Muutke küpsiste eelistusi

Homeland Security: An Introduction to Principles and Practice, Third Edition 3rd edition [Kõva köide]

(John Jay College of Criminal Justice, New York, USA)
  • Formaat: Hardback, 626 pages, kõrgus x laius: 254x203 mm, kaal: 1587 g, 40 Tables, black and white; 358 Line drawings, black and white
  • Ilmumisaeg: 06-Dec-2016
  • Kirjastus: Productivity Press
  • ISBN-10: 1498749097
  • ISBN-13: 9781498749091
Teised raamatud teemal:
  • Kõva köide
  • Hind: 131,49 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Hardback, 626 pages, kõrgus x laius: 254x203 mm, kaal: 1587 g, 40 Tables, black and white; 358 Line drawings, black and white
  • Ilmumisaeg: 06-Dec-2016
  • Kirjastus: Productivity Press
  • ISBN-10: 1498749097
  • ISBN-13: 9781498749091
Teised raamatud teemal:

Since formed in 2002, DHS has been at the forefront of determining and furthering some of the most hotly debated security issues facing the U.S. and global community in the 21st century. Nearly 200 university programs with undergrad and graduate majors have cropped up in the last dozen-plus years with limited resources available to teach from. Homeland Security, Third Edition will continue to serve as the core textbook covering the fundamental history, formation, oversight, and reach of DHS currently. The book is fully updated with new laws, regulations and strategies across intelligence, transportation sectors, emergency management, border security, public utilities and public health.

Preface xv
Acknowledgments xix
Author xxi
Introduction xxiii
Chapter 1 The Idea and Origin of Homeland Security
1(26)
1.1 Introduction
2(1)
1.2 Threats to the Homeland: Twentieth-Century Military Movements
2(4)
1.3 Threats to the Homeland: The Cold War Experience
6(7)
1.4 Threats to the Homeland: Revolution, Riot, and Rightful Demonstration
13(10)
1.4.1 Domestic Terrorism: Pre-9/11
15(6)
1.4.2 International Terrorism: Pre-9/11
21(2)
1.5 Conclusion
23(4)
Keywords
23(1)
Discussion Questions
24(1)
Practical Exercises
24(1)
Notes
25(2)
Chapter 2 Terror, Threat, and Disaster Post 9/11: A New Paradigm of Homeland Security
27(42)
2.1 Introduction
28(1)
2.2 Genesis of DHS
28(7)
2.3 DHS: 2001--2003
35(4)
2.3.1 Evolution and Change in DHS
36(3)
2.4 Reorganization and Evolution of DHS: 2003--2015
39(26)
2.4.1 Office of the Secretary of DHS
41(6)
2.4.2 DHS Directorates
47(1)
2.4.2.1 Directorate for National Protection and Programs
47(3)
2.4.2.2 Directorate for Science and Technology
50(1)
2.4.2.3 Directorate for Management
50(1)
2.4.3 DHS Offices
51(1)
2.4.4 Agencies Swept into DHS
51(2)
2.4.4.1 U.S. Coast Guard
53(3)
2.4.4.2 U.S. Secret Service
56(2)
2.4.4.3 Federal Protective Service
58(2)
2.4.4.4 Federal Law Enforcement Training Center
60(3)
2.4.5 Advisory Panels and Committees
63(2)
2.5 Conclusion
65(4)
Keywords
66(1)
Discussion Questions
66(1)
Practical Exercises
67(1)
Notes
67(2)
Chapter 3 Homeland Security Law, Regulations, and Budgeting
69(68)
3.1 Introduction
69(1)
3.2 Homeland Security Law, Regulations, and Executive Orders
70(19)
3.2.1 Executive Order 13228: Origin of DHS
70(1)
3.2.2 Executive Order 12231: Protection of Infrastructure
70(3)
3.2.3 Executive Order 13493 of January 22, 2009
73(5)
3.2.4 Executive Order 13567 of March 7, 2011
78(1)
3.2.5 Homeland Security Act of 2002
79(1)
3.2.5.1 Homeland Security Act and Posse Comitatus
79(3)
3.2.6 USA Patriot Act: USA Freedom Act of 2015
82(2)
3.2.7 Specialized Laws
84(1)
3.2.7.1 REAL ID Program
84(3)
3.2.7.2 Office of Biometric Identity Management; Formerly Office of US-VISIT
87(1)
3.2.7.3 Chemical Facilities
88(1)
3.2.7.4 Invention and Technology: The SAFETY Act
88(1)
3.3 Budgeting, Finance, and Funding in Homeland Security
89(42)
3.3.1 Budget Year: 2003
89(1)
3.3.2 Budget Year: 2004
90(9)
3.3.3 Budget Year: 2005
99(6)
3.3.4 Budget Year: 2006
