Introduction to security

Introduction to security

  • نوع فایل : کتاب
  • زبان : انگلیسی
  • مؤلف : Robert J Fischer; Edward P Halibozek; Gion Green
  • ناشر : Amsterdam ; Boston : Butterworth-Heinemann
  • چاپ و سال / کشور: 2008
  • شابک / ISBN : 9780750684323

Description

Private security services. Private security services -- Management. Industries -- Security measures. Violence in the workplace -- Prevention. Summary 85 Review Questions 86 References 86 5 Career Opportunities in Loss Prevention 87 1 Introduction 87 2 The Security and Loss Prevention Occupation 88 Summary 99 Review Questions 100 References 100 6 Security Education, Training, Certification, and Regulation 101 1 Introduction 101 2 Adequacy of Private Security Training 102 3 Proposed Federal Regulation 102 4 Magazines and Periodicals 110 Summary 110 Review Questions 112 References 112 Part II Basics of Defense 115 7 Security and the Law 117 1 Introduction 117 2 Security, Public Police, and the U.S. Constitution 118 3 Sources of Law 119 4 Private Security Powers 122 5 Civil Law: The Controller for Private Security 129 6 Recent Trends in Liability 139 7 Recent Trends in Privacy 140 8 New Laws 140 9 The Courts 140 10 Development of Case Law 141 Summary 143 Review Questions 144 References 144 8 Risk Analysis, Security Surveys, and Insurance 147 1 Introduction 147 2 Risk Management 148 3 Operational Audits and Programmed Supervision 156 4 Insurance 163 Summary 171 Review Questions 171 References 172 9 The Outer Defenses: Building and Perimeter Protection 173 1 Introduction 173 2 Barriers, Fences, and Walls 174 3 Inside the Perimeter 182 4 Lighting 183 5 Planning Security 190 Summary 190 Review Questions 192 References 192 10 Interior and Exterior Security Concerns 193 1 Introduction 193 2 Buildings On or As the Perimeter 193 3 Surveillance Devices 211 4 Old Construction 215 5 New Construction 215 6 Security at the Building Design Stage 216 7 Security Principles in Design 217 Summary 217 Review Questions 219 References 219 11 The Inner Defenses: Intrusion and Access Control 221 1 Introduction 221 2 Doors to Sensitive Areas 222 3 Office Area Doors 222 4 Traffic Patterns 223 5 Traffic Control 223 6 Files, Safes, and Vaults 227 7 Inspections 232 8 Alarms 232 Summary 243 Review Questions 243 References 243 12 Contingency Planning, Fire Protection, Emergency Response, and Safety 245 1 Introduction 245 2 Contingency Planning 246 3 Emergency Response 252 4 Crisis Management 255 5 Business Continuity 257 6 Business Recovery 259 7 Business Resumption 260 8 Pandemics 261 9 Fire Prevention and Protection 261 10 Safety and Loss Control 275 Summary 282 Review Questions 284 References 284 13 Internal Theft Controls and Personnel Issues 287 1 Introduction 287 2 What Is Honesty? 288 3 The Dishonest Employee 289 4 Program for Internal Security 293 5 Procedural Controls 311 6 When Controls Fail 315 Review Questions 318 References 318 Part III Specific Threats and Solutions 321 14 Transportation and Cargo Security 323 1 Introduction 323 2 The Role of Private Security 324 3 Accountability Procedures 325 4 Planning for Security 331 5 Cargo in Transit 334 6 Special Issues in Airline Security 336 7 Other Transportation Industry Responses to Terrorism 338 Summary 340 Review Questions 340 References 341 15 Violence and Drug Use in the Workplace 343 1 Introduction 343 2 Violence and the Workplace 345 3 Drugs in the Workplace 357 Summary 366 Review Questions 366 References 366 16 Retail Security 369 1 Introduction 369 2 Shoplifting 371 3 Checks and Credit/Debit Cards 381 4 Internal Theft 386 Summary 391 Review Questions 391 References 391 17 Terrorism and Other Tools of Destruction 393 1 Introduction 393 2 Current Issues 396 3 Historical Background 397 4 Implications of a Changing World 401 5 In Search of a Definition for International Terrorism 402 6 Terrorism as a Tactic, Instrument, or Method 405 7 Characterizing Modern Terrorism 407 8 Specific Threats and Responses 418 9 Other Specific Response Issues in the United States 422 10 The Future 424 Review Questions 425 References 425 18 Computers, Information, and Information Systems Security 429 1 Introduction 429 2 CSO, CISO, and CIO Interactions 431 3 Types of Computer Systems 432 4 Networks 434 5 The Database Problem 436 6 Computer Systems Protection 442 7 Content Monitoring and Filtering 449 8 Dealing with Identity Theft 452 9 Other Data Resource Vulnerabilities 454 Summary 454 Review Questions 455 References 455 19 Selected Security Threats of the 21st Century 459 1 Introduction 459 2 Economic or White-Collar Crime 459 3 Burglary and Robbery 461 4 Labor Disputes 469 5 Espionage 471 6 Piracy 473 Summary 474 Review Questions 475 References 475 20 Security: The Future 477 1 Introduction 477 2 The Aftermath of September 11, 2001 478 3 Private Security Resources 478 4 Interaction and Cooperation 479 5 Limitations of Security 479 6 Trends 480 7 The Future 482 Summary 485 Review Questions 485 References 486
Suitable for ASIS International members, this illustrated title includes: chapters on computer issues, cargo, homeland security and terrorism. It also includes a chapter on Internal Issues and Controls covering crucial information on internal theft, personnel policies, and drugs and violence in the workplace.
اگر شما نسبت به این اثر یا عنوان محق هستید، لطفا از طریق "بخش تماس با ما" با ما تماس بگیرید و برای اطلاعات بیشتر، صفحه قوانین و مقررات را مطالعه نمایید.

دیدگاه کاربران


لطفا در این قسمت فقط نظر شخصی در مورد این عنوان را وارد نمایید و در صورتیکه مشکلی با دانلود یا استفاده از این فایل دارید در صفحه کاربری تیکت ثبت کنید.

بارگزاری