Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary

Jane's unconventional weapons response handbook / Adrian Dwyer, Colin King.

Material type: TextTextPublication details: Coulsdon, U.K. : Jane's Information Group, c2006.Edition: 2nd edDescription: 301 p. ; 15 cmISBN:
  • 9780710628190
DDC classification:
  • 363.33 22
Partial contents:
Ch. 1: Introduction -- Ch. 2: IEDs and other terrorist weapons -- Ch. 3: Planning and mitigation -- Ch. 4: Incident response -- Ch. 5: Weapons effects and characteristics.
Review: "The content of this handbook is not intended to provide a detailed assessment of terrorist future intentions, nor a threat-specific intelligence briefing. It is designed to be used primarily by emergency first responders and security professionals responsible for planning or coordinating counter-terrorist (CT) activities ... [it] is not a definitive guide and should be used in addition to locally or federally mandated response procedures and policies and threat-specific intelligence material." -- p. 3.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books Australian Emergency Management Library BOOK 363.33 JAN (Browse shelf(Opens below)) Available 900173189

Spiral binding.

Ch. 1: Introduction -- Ch. 2: IEDs and other terrorist weapons -- Ch. 3: Planning and mitigation -- Ch. 4: Incident response -- Ch. 5: Weapons effects and characteristics.

"The content of this handbook is not intended to provide a detailed assessment of terrorist future intentions, nor a threat-specific intelligence briefing. It is designed to be used primarily by emergency first responders and security professionals responsible for planning or coordinating counter-terrorist (CT) activities ... [it] is not a definitive guide and should be used in addition to locally or federally mandated response procedures and policies and threat-specific intelligence material." -- p. 3.

There are no comments on this title.

to post a comment.

Powered by Koha