Catalog Search Results
Author
Summary
"Gus Martin's Understanding Homeland Security provides students with a comprehensive introduction to U.S. homeland security in the modern world, with a focus on the post-September 11, 2001 era. This insightful resource examines the theories, agency missions, laws, and regulations governing the homeland security enterprise through the lens of threat scenarios and countermeasures related to terrorism, natural disasters, emergency management, cyber security,...
Author
Formats
Summary
"This edition of Critical Infrastructure presents a culmination of ongoing research and real-work experience, building upon previous editions. Since the first edition of this work, the domain has seen significant evolutions in terms of operational needs, environmental challenges and threats - both emerging and evolving. This work expands upon the previous works and maintains its focus on those efforts vital to securing the safety and security of populations....
Summary
"This book provides a sampling of civil defense publications issued by government agencies and organizations during the early atomic era. Sections cover the impact and power of the atomic bomb, radioactive fallout, women and the home, the importance of being prepared, civil defense in schools, fallout shelters, evacuation plans, and, finally, the call for "peace or ... else"--Provided by publisher.
Author
Summary
The New Era in U.S. National Security focuses on the emerging threats of the second decade of the 21st century, well after 9/11, and well into the age of globalization. It is a thorough, technically competent, survey of the current arena of conflict and the competition for political and economic control by state and non-state actors. Starting with the current national security establishment, it discusses the incompatibility between the threats and...
Author
Summary
Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.
In WorldShare
Didn't find what you need? Items not owned by Wyoming Libraries Database can be requested from other WorldShare libraries to be delivered to your local library for pickup.