Offensive and Defensive Security

Concepts, Planning, Operations, and Management

by Harry I Nimon PhD PMP


Formats

E-Book
$9.99
Softcover
$34.99
Hardcover
$98.99
E-Book
$9.99

Book Details

Language : English
Publication Date : 5/21/2013

Format : E-Book
Dimensions : 6x9
Page Count : 456
ISBN : 9781483637679
Format : Softcover
Dimensions : 6x9
Page Count : 456
ISBN : 9781483637655
Format : Hardcover
Dimensions : 6x9
Page Count : 456
ISBN : 9781483637662

About the Book

Numerous publications exist which examine elements of the security discipline. Few address these elements as a continuum of interrelated functions. None examine the structure of Offensive vice Defensive security in anything other than the domain of international security . This text has been written to fill this gap and to support a course in Offensive-Defensive Security, developed by Henley-Putnam University, which briefly reviews the history of the field of strategic security and its three component parts – protection, intelligence, and counterterrorism – as well as its two distinguishing characteristics: offensive tactics and operations combined with technological innovation. The course then moves to an in-depth assessment of related security areas that focus on defensive tactics and operations: homeland security, criminal justice, conflict and peace studies, and emergency management. While these fields may appear – at first – to be part of strategic security, this course and the associated text explores the critical differences and the fact that they are also critical elements of industrial, governmental, and military security. Emphasis will be placed at an introductory level – both academic and professional distinctions – and discuss the structures associated within these domains. The text is divided into the following key sections: Section 1: The Basics Section 2: The Environment Section 3: Security Planning and Management Section 1 provides an orientation for the reader to a common frame of reference through information provided in the following chapters. It is not intended to be a single source of all relevant information. Additionally, this text is not intended to be the exhaustive single source for all conditions. Rather, it provides a roadmap of considerations on how to reach a specific goal in an efficient and informed manner. Section 2 examines the world the security professional must inhabit, again, in a generalized manner and, likely, in a way never before considered. Elements of neurology, biology, physics, philosophy, logic, analytics, and finance are presented in a manner unique to the changing paradigm of Offensive-Defensive Security philosophy. The various chapters are labeled as ‘terrains’ as the best representation of the environmental information to be discussed. Each will approach the topics in as clear a manner possible of current thinking and science within each as critical to the understanding of the total security environment; the how, why, and in what ways they will affect the world of this security paradigm. Finally, Section 3 incorporates the information of the first two sections and applies the knowledge gained to the planning and management of an integrated security plan. The objective of this section is to utilize the concepts and processes developed via international agencies such as the Project Management Institute to demonstrate how to create an integrated and manageable enterprise structure and not a one-size fits all template. As the knowledge consolidates, integration begins, that of incorporating the security entity into the enterprise as a whole be that enterprise be a business, government entity, or military operation. The only difference is the scale. This is a vital step in that the act of protection cannot interfere with the process of performing the enterprise function. In fact, it must enhance the enterprise function and assist in ensuring its success. Key Learning Points The approach and purpose of this text has been outlined. The following are the key reasons or learning points in summary. a. Define the key elements and environments within which the security plan and operational management activities must occur b. Familiarize the student with cultural, biological, financial, informational, and legal aspects necessary for the understanding of how these domains influence human behavior; the primary aspect of security planning and operations c. Familiarize the


About the Author

Harry Nimon is a life-long learner, involving himself in the domains of art, poetry, physics, music, fantasy (his favorite authors are Robert Jordan, Jim Butcher and C.J. Cherryh), history (primarily military and political), neuroscience, psychology, and religion. He received his UG degree in Education from Akron University and MBA from Central Michigan. Upon entering the US Army, he became enthralled in the Intelligence and Security fields, serving in many posts until his retirement in 1998. During this tenure, and because of his son, he became deeply interested in neurology and neuroplasticity in 1982, culminating in a Doctorate in 2008 where he researched the effects of personality on an individual’s ability and willingness to accept computer-mediated communications during combat in Desert Storm and other theaters. Harry has spent the last 40 years in the field of Operations Research modeling and simulations. In 2000, he began teaching a variety of courses for the University of Phoenix and later, in 2011, for Henley-Putnam University, for which this book was written. He works for the Boeing Corporation in the Phantom Works Company, again, performing OR analyses and designing operational models and simulations. He is married (since 1975) to a wonderful and professionally lauded woman, has four adult children (two married) all of whom are highly educated (a PhD and 3 Master’s degrees) and of high professional standing. Moreover, he strongly believes that he has been Blessed beyond measure by a wonderful God.