Homeland Directive, The


Book Description

A NEW YORK TIMES BESTSELLER! Named one of the year's best graphic novels by CNN, Complex, IFC, School Library Journal, Library Journal, and USA Today! "A great, paranoid read for the modern age."-- Cory Doctorow, Boing Boing "Venditti's cat-mouse thriller demands edge-of-your-seat attention while raising serious questions about terrorism, personal privacy, and government responsibility ... excellent writing and plotting, and dead suitable art."-- Library Journal "In exploring the nature of the relation between the individual, society and the state, one would anticipate The Homeland Directive to elevate both the thriller genre and the comics medium. Venditti delivers admirably on both counts."-- Dr. shathley Q, PopMatters "An addictive page-turner that feels like an edge-of-your-seat theater experience. Huddleston's art puts the focus where it needs to be to wring every drop of tension from the story, and Venditti's script shows that he doesn't need the sci-fi elements of his earlier work to craft a fascinating, fast-paced thriller."-- Rick Marshall, MTV Splash Page "The conspiracy at the heart of this superbly paced thriller makes the Illuminati and the New World Order look like rank amateurs."-- Garrett Martin, Paste Magazine "An exceptionally good graphic novel for the moment... with a sophisticated sense of how government works."-- Alyssa Rosenberg, ThinkProgress "It's unlikely you'll find a book that looks as good as The Homeland Directive this year."-- Graeme McMillan, Robot 6 "Pulse-pounding... well-characterized, the plotting is tight, and the stakes are high. Mike Huddleston's art flips from pen and ink to painterly, but consistently captures the right mood and inspires the gritting of teeth."-- Jeremy Nisen, Under the Radar A new thriller from the author of the New York Times bestseller The Surrogates! As a leading researcher at the Centers for Disease Control and Prevention, Dr. Laura Regan is one of the world's foremost authorities on viral and bacteriological study. Having dedicated her career to halting the spread of infectious disease, she has always considered herself one of the good guys. But when her research partner is murdered and Laura is blamed for the crime, she finds herself at the heart of a vast and deadly conspiracy. Aided by three rogue federal agents who believe the government is behind the frame-up, Laura must evade law enforcement, mercenaries, and a team of cyber-detectives who know more about her life than she does-- all while trying to expose a sinister plot that will impact the lives of every American. Set in the Orwellian present, The Homeland Directive confronts one of the vital questions of our time: In an era when technology can either doom or save us, is it possible for personal privacy and national security to coexist?




The Homeland Directive


Book Description







Understanding, Assessing, and Responding to Terrorism


Book Description

A comprehensive guide to understanding, assessing, and responding to terrorism in this modern age This book provides readers with a thorough understanding of the types of attacks that may be perpetrated, and how to identify potential targets, conduct a meaningful vulnerability analysis, and apply protective measures to secure personnel and facilities. The new edition of Understanding, Assessing, and Responding to Terrorism updates existing material and includes several new topics that have emerged, including information on new international terrorist groups as well as a new chapter on Regulations and Standards. A vulnerability analysis methodology, consisting of several steps—which include the techniques necessary to conduct a vulnerability analysis—is introduced and applied through several sample scenarios. By using easily customized templates for the screening process, valuation of a critical asset as a target, vulnerability analysis, security procedures, emergency response procedures, and training programs, the book offers a practical step-by-step process to help reduce risk. Each different type of terrorism is briefly discussed—however, the book focuses on those potential attacks that may involve weapons of mass destruction. There is a discussion of what physical and administrative enhancements can be implemented to improve a facility's ability to devalue, detect, deter, deny, delay, defend, respond, and recover to a real or threatened terrorist attack—whether it be at a facility, or in the community. Techniques on how personnel safety and security can be improved through the implementation of counter-terrorism programs are also outlined. An overview of the major counter-terrorism regulations and standards are presented, along with the significant governmental efforts that have been implemented to help prevent terrorist attacks and foster preparedness at both private and public sector facilities and for personnel. Understanding, Assessing, and Responding to Terrorism, Second Edition: Updates existing material, plus includes several new topics that have emerged including information on new international terrorist groups, new terrorist tactics, cyber terrorism, and Regulations and Standards Outlines techniques for improving facility and personnel safety and security through the implementation of counter-terrorism programs Unites the emergency response/public sector community with the private sector over infrastructure protection, thus allowing for easier communication between them Includes questions/exercises at the end of each chapter and a solutions manual to facilitate its use as a textbook Understanding, Assessing, and Responding to Terrorism, Second Edition is a must-have reference for private and public sector risk managers, safety engineers, security professionals, facility managers, emergency responders, and others charged with protecting facilities and personnel from all types of hazards (accidental, intentional, and natural).




