did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780872187023

Business at Risk : How to Assess, Mitigate, and Respond to Terrorist Threats

by
  • ISBN13:

    9780872187023

  • ISBN10:

    0872187020

  • Format: Paperback
  • Copyright: 2002-04-30
  • Publisher: Natl Underwriter Co
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $69.00
  • Digital
    $72.00
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Table of Contents

Foreword xi
Acknowledgments xii
Introduction xiii
The Terrorism Threat
1(38)
Introduction
3(1)
What is Terrorism?
3(4)
Terrorist Threats
7(23)
Biological & Chemical Agents
8(1)
Biological Agents
9(9)
Chemical Agents
18(4)
Nuclear/Radiological Devices
22(1)
Incendiary Devices
23(1)
Explosive Devices
24(1)
Cyberterrorism
24(6)
Consequences of a Terrorist Attack
30(9)
Direct Costs
31(3)
Indirect Costs
34(1)
End Notes
35(4)
Risk Assessment
39(52)
Risk Assessment Process
41(4)
Threat Assessment
42(2)
Vulnerability Assessment
44(1)
Busines Impact Analysis
44(1)
Threat Assessment
45(4)
History of Past Incidents
49(1)
Potential Targets
49(1)
Vulnerability Assessment
49(35)
People
54(1)
Site Location, Layout, & Protection
55(1)
Proximity to Potential Targets
56(2)
Placement of Buildings
58(1)
Perimeter Security
58(1)
Vehicular Traffic & Parking
59(1)
Vehicle Bomb Exposure
60(2)
Buildings
62(11)
Operational Security
73(1)
Computer Security
74(8)
Other Considerations
82(2)
Business Impact Analysis
84(7)
Scenarios
85(3)
People
88(1)
Loss of Buildings, Equipment, & Critical Functions
88(1)
Lifelines
88(1)
Restricted Access or Movement
88(1)
Contingent Business Interruption
89(1)
Interdependencies
89(1)
End Notes
89(2)
Mitigation Strategies
91(26)
Site Selection & Building Design
93(2)
Site Selection
93(1)
Building Design & Space Planning
94(1)
Package & Visitor Reception Areas
95(5)
Horizontal Exits & Areas of Refuge
96(1)
Vestibules
97(1)
Exterior Glass
97(1)
Ornamentation & Signs
98(1)
Critical Building Systems
98(2)
Physical Security
100(2)
Motor Vehicle Approach & Access
100(2)
Building Security
102(3)
Electronic Security Systems
103(1)
Doors, Stairs, Elevators, & Windows
103(1)
Ventilation Systems
104(1)
Operational Security
105(3)
Visitor & Package Screening
106(1)
Motor Vehicle Access to Garages, Inside Parking, or Loading Docks
107(1)
Security Policies & Procedures
108(1)
Security Policy
108(1)
Threat Response Procedures
109(1)
Computer & Cyber Security
109(6)
Computer Security Management
109(2)
Known Security Issues
111(4)
Other Mitigation Strategies
115(2)
Employee Training
115(1)
Emergency Response & Businese Recovery Programs
115(1)
End Notes
115(2)
Organizing & Planning to Respond
117(56)
Plan Components, Objectives, & Standards
119(5)
National Standards & Regulations
122(2)
The Planning Process
124(4)
Management Policy
124(1)
Planning Committees
125(2)
Assessment of Available Resources
127(1)
Organizations
127(1)
Emergency Response Team
128(4)
Organization
128(2)
Emergency Response Team members
130(2)
Crisis Management Team
132(4)
Organization
133(1)
Communication with Target Audiences
133(3)
Business Recovery Team
136(4)
Critical Functions & Recovery Teams
137(2)
Recovery Strategies
139(1)
Command, Control, & Communications
140(25)
Incident Command System
140(3)
Emergency Operations Center
143(3)
Communications
146(5)
Pre-Incident Planning
151(1)
Community Hazards & Warning Systems
152(3)
Building Ventilation System
155(1)
Evacuation Plan
156(5)
Shelter-in-Place
161(1)
Mail Center/Package Screening
162(3)
Writing the Plan
165(8)
Display of Information
170(2)
End Notes
172(1)
Emergency Response
173(36)
