𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Homeland security: an introduction to principles and practice

✍ Scribed by Nemeth, Charles P


Publisher
CRC/Auerbach
Year
2010
Tongue
English
Leaves
544
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Content: Chapter 1: The Idea and Origin of Homeland Security 1.1 Introduction 1.2 Threats to the Homeland: 20th-Century Military Movements 1.3 Threats to the Homeland: The Cold War Experience 1.4 Threats to the Homeland: Revolution, Riot, and Rightful Demonstration 1.4.1 Domestic Terrorism: Pre-9/11 1.4.2 International Terrorism: Pre-9/11Chapter 2: Terror, Threat, and Disaster Post-9/11: A New Paradigm of Homeland Security 2.1 Introduction2.2 The Genesis of the Department of Homeland Security 2.3 The Department of Homeland Security: 2001-2003 2.3.1 Evolution and Change in the Department of Homeland Security2.4 Reorganization of the Department of Homeland Security: 2003-2008 2.4.1 The Office of the Secretary of DHS 2.4.2 DHS Directorates 2.4.3 DHS Offices 2.4.4 Agencies Swept into DHS 2.4.4.1 U.S. Coast Guard 2.4.4.2 U.S. Secret Service 2.4.4.3 Federal Protective Service 2.4.4.4 Federal Law Enforcement Training Center (FLETC) 2.4.5 Advisory Panels and CommitteesChapter 3: Homeland Security Law, Regulations, and Budgeting 3.1 Introduction 3.2 Homeland Security Law, Regulations, and Executive Orders 3.2.1 Executive Order 13228: The Origin of DHS 3.2.2 Executive Order 12231: Protection of Infrastructure 3.2.3 Homeland Security Act of 2002 The Homeland Security Act and Posse Comitatus 3.2.4 USA Patriot Act 3.2.5 Specialized Laws 3.2.5.1 The REAL ID Program 3.2.5.2 Office of US-VISIT: Proposed Rules 3.2.5.3 Chemical Facilities 3.2.5.4 Invention and Technology: The SAFETY Act 3.3 Budgeting, Finance, and Funding in Homeland SecurityChapter 4: Risk Management, Threats, and Hazards 4.1 Introduction 4.2 Risk Management 4.2.1 The Nature of Risk 4.2.2 Risk Assessment 4.2.3 CARVER + Shock Assessment Tool 4.3 Threats and Hazards 4.3.1 The Concept of Threat and Hazard 4.3.2 Weapons of Mass Destruction (WMD) 4.3.2.1 Nuclear 4.3.2.2 Radiological4.3.2.3 Biological 4.3.2.4 Chemical 4.3.2.5 Improvised Explosive Devices (IED) 4.4 Computer Security and Information Infrastructure 4.4.1 National Cyber Security Division (NCSD)4.4.2 US-CERT: Computer Emergency Response Team 4.5 The Private Sector and Homeland SecurityChapter 5: Training and Exercises in Homeland Security 5.1 Introduction5.2 Office of Grants and Training 5.3 Center for Domestic Preparedness 5.4 Emergency Management Institute 5.5 Homeland Security Exercise and Evaluation Program (HSEEP) 5.6 Lessons Learned: Best Practices (LLIS.gov) 5.7 Community Emergency Response Teams (CERTs) 5.8 National Incident Management System (NIMS)Chapter 6: DHS Challenges: National vs. State and Local, National Security vs. Homeland Security 6.1 Introduction 6.2 Challenge of National Policy at the State and Local Levels 6.2.1 Structure at the State Level 6.2.2 Structure at the Local Level 6.2.2.1 Fusion Centers 6.2.3 Funding and Local Initiatives 6.3 Fine Line of National and Homeland Security 6.3.1 Department of Defense and Homeland Security 6.3.2 Intelligence Gathering and Sharing 6.3.2.1 Office of Naval Intelligence 6.3.2.2 Air Force Intelligence 6.3.2.3 U.S. Marine Corps 6.3.2.4 U.S. Army 6.3.3 Specialized Military/Defense Units Dedicated to Homeland Security 6.3.3.1 National Maritime Intelligence Center 6.3.3.2 National Reconnaissance Office 6.3.3.3 Weapons of Mass Destruction Civil Support Teams6.3.3.4 Center for Combating Weapons of Mass Destruction and the Defense Threat Reduction AgencyChapter 7: FEMA, Response and Recovery 7.1 Historical Foundation for FEMA 7.1.1 Federal Emergency Management Agency: Pre-9/11 7.1.2 Federal Emergency Management Agency: Post-9/11 7.2 FEMA and Preparedness 7.2.1 Role of Mitigation in the Preparedness Model 7.3 FEMA Response and Recovery 7.3.1 National Response FrameworkChapter 8: Intelligence 8.1 Introduction 8.2 Intelligence 8.3 Terror, Threats, Disaster, and Intelligence Agencies 8.3.1 Federal Bureau of Investigation (FBI) 8.3.1.1 Joint Terrorism Task Forces 8.3.1.2 The National Security Branch 8.3.1.3 Analysis of Intelligence 8.3.2 Central Intelligence Agency (CIA) 8.3.2.1 Directorate of Intelligence 8.3.2.2 Office of Clandestine Services 8.3.2.3 Office of Science and Technology 8.3.2.4 Directorate of Science and Technology 8.3.2.5 Office of Support 8.3.3 Office of the Director of National Intelligence 8.3.3.1 National Counterterrorism Center 8.3.3.2 Office of the National Counterintelligence Executive 8.3.3.3 National Intelligence Council 8.3.4 Defense Intelligence AgencyChapter 9: Border Security, U.S. Citizenship and Immigration Services 9.1 Introduction 9.2 U.S. Customs and Border Protection 9.2.1 Border Protection 9.2.1.1 Secure Border Initiative 9.2.1.2 CBP Air and Marine 9.2.2 CBP and the Facilitation of Trade and Commerce 9.2.2.1 Cargo 9.3 U.S. Citizenship and Immigration Services 9.3.1 Project Shield America Initiative 9.3.2 Fugitive Operations Program 9.3.3 Cornerstone Initiative 9.3.4 Cyber Crimes Center 9.3.5 US-VISIT ProgramChapter 10: Transportation Security10.1 Introduction 10.2 Transportation Security Administration 10.2.1 Federal Air Marshals 10.2.2 Federal Flight Deck Officers 10.2.3 Law Enforcement Officers Flying Armed 10.2.4 TSA's Canine Explosive Detection Unit 10.2.5 Risk Management Programs 10.2.6 TSA Technology and Innovation 10.2.6.1 Trace Portals 10.2.6.2 Millimeter Wave 10.2.6.3 Biometrics 10.3 Maritime Security 10.3.1 National Strategy for Maritime Security 10.3.2 Other Maritime Plans 10.3.2.1 National Plan to Achieve Maritime Domain Awareness 10.3.2.2 Maritime Transportation System Security Plan 10.3.3 Role of the Coast Guard in Maritime Security 10.3.3.1 Emergency Safety 10.3.3.2 Security and Law Enforcement 10.3.3.3 Cargo and Ports 10.4 Rail and Mass Transit 10.4.1 Representative Security Programs for Rail and Transit 10.4.1.1 Amtrak 10.4.1.2 CSX-The Freight Line 10.4.1.3 SEPTA: Rail Mass Transit Chapter 11: Homeland Security and Public Health 11.1 Introduction 11.2 Water 11.3 Agriculture and Food 11.3.1 Strategic Partnership Program on Agroterrorism 11.3.2 Infectious Animals11.3.3 Infectious Diseases and Bioterrorism 11.3.3.1 Project BioShield 11.3.3.2 National Pharmaceutical Stockpile 11.3.3.3 National Select Agent Registry Program 11.4 Pandemic Threats 11.4.1 Planning and ResponseChapter 12: The Future of Homeland Security 12.1 Introduction12.2 DHS: Growth without Reason 12.3 DHS: Curbing Expansionism in Mission 12.4 DHS: The Merits of Decentralization 12.5 DHS: The Rise of Technology 12.6 DHS: The Need for a New Way of Thinking: Jump out of the Box AppendicesIndexEach chapter includes keywords, discussion questions, and practical exercises

