• 1
    M. L. Garcia, Vulnerability Assessment of Physical Protection Systems, Butterworth-Heinemann, Burlington, 2008.
  • 2
    S. Mannan, Lee's Loss Prevention in the Process Industries, Elsevier Butterworth-Heinemann, Burlington, 2005.
  • 3
    I.T. Cameron and R. Raman, Process Systems Risk Management, Elsevier Academic Press, Amsterdam, 2005.
  • 4
    J. Talbot and M. Jakeman, Security Risk Management Body of Knowledge, Wiley, New York, 2009.
  • 5
    G.L.L. Reniers, Terrorism security in the chemical industry: Results of a qualitative investigation, Secur J 24 (2011), 6984.
  • 6
    American Petroleum Institute, API Recommended Practice 780, Security Risk Assessment Methodology for the Petroleum and Petrochemical Industries, Document Draft, American Petroleum Institute, Washington, 2012.
  • 7
    F. Fontaine, B. Debray, and O. Salvi, “Protection of hazardous installations and critical infrastructures—Complementarity of safety and security approaches,” Managing Critical infrastructure Risks, I. Linkov, R.J. Wenning, and G.A. Kiker, (Editors), Springer, London (2007), pp. 6578.
  • 8
    D. Holtrop and D. Kretz, Onderzoek Security & Safety: een Inventarisatie van Beleid, Wet- en Regelgeving, In Dutch, Arcadis, The Netherlands, 2008.
  • 9
    G.L.L. Reniers, Multi-plant Safety and Security Management in the Chemical and Process Industries, Wiley-VCH, Weinheim, 2010.
  • 10
    G.L.L. Reniers, D. Herdewel, and J.-L. Wybo, A threat assessment review planning (TARP) decision flowchart for complex industrial areas, J Loss Prev Process Ind 26 (2013), 16621669.
  • 11
    CCPS, Guidelines for Analyzing and Managing the Security Vulnerabilities of Fixed Chemical Sites, Center for Chemical Process Safety, American Institute for Chemical Engineers, New York, 2003.
  • 12
    D.J. Landoll, The Security Risk Assessment Handbook, Auerbach Publications, Boca Raton, 2006.
  • 13
    CCPS, Inherently Safer Chemical Processes, A Life Cycle Approach, Center for Chemical Process Safety, American Institute for Chemical Engineers, New York, 1996.
  • 14
    A.M. Dowell, Layer of protection analysis and inherently safer processes, Process Saf Prog 18 (1999), 214220.
  • 15
    T. Meyer and G. Reniers, Engineering Risk Management, De Gruyter, Berlin, 2013.
  • 16
    L.J. Fennelly, Handbook of Loss Prevention and Crime Prevention, 4th Edition, Butterworth-Heinemann, Burlington, 2004.
  • 17
    J. Ellis and C.A. Hertig, The Professional Protection Officer, Butterworth-Heinemann, Burlington, 2010.
  • 18
    IAEA (International Atomic Energy Agency), Defence in Depth in Nuclear Safety, IAEA, Vienna, 1996.
  • 19
    ASIS, Protection of Assets, Physical Security, ASIS International, Alexandria, VA, 2012.
  • 20
    M.J. Arata Jr., Perimeter Security, McGraw-Hill, San Francisco, 2006.
  • 21
    T.L. Norman, Risk Analysis and Security Countermeasure Selection, CRC Press, Boca Raton, 2010.
  • 22
    Institute of Security Belgium, Handbook “Basisopleiding bestemd voor Leidend Personeel van beveiligingsondernemingen” (in Dutch), Ministry of Home Affairs, Brussels, 2013.
  • 23
    Belgian Official Gazette, Wet tot regeling van de private en bijzondere veiligheid (in Dutch), (1990), p. 10963.
  • 24
    T. Wu, C. Chen, and C. Li, A correlation among safety leadership, safety climate and safety performance, J Loss Prev Process Ind 21 (2008), 307318.
  • 25
    E.A. Kapp, The influence of supervisor leadership practices and perceived group safety climate on employee safety performance, Saf Sci 50 (2012), 11191124.
  • 26
    H.A. Gabbar and K. Suzuki, The Design of a Practical Enterprise Safety Management System, Kluwer Academic Publishing, Dordrecht, 2004.