Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

Risk Analysis and Security Countermeasure Selection 1st Edition

4.3 out of 5 stars 9 customer reviews
ISBN-13: 978-1420078701
ISBN-10: 1420078704
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Trade in your item
Get a $16.10
Gift Card.
Have one to sell? Sell on Amazon
More Buying Choices
6 New from $136.26 17 Used from $70.38

There is a newer edition of this item:

Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Buxfer: Online money management software
Spend wiser. Live beter. Make better spending decisions with Buxfer. Try it FREE
click to open popover

Editorial Reviews

Review

… by following the guidance laid out in this detailed book, security managers can do it themselves with software that’s probably already on their office computers: Microsoft Excel. … There is no doubt that Norman himself spent considerable time devising the process, which he presents in the book. He provides step-by-step lists for building various matrices … definitely a book for the advanced security practitioner. … it outlined an excellent methodology and is well worth the effort required to read it and work through the process outlined by the author.
― Glen Kitteringham, CPP, President of Kitteringham Security Group Inc., in Security Management, January 2011

About the Author

Protection Partners International, Houston, TX USA & Beirut, Lebanon
NO_CONTENT_IN_FEATURE

Product Details

  • Hardcover: 422 pages
  • Publisher: CRC Press; 1 edition (December 18, 2009)
  • Language: English
  • ISBN-10: 1420078704
  • ISBN-13: 978-1420078701
  • Product Dimensions: 10.3 x 8.4 x 1 inches
  • Shipping Weight: 2 pounds
  • Average Customer Review: 4.3 out of 5 stars  See all reviews (9 customer reviews)
  • Amazon Best Sellers Rank: #1,038,507 in Books (See Top 100 in Books)

Customer Reviews

Top Customer Reviews

By Ross L. Johnson on January 2, 2010
Format: Hardcover
I have know Tom Norman for many years, and I do not know anyone that can match him for the depth of knowledge and experience he has in the security profession. He has a gift for understanding and communicating the essence of something: he can tell you not only what is important, but why it is important, and how it relates to other components within an overall security system. I consider his books to be essential toolbox works, destined to be dog-eared, annotated, and bristling with Post-It Notes. They don't belong on the bookshelf, but in the field or on the desk, where you can reach them easily.

This book does not disappoint. It is rich in detail, filled with how-to information that will guide the reader through the risk analysis process from the beginning to the end. The section on selection of methodologies provides the reader with information on what is available and their strengths and weaknesses. The author contributes one that he developed from studying al Qaeda: called the KSM-Asset Target Value for Terrorism Matrix. Named for Khalid Shaihk Mohammed, it provides a methodology for asset target valuation that closely mirrors the apparent priorities of the foremost terrorist network in the world today, giving security professionals insight into the relative value their assets may have to a terrorist adversary.

The premise of this book is that security is a seamless process that connects threat to analysis to behavior to countermeasures to metrics and finally reporting. The author covers each topic in great detail, explaining concepts, discussing competing theories, ultimately assisting the reader in making the decision of what will work for his or her organization. The author guides, but does not preach.
Read more ›
Comment 4 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Hardcover Verified Purchase
If you need to learn how to conduct or improve proper Threat, Vulnerability or Risk assessment, pick up a copy of this book! Norman's Risk Analysis and Security Countermeasure Selection is an excellent guide for the student of Asset Protection. Any Departmental Security Officer, corporate chief security officer or operational manager should have this book on hand to enhance their security program. The work is thorough in its coverage of the interplay between tactical options for security, the importance of security policy, how to conduct world-class risk assessment, and the value of good risk assessment.

Perhaps the most important function the book serves is to remind the reader that a good security program takes an All-Hazards Approach. The severity and likelihood of natural or accidental disasters is much greater than the threat of terrorism, and Norman demonstrates that a good security program accounts for all of those potentials. Enterprise concerned with asset protection against criminality will benefit from this book also.

This work by Norman receives four out of five stars; although it adequately equips the reader with the tools, theory and vision necessary to develop a strong security program, deeper explanation through example is desirable.

BOTTOM LINE: Norman's work is a much-needed contribution to the bourgeoning field of Critical Infrastructure Protection, and an invaluable aid for professionals of Asset Protection & Security.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Hardcover Verified Purchase
Tom Norman has made a major contribution to the practical documentation of the theory and best practices in security vulnerability assessment. His insights as a practicioner are extremely valuable to the reader. His work is current and comprehensive, and provides a thorough discussion on such topics as available methods, concepts and theory, advantages and disadvantages, and tools to make using them more effective. I highly recommend this book for the library of anyone interested in modern security management and risk analysis methods.

Congratulations on a tireless work well done!

David A. Moore, PE, CSP
President & CEO
AcuTech Consulting Group
1600 Tysons Blvd
Suite 800
McLean, VA 22102
[...]
Comment 3 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Hardcover Verified Purchase
This is a Excellent Book Filled with Knowledge and Information. You only need this book no other on the market can match the information. I have looked for two years and came across this one.. I have 30 Years in Law Enforcement with 27 years as a detective..It really tells the truth about Risk and Counter Measures. The Author does not bite his tongue and give you the facts about WHO IS OUT THERE claiming to know Risk Assessment. Advance information that will make you think, The Chapter of Critical Thinking stands alone. Read that Chapter First. Then read the rest of the Book.

The Best Book Out There NOW!!!!!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Hardcover Verified Purchase
This book is recommended reading for a college class. It is good, kept my interest, met the requirement and that is what I needed it to do.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

What Other Items Do Customers Buy After Viewing This Item?

Pages with Related Products. See and discover other items: forensic science