LEADER 01217nam0-2200409---450- 001 990000330580203316 005 20050907112034.0 035 $a0033058 035 $aUSA010033058 035 $a(ALEPH)000033058USA01 035 $a0033058 100 $a20010129d1995----y0itay01 ba 101 $aita 102 $aIT 105 $a00||| 200 1 $aIntroduzione alla docimologia$fAchille M. Notti 210 $aSiracusa$cEdiprint$d1995 215 $a151 p.$d21 cm 606 $aDocimologia 606 $aAlunni$xValutazione 676 $a371.27 700 1$aNOTTI,$bAchille M.$0537866 801 0$aIT$csalbc$gISBD 912 $a990000330580203316 951 $aII.4. 997(VI B 383)$b126340 LM.$cVI B$d00009204 951 $aII.4. 997a(VI B 383 BIS)$b126341 LM.$cVI B 951 $aII.4. 997b(VI B 383 A)$b126342 LM.$cVI B 959 $aBK 969 $aUMA 979 $aTAMI$b40$c20010129$lUSA01$h1733 979 $aPATTY$b90$c20020104$lUSA01$h1414 979 $aPATTY$b90$c20020104$lUSA01$h1414 979 $c20020403$lUSA01$h1641 979 $aPATRY$b90$c20040406$lUSA01$h1623 979 $aCOPAT6$b90$c20050907$lUSA01$h1120 996 $aIntroduzione alla docimologia$9879581 997 $aUNISA LEADER 03205oam 2200709I 450 001 9910800076303321 005 20200520144314.0 010 $a0-429-24838-5 010 $a1-4398-5172-7 024 7 $a10.1201/b10809 035 $a(CKB)2550000000040303 035 $a(EBL)735694 035 $a(OCoLC)741493015 035 $a(SSID)ssj0000509924 035 $a(PQKBManifestationID)11346416 035 $a(PQKBTitleCode)TC0000509924 035 $a(PQKBWorkID)10572658 035 $a(PQKB)10509248 035 $a(Au-PeEL)EBL735694 035 $a(CaPaEBR)ebr10482248 035 $a(CaONFJC)MIL693137 035 $a(OCoLC)759865923 035 $a(CaSebORM)9781439851715 035 $a(MiAaPQ)EBC735694 035 $a(EXLCZ)992550000000040303 100 $a20180331d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aProtective operations $ea handbook for security and law enforcement /$fGlenn P. McGovern 205 $a1st edition 210 1$aBoca Raton :$cTaylor & Francis,$d2011. 215 $a1 online resource (224 p.) 300 $aDescription based upon print version of record. 311 $a1-4665-3767-1 311 $a1-322-61855-0 311 $a1-4398-5171-9 320 $aIncludes bibliographical references and index. 327 $aFront cover; Contents; Preface; Acknowledgments; The Author; Introduction; Chapter 1. Breaking the Mindset; Chapter 2. Policy and Procedure Considerations; Chapter 3. Weapons, Vehicles, and Equipment; Chapter 4. Training for the Adversary; Chapter 5. Assessing the Risk and Threat of Hostile Organizations; Chapter 6. The Protective Advance; Chapter 7. Operational Security (OPSEC); Chapter 8. Overt versus Covert Details; Chapter 9. Surveillance Detection; Chapter 10. Levels of Protection and the Cessation of Protection; Chapter 11. Conclusion; Appendix A: Law Enforcement Protective Operations 327 $aAppendix BBack cover 330 $aProtective Operations: A Handbook for Security and Law Enforcement is designed as a reference for law enforcement and security organizations tasked with protecting the welfare of an individual or groups of individuals. To be effective and professional, protective operations require the incorporation of a variety of skill sets. However, many departments and jurisdictions have only limited resources and training available. Filling this void, the book identifies issues particular to local law enforcement - and the private security teams that may be called in later - and offers 606 $aProtective custody 606 $aAssassination$xPrevention 606 $aKidnapping$xPrevention 606 $aCrime prevention 606 $aPolice patrol 615 0$aProtective custody. 615 0$aAssassination$xPrevention. 615 0$aKidnapping$xPrevention. 615 0$aCrime prevention. 615 0$aPolice patrol. 676 $a363.2/3 700 $aMcGovern$b Glenn.$01547277 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910800076303321 996 $aProtective operations$93876378 997 $aUNINA