proven survival principles. Each chapter ends with survivability tips and drills to increase mental awareness and physical skills. Catalog no. K11998, December 2010, 286 pp. ISBN: 978-1-4398-4500-4, $62.95 / £39.99

The latest implementation of surveillance cameras calls for advanced video systems that can autonomously recognize people, detect movements, and identify targeted activities in realtime. In response to such demand, this book examines the fundamental principles of current intelligent video surveillance systems. The text provides a comprehensive look at the algorithmic design and system implementation for intelligent video surveillance. The authors cover computational principles, system implementation issues, and practical applications of present and future systems. Catalog no. K10681, December 2009, 590 pp. ISBN: 978-1-4398-1328-7, $129.95 / £82.99 Also available as an eBook


SAVE when you order online at

Security Management Risk Analysis and Security Countermeasure Selection Thomas L. Norman, CPP/PSP/CSC Protection Partners International, Houston, Texas, USA & Beirut, Lebanon

Using easy-to-understand language, this volume explains how to evaluate the appropriateness of security countermeasures from a cost effectiveness perspective. It details the five core principles of the risk analysis lifecycle through the use of numerous case illustrations that guide readers from basic principles to complex processes. This complete resource includes an adaptable risk analysis tool that is simple to use, can be applied in public or private industries, and works with all DHS–approved methods. Catalog no. AU7870, December 2009, 422 pp. ISBN: 978-1-4200-7870-1, $64.95 / £41.99 Also available as an eBook

Managing Security Overseas Protecting Employees and Assets in Volatile Regions Scott Alan Ast Security Professional, Olathe, Kansas, USA

Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBI recognized subject matter expert, this text details the recommended protocol for protecting people and assets in hostile global settings. Scott Alan Ast offers wisdom and insight gleaned from 28 years of hands-on experience in international security management. He supplies the fundamental understanding and advanced tools required to ensure business is conducted safely regardless of the risk level, identifying the various threats that loom in international projects, and walking readers through a logical framework to design and implement a safety and security program. Catalog no. K10256, August 2009, 366 pp. ISBN: 978-1-4398-0467-4, $87.95 / £55.99 Also available as an eBook

The Elements of Private Investigation

Security Manager's Guide to Disasters

An Introduction to the Law, Techniques, and Procedures

Managing Through Emergencies, Violence, and Other Workplace Threats

Anthony Manley

Anthony D. Manley

Wantagh, New York, USA

Wantagh, New York, USA

Today’s litigious society puts investigators at greater risk than ever before as they confront a multitude of rules, requirements, and civil and criminal laws that impact what they can and cannot do in the performance of their job. This comprehensive resource provides guidelines and best practices on private investigations for investigators, loss prevention officers, and security professionals. The text covers interviewing, interrogation, covert operations, wiretaps, criminal investigations, liability, and privacy rights.

Whether the cause of a disaster is a terrorist attack, fire emergency, civil disruption, or major electronic failure, security professionals must be aware of how such a crisis could affect all they are employed to protect. This volume examines the most significant emergencies that may confront the security, business continuity, or risk manager in the protection of people and property and the avoidance of liability. The book includes ways to prevent or reduce the severity of the incident, suggests how to properly interact with governmental agencies, and provides managers with a system for stabilization, recovery, and restoration.

Catalog no. K10791, October 2009, 448 pp. ISBN: 978-1-4398-1542-7, $87.95 / £55.99 Also available as an eBook

Catalog no. K10448, July 2009, 408 pp. ISBN: 978-1-4398-0906-8, $107.95 / £69.99 Also available as an eBook

For more information and complete contents, visit


Security Management Bestseller!

Intelligent Network Video

Kidnap for Ransom Resolving the Unthinkable

Understanding Modern Video Surveillance Systems

Richard P. Wright

Fredrik Nilsson

Wright Security, Inc., Manassas, Virginia, USA

Axis Communications Inc., Chelmsford, Massachusetts, USA

Based on actual case experiences, this volume explores the kidnapping phenomenon and associated issues involving the family and law enforcement. The author reveals the process from the moment of kidnapping to the victim’s safe return and the after-effects of the experience. The text explains how to effectively plan and prepare for such an event and provides successful strategies for negotiation that maximize the probability of a positive resolution.

This resource provides detailed coverage of advanced digital networking and intelligent video capabilities and optimization. It addresses general concepts, explains why IP-based systems provide better quality at a lower cost, and provides current information on cameras and DVRs. It also discusses frame rate control, indoor/outdoor installations, and MPEG-4 and other digital video formats. The book is accompanied by a CD-ROM containing tools for deploying and optimizing an installation.

Catalog no. AU0075, January 2009, 240 pp. ISBN: 978-1-4200-8007-0, $87.95 / £55.99 Also available as an eBook

Catalog no. AU6156, September 2008, 416 pp. ISBN: 978-1-4200-6156-7, $89.95 / £57.99 Also available as an eBook

The Complete Guide for CPP® Examination Preparation

How to Develop and Implement a Security Master Plan

James P. Muuss, CPP Reliant Protective Services Inc., Phoenix, Arizona, USA

Timothy D. Giles

David Rabern, CPP

Newnan, Georgia, USA

International Counterintelligence Services, Scottsdale, Arizona, USA

Written for corporation security officers, this work is designed to help them garner executive support and increased funding for their security programs. It provides a thorough examination of the Security Master Planning process, explaining how to develop appropriate risk mitigation strategies and how to focus on both effectiveness and efficiency while conducting a site security assessment. The author constructs a comprehensive five-year plan that is synchronized with the strategies of a business or institution. Catalog no. AU6251, December 2008, 352 pp. ISBN: 978-1-4200-8625-6, $89.95 / £57.99 Also available as an eBook

For those preparing for the Certified Protection Professional® program and designation, this text provides a thorough foundation of security concepts and practices in a single volume. Topics include security management, investigations, protection of sensitive information, substance abuse, physical security, personnel security, emergency planning, management of a guard force, legal aspects of security, and the role of a security professional as a liaison with both management and law enforcement. Catalog no. 2896, June 2006, 592 pp. ISBN: 978-0-8493-2896-1, $94.95 / £59.99 Also available as an eBook


SAVE when you order online at


rom emergency response and disaster planning to counterterrorism, this eBook collection includes resources for emergency preparedness and response to terrorist attacks and natural disasters, transportation security, biodefense, detection of radioactive and radiological materials, and research on next-generation security technologies. It covers homegrown and international terrorism, sleeper cells, and international law.

Counterterrorism Disaster Planning and Recovery Emergency Response

CRC Press Taylor & Francis Group

6000 Broken Sound Parkway, NW, Suite 300 Boca Raton, FL 33487, USA

Page 25

Page 10

For a complete list of Homeland Security books please visit

Page 3

Homeland Security  
Homeland Security  

Essential Homeland Security Books from CRC Press