✦ Subjects


National security -- United States.;Terrorism -- United States -- Prevention.;United States. -- Department of Homeland Security.;National security.;Terrorism -- Prevention.;United States.;Säkerhetspolitik -- Förenta staterna.;Terrorismbekämpning -- Förenta staterna.


πŸ“œ SIMILAR VOLUMES


Homeland Security: An Introduction to Pr
✍ Charles P. Nemeth, Charles Nemeth πŸ“‚ Library πŸ“… 2021 πŸ› CRC Press 🌐 English

<p><strong>Homeland Security: An Introduction to Principles and Practice, Fourth Edition</strong> continues its record of providing a fully updated, no-nonsense textbook to reflect the latest policy, operational, and program changes to the Department of Homeland Security (DHS) over the last several

Homeland Security: An Introduction to Pr
✍ Charles P. Nemeth (Author) πŸ“‚ Library πŸ“… 2016 πŸ› CRC Press

<p>Since formed in 2002, DHS has been at the forefront of determining and furthering some of the most hotly debated security issues facing the U.S. and global community in the 21st century. Nearly 200 university programs with undergrad and graduate majors have cropped up in the last dozen-plus years

Homeland Security : An Introduction to P
✍ Nemeth, Charles P πŸ“‚ Library πŸ“… 2013 πŸ› CRC Press 🌐 English

The Idea and Origin of Homeland Security Threats to the Homeland: Twentieth-Century Military MovementsThreats to the Homeland: The Cold War Experience Threats to the Homeland: Revolution, Riot, and Rightful Demonstration Domestic Terrorism: Pre-9/11 International Terrorism: Pre-9/11 Terror, Threat,

Private Security: An Introduction to Pri
✍ Charles P. Nemeth πŸ“‚ Library πŸ“… 2018 πŸ› CRC Press 🌐 English

<P>There are few textbooks available that outline the foundation of security principles while reflecting the modern practices of private security as an industry. <B>Private Security: An Introduction to Principles and Practice </B>takes a new approach to the subject of private sector security that wi

Private Security: An Introduction to Pri
✍ Charles P. Nemeth πŸ“‚ Library πŸ“… 2017 πŸ› CRC Press 🌐 English

There are few textbooks available that outline the foundation of security principles while reflecting the modern practices of private security as an industry.<b>Private Security: An Introduction to Principles and Practice</b>takes a new approach to the subject of private sector security that will be

Private Security: An Introduction to Pri
✍ Charles P. Nemeth πŸ“‚ Library πŸ“… 2017 πŸ› CRC Press 🌐 English

There are few textbooks available that outline the foundation of security principles while reflecting the modern practices of private security as an industry.<b>Private Security: An Introduction to Principles and Practice</b>takes a new approach to the subject of private sector security that will be