Response to Terrorist Threats & Attacks
175(1)
Threat Levels
175(2)
Threat Detection
177(3)
Physical Evidence
177(1)
Symptoms or Sensory Indications
178(2)
Indicators of an Attack
180(4)
Conventional Explosive Devices
180(1)
Chemical Agents
180(1)
Biological
181(2)
Nuclear/Radiological
183(1)
Combined Hazards
183(1)
Determination of Protective Actions
184(3)
Airborne Hazards
185(2)
Emergency Response Procedures
187(19)
Notifications
187(1)
Evacuation
188(1)
Sheltering-in-Place
189(1)
Suspicious Package or Letter
190(7)
Bomb Threats
197(4)
Property Conservation
201(1)
First Aid
202(1)
Firefighting
203(1)
Rescue
204(1)
Hazardous Materials
204(2)
Government Response to a Terrorist Incident
206(3)
End Notes
207(2)
Recovery
209(24)
The Recovery Process
211(4)
Plan Activation
211(2)
Situation Assessment
213(1)
Recovery Priorities
214(1)
Personnel Safety & Health
215(5)
Evacuation & Accountability
215(1)
Medical Care
216(1)
Counseling
216(4)
Critical Functions & Processes
220(3)
Roles & Responsibilities
221(2)
Internal & External Communications
223(2)
Example Timeline
225(1)
Post-Incident Debriefing
225(1)
Insurance Recovery
226(7)
Corporate Large Loss Plan
230(2)
End Notes
232(1)
Implementation & Training
233(14)
Summary of Important Steps
235(3)
Policies & Procedures
236(1)
Organizations & Assignments
236(1)
Equipment, Systems, & Facilities
237(1)
Compilation of Information
237(1)
Training
238(3)
Levels of Training
238(2)
Instructors
240(1)
Frequency of Training
240(1)
Record Keeping
240(1)
Drills & Exercises
241(4)
Practice Drills
242(1)
Exercises
243(1)
Business Recovery Plan Testing
244(1)
Audits
244(1)
Plan Distribution & Updates
245(2)
Distribution of the Plan & Updates
245(1)
Other Considerations
246(1)
Impact on the Insurance Market
247(16)
Market Impact
249(6)
Is Terrorist Threat Uninsurable?
250(1)
Impact on Reinsurance Market
251(1)
Property Insurance Market Overview
252(2)
Casualty Insurance Market Overview
254(1)
Market Security Issues
255(8)
A.M. Best and Better
256(4)
Avoiding Insurance Scams
260(2)
End Notes
262(1)
Hard Market Survival Tips
263(14)
Hard Cycle Tips
265(12)
Insurance Coverage Issues
277(24)
Coverage Issues Abound
279(22)
Number of Losses/Occurrences
279(4)
War Exclusion
283(5)
Terrorism Exclusions
288(4)
Debris Removal Coverage Issues
292(1)
Business Interruption Coverage Issues
293(2)
Workers Compensation Coverage Issues
295(1)
Insurance Issues in Anthrax Contamination
296(1)
Pollution/Nuclear Exclusions
297(3)
End Notes
300(1)
Government and Insurance Industry Reinsurance Proposals
301(10)
Options Introduced
303(8)
HR 3210, Terrorism Risk Protection Act
303(1)
Insurance Stabilization and Availability Act
304(2)
Bush Administration Proposal
306(1)
Reasons for Federal Proposals
307(1)
Victims Compensation Fund
308(1)
Organizations Recommend Action
309(1)
End Notes
309(2)
Subrogation and Recovery Options Against Terrorists
311(12)
Civil Action Possible
313(10)
Potential Obstacles
313(1)
Legal Precedents
314(3)
Other Recovery Theories
317(3)
Basic Reality
320(2)
End Notes
322(1)
Alternative Risk Techniques
323(16)
Alternative Market Interest
325(14)
Alternative Markets
326(9)
Insurance Realities
335(1)
Ways to Use Alternative Risk Techniques to Address Terrorism Risks
335(2)
End Notes
337(2)
Appendix A: Internet Resources 339(2)
Appendix B: Selected References 341(4)
Appendix C: Responses to Weapons of Mass Destruction Incident and the Participants Involved 345(2)
Appendix D: Federal Departments and Agencies: Counterterrorism-Specific Roles 347(20)
About the Authors 367

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program