105(4)
3.3.5 Budget Year: 2007
109(3)
3.3.6 Budget Year: 2008
112(5)
3.3.7 Budget Years: 2009--2010
117(2)
3.3.8 Budget Years: 2011--2012
119(4)
3.3.9 Budget Year: 2013
123(3)
3.3.10 Budget Year: 2014
126(2)
3.3.11 Budget Year: 2015
128(3)
3.4 Conclusion
131(6)
Keywords
131(1)
Discussion Questions
132(1)
Practical Exercises
132(1)
Notes
133(4)
Chapter 4 Risk Management, Threats, and Hazards
137(68)
4.1 Introduction
138(1)
4.2 Risk Management
138(9)
4.2.1 The Nature of Risk
139(1)
4.2.2 Risk Assessment
140(5)
4.2.3 CARVER+Shock Assessment Tool
145(2)
4.3 Threats and Hazards
147(35)
4.3.1 Concept of Threat and Hazard
147(6)
4.3.2 Weapons of Mass Destruction
153(1)
4.3.2.1 Nuclear
153(6)
4.3.2.2 Radiological
159(3)
4.3.2.3 Biological
162(7)
4.3.2.4 Chemical
169(11)
4.3.2.5 Improvised Explosive Devices
180(2)
4.4 Computer Security and Information Infrastructure
182(9)
4.4.1 National Cyber Security Division
187(1)
4.4.2 US-CERT: Computer Emergency Response Team
188(3)
4.5 Private Sector and Homeland Security
191(6)
4.6 Conclusion
197(8)
Keywords
198(1)
Discussion Questions
199(1)
Practical Exercises
200(1)
Notes
201(4)
Chapter 5 Training and Exercises in Homeland Security
205(34)
5.1 Introduction
206(1)
5.2 Grants and Training
207(7)
5.3 Center for Domestic Preparedness
214(1)
5.4 Emergency Management Institute
215(3)
5.5 Homeland Security Exercise and Evaluation Program
218(4)
5.6 Lessons Learned: Best Practices (LLIS.GOV)/Homeland Security Digital Library (HSDL)
222(2)
5.7 Community Emergency Response Teams
224(1)
5.8 National Incident Management System
225(8)
5.9 Conclusion
233(6)
Keywords
236(1)
Discussion Questions
236(1)
Practical Exercises
237(1)
Notes
237(2)
Chapter 6 DHS Challenges: National versus State and Local, National Security versus Homeland Security
239(48)
6.1 Introduction
240(2)
6.2 Challenge of National Policy at the State and Local Levels
242(19)
6.2.1 Structure at the State Level
242(8)
6.2.2 Structure at the Local Level
250(7)
6.2.2.1 Fusion Centers
257(3)
6.2.3 Funding and Local Initiatives
260(1)
6.3 Fine Line of National and Homeland Security
261(22)
6.3.1 Department of Defense and Homeland Security
267(4)
6.3.2 Intelligence Gathering and Sharing
271(1)
6.3.2.1 Office of Naval Intelligence
271(1)
6.3.2.2 Air Force Intelligence
272(2)
6.3.2.3 U.S. Marine Corps
274(2)
6.3.2.4 U.S. Army
276(1)
6.3.3 Specialized Military/Defense Units Dedicated to Homeland Security
277(1)
6.3.3.1 National Maritime Intelligence-Integration Office (NMIO)
278(1)
6.3.3.2 National Reconnaissance Office
278(1)
6.3.3.3 Weapons of Mass Destruction Civil Support Teams
279(1)
6.3.3.4 Defense Threat Reduction Agency and USSTRATCOM Center for Combating WMD and Standing Joint Force Headquarters Elimination
280(3)
6.4 Conclusion
283(4)
Keywords
284(1)
Discussion Questions
284(1)
Practical Exercises
285(1)
Notes
285(2)
Chapter 7 FEMA, Response, and Recovery
287(34)
7.1 Historical Foundation for FEMA
288(5)
7.1.1 Federal Emergency Management Agency: Pre-9/11
288(1)
7.1.2 Federal Emergency Management Agency: Post-9/11
289(4)
7.2 FEMA and Preparedness
293(17)
7.2.1 Role of Mitigation in the Preparedness Model
299(11)
7.3 FEMA Response and Recovery
310(7)
7.3.1 National Response Framework
311(6)
7.4 Conclusion
317(4)
Keywords
317(1)
Discussion Questions
318(1)
Practical Exercises
318(1)
Notes
319(2)
Chapter 8 Intelligence
321(38)
8.1 Introduction
321(1)
8.2 Intelligence
322(3)
8.3 Terror, Threats, Disaster, and Intelligence Agencies
325(28)
8.3.1 Federal Bureau of Investigation
327(2)
8.3.1.1 Joint Terrorism Task Forces
329(3)
8.3.1.2 National Security Branch
332(3)
8.3.1.3 Analysis of Intelligence
335(1)
8.3.2 Central Intelligence Agency
336(4)
8.3.2.1 Directorate of Analysis
340(1)
8.3.2.2 Office of Clandestine Services
341(1)
8.3.2.3 Directorate of Science and Technology