Disciplines, Disasters and Emergency Management


Book Description

Disasters such as the 9/11 terrorist attacks, the Indian Ocean Tsunami, and Hurricane Katrina illustrate the salience and complexity of disasters. Both scholars and practitioners therefore agree that we must take a more proactive and holistic approach to emergency management, which should logically be derived from a sound understanding of the academic literature and the most pressing concerns facing professionals in the field today. Disciplines, Disasters and Emergency Management reviews what is known about catastrophic events from the standpoint of various academic areas of study. The introdu.




International Guide to Cyber Security


Book Description

The book discussess the categories of infrastucture that require protection. The issues associated with each, and the responsibilities of the public and private sector in securing this infrastructure.




National Incident Management System


Book Description

In March 2004, the U.S. Department of Homeland Security implemented the National Incident Management System (NIMS), the country's first-ever standardized approach to incident management and response. Response agencies nationwide will need to become NIMS compliant in 2005.National Incident Management System: Principles and Practice translates the goals of the original NIMS document from concepts into capabilities, and provides responders with a step-by-step process to understanding and implementing NIMS. Through the use of case studies, readers will gain valuable insight on how to incorporate NIMS effectively into their departments or jurisdictions. As responders are faced with the tasks of reforming training curricula and incorporating NIMS into Standard Operating Procedures, it is essential that they have a practical resource to guide them through the nation's homeland security strategies, as well as to assist them with NIMS implementation in their own locality.




Terrorism


Book Description

Terrorism: Documents of International and Local Control is a hardbound series that provides primary-source documents on the worldwide counter-terrorism effort. Chief among the documents collected are transcripts of Congressional testimony, reports by such federal government bodies as the Congressional Research Service and the Government Accountability Office, and case law covering issues related to terrorism. Most volumes carry a single theme, and inside each volume the documents appear within topic-based categories. The series also includes a subject index and other indices that guide the user through this complex area of the law. With the addition of commentary from a prominent member of the U.S. national security establishment, Professor Douglas C. Lovelace, this series becomes the premiere resource for an informative and analytical discourse on terrorism and how it continues to have a catastrophic effect on our society. Although Professor Lovelace acknowledges the current Iraq debate in his opening pages, Understanding United States National Security Strategy Relating to Terrorism. Part II: Derivative and Supporting Strategies primarily focuses on the similarly difficult topic of how the U.S. may best secure its homeland. By dividing this topic into three prominent categories (aviation security, maritime security, and domestic security), Professor Lovelace expertly presents a summary of current U.S. security policy and assesses the value of those policies . Within the domestic security category, he also provides detailed guidance on such specialized issues as bio-defense and the connection between the drug trade and terrorist financing. The Terrorism series remains a unique resource on all issues related to terrorism.




Military Strategy, Joint Operations, and Airpower


Book Description

An ideal textbook for classes on modern airpower and joint operations.




Essentials of Public Health Preparedness and Emergency Management


Book Description

The public health community plays a vital role in identifying, responding to, containing, and recovering from emergencies. Essentials of Public Health Preparedness will introduce your students to the important and timely field of public health preparedness. The book presupposes no previous exposure to the concepts, yet provides enough depth for students who may have advanced knowledge. The chapters are structured in five parts: Background of the Field; Defining the Problem; Infrastructure; Solving Problems; and Practical Applications.