Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
"...effectively examines the tactics, techniques, and procedures used by terrorists and criminals to understand the pre-attack and attack planning process...well organized and can be used for classroom instruction or as a quality reference for professionals..." --Security Management (online), February 2, 2015
".when the topic is threat detection, and the author has been Chief of the Office of Threat Detection at the US Pentagon, the man is worth a hearing. Put another way, the book is about identifying the bad guys; the threat actors, in the jargon. Kirchner suggests that we think of security 'as concentric models of suspicious behaviour', which can be note-taking or a last-minute dress rehearsal." --Professional Security Magazine Online, May 28, 2014