341(1)
8.3.2.4 Directorate of Digital Innovation
341(1)
8.3.2.5 Directorate of Support
342(1)
8.3.2.6 Mission Centers
342(1)
8.3.3 Offices of the Director
343(3)
8.3.3.1 National Counterterrorism Center
346(1)
8.3.3.2 National Counterintelligence and Security Center
347(2)
8.3.3.3 National Intelligence Council
349(2)
8.3.4 Defense Intelligence Agency
351(2)
8.4 Conclusion
353(6)
Keywords
354(1)
Discussion Questions
354(1)
Practical Exercises
355(1)
Notes
356(3)
Chapter 9 Border Security, U.S. Citizenship, and Immigration Services
359(38)
9.1 Introduction
360(1)
9.2 U.S. Customs and Border Protection
360(23)
9.2.1 Border Protection
362(4)
9.2.1.1 Secure Border Initiative: Its Creation and Demise
366(5)
9.2.1.2 CBP Air and Marine
371(2)
9.2.2 CBP and the Facilitation of Trade and Commerce
373(1)
9.2.2.1 Cargo
374(9)
9.3 U.S. Citizenship and Immigration Services
383(10)
9.3.1 Project Shield America Initiative
384(3)
9.3.2 Fugitive Operations Program
387(2)
9.3.3 Cornerstone Initiative
389(1)
9.3.4 Cyber Crimes Center
389(3)
9.3.5 US-VISIT Program/Office of Biometric Identity Management
392(1)
9.4 Conclusion
393(4)
Keywords
394(1)
Discussion Questions
395(1)
Practical Exercises
395(1)
Notes
395(2)
Chapter 10 Transportation Security
397(66)
10.1 Introduction
398(1)
10.2 Transportation Security Administration
398(19)
10.2.1 Federal Air Marshals
405(1)
10.2.2 Federal Flight Deck Officers
405(1)
10.2.3 Law Enforcement Officers Flying Armed
406(1)
10.2.4 TSA's Canine Explosive Detection Unit
406(2)
10.2.5 Risk Management Programs
408(1)
10.2.6 TSA Technology and Innovation
409(1)
10.2.6.1 Trace Portals and Their Demise
409(1)
10.2.6.2 Millimeter Wave/Advanced Imaging Technology
410(2)
10.2.6.3 Biometrics
412(5)
10.3 Maritime Security
417(21)
10.3.1 National Strategy for Maritime Security
419(1)
10.3.2 Other Maritime Plans
420(1)
10.3.2.1 National Plan to Achieve Maritime Domain Awareness
421(1)
10.3.2.2 Maritime Transportation System Security Plan
421(1)
10.3.3 DHS: Borders and Marine Division
421(2)
10.3.4 Role of the Coast Guard in Maritime Security
423(1)
10.3.4.1 Emergency Safety
424(1)
10.3.4.2 Security and Law Enforcement
425(6)
10.3.4.3 Cargo and Ports
431(7)
10.4 Rail and Mass Transit
438(14)
10.4.1 Representative Security Programs for Rail and Transit
444(1)
10.4.1.1 Amtrak
445(2)
10.4.1.2 CSX: The Freight Line
447(3)
10.4.1.3 SEPTA: Rail Mass Transit
450(2)
10.5 Conclusion
452(11)
Keywords
458(1)
Discussion Questions
459(1)
Practical Exercises
459(1)
Notes
460(3)
Chapter 11 Homeland Security and Public Health
463(56)
11.1 Introduction
463(1)
11.2 Water
464(11)
11.3 Agriculture and Food
475(20)
11.3.1 Strategic Partnership Program on Agroterrorism
479(5)
11.3.2 Infectious Animals
484(4)
11.3.3 Infectious Diseases and Bioterrorism
488(4)
11.3.3.1 Project BioShield
492(1)
11.3.3.2 Strategic National Stockpile
492(3)
11.3.3.3 National Select Agent Registry Program
495(1)
11.4 Pandemic Threats
495(16)
11.4.1 Planning, Preparedness, and Response
505(6)
11.5 Conclusion
511(8)
Keywords
516(1)
Discussion Questions
516(1)
Practical Exercises
516(1)
Notes
517(2)
Chapter 12 The Future of Homeland Security
519(20)
12.1 Introduction
519(4)
12.2 Growth without Reason
523(2)
12.3 Curbing Expansionism in Mission
525(3)
12.4 The Merits of Decentralization
528(1)
12.5 The Rise of Technology
529(4)
12.6 The Need for a New Way of Thinking: Jump Out of the Box
533(6)
Notes
536(3)
Appendix I 539(4)
Appendix II 543(10)
Appendix III 553(40)
Appendix IV 593(12)
Appendix V 605(6)
Index 611
Charles P. Nemeth is a recognized expert in homeland security and a leader in the private security industry, private sector justice, and homeland security education. He is currently Chair of the Department of Security, Fire, and Emergency Management at John Jay College in New York City, USA.