Introduction to security
- نوع فایل : کتاب
- زبان : انگلیسی
- مؤلف : Robert J Fischer; Edward P Halibozek; Gion Green
- ناشر : Amsterdam ; Boston : Butterworth-Heinemann
- چاپ و سال / کشور: 2008
- شابک / ISBN : 9780750684323
Description
Private security services. Private security services -- Management. Industries -- Security measures. Violence in the workplace -- Prevention. Summary 85 Review Questions 86 References 86 5 Career Opportunities in Loss Prevention 87 1 Introduction 87 2 The Security and Loss Prevention Occupation 88 Summary 99 Review Questions 100 References 100 6 Security Education, Training, Certification, and Regulation 101 1 Introduction 101 2 Adequacy of Private Security Training 102 3 Proposed Federal Regulation 102 4 Magazines and Periodicals 110 Summary 110 Review Questions 112 References 112 Part II Basics of Defense 115 7 Security and the Law 117 1 Introduction 117 2 Security, Public Police, and the U.S. Constitution 118 3 Sources of Law 119 4 Private Security Powers 122 5 Civil Law: The Controller for Private Security 129 6 Recent Trends in Liability 139 7 Recent Trends in Privacy 140 8 New Laws 140 9 The Courts 140 10 Development of Case Law 141 Summary 143 Review Questions 144 References 144 8 Risk Analysis, Security Surveys, and Insurance 147 1 Introduction 147 2 Risk Management 148 3 Operational Audits and Programmed Supervision 156 4 Insurance 163 Summary 171 Review Questions 171 References 172 9 The Outer Defenses: Building and Perimeter Protection 173 1 Introduction 173 2 Barriers, Fences, and Walls 174 3 Inside the Perimeter 182 4 Lighting 183 5 Planning Security 190 Summary 190 Review Questions 192 References 192 10 Interior and Exterior Security Concerns 193 1 Introduction 193 2 Buildings On or As the Perimeter 193 3 Surveillance Devices 211 4 Old Construction 215 5 New Construction 215 6 Security at the Building Design Stage 216 7 Security Principles in Design 217 Summary 217 Review Questions 219 References 219 11 The Inner Defenses: Intrusion and Access Control 221 1 Introduction 221 2 Doors to Sensitive Areas 222 3 Office Area Doors 222 4 Traffic Patterns 223 5 Traffic Control 223 6 Files, Safes, and Vaults 227 7 Inspections 232 8 Alarms 232 Summary 243 Review Questions 243 References 243 12 Contingency Planning, Fire Protection, Emergency Response, and Safety 245 1 Introduction 245 2 Contingency Planning 246 3 Emergency Response 252 4 Crisis Management 255 5 Business Continuity 257 6 Business Recovery 259 7 Business Resumption 260 8 Pandemics 261 9 Fire Prevention and Protection 261 10 Safety and Loss Control 275 Summary 282 Review Questions 284 References 284 13 Internal Theft Controls and Personnel Issues 287 1 Introduction 287 2 What Is Honesty? 288 3 The Dishonest Employee 289 4 Program for Internal Security 293 5 Procedural Controls 311 6 When Controls Fail 315 Review Questions 318 References 318 Part III Specific Threats and Solutions 321 14 Transportation and Cargo Security 323 1 Introduction 323 2 The Role of Private Security 324 3 Accountability Procedures 325 4 Planning for Security 331 5 Cargo in Transit 334 6 Special Issues in Airline Security 336 7 Other Transportation Industry Responses to Terrorism 338 Summary 340 Review Questions 340 References 341 15 Violence and Drug Use in the Workplace 343 1 Introduction 343 2 Violence and the Workplace 345 3 Drugs in the Workplace 357 Summary 366 Review Questions 366 References 366 16 Retail Security 369 1 Introduction 369 2 Shoplifting 371 3 Checks and Credit/Debit Cards 381 4 Internal Theft 386 Summary 391 Review Questions 391 References 391 17 Terrorism and Other Tools of Destruction 393 1 Introduction 393 2 Current Issues 396 3 Historical Background 397 4 Implications of a Changing World 401 5 In Search of a Definition for International Terrorism 402 6 Terrorism as a Tactic, Instrument, or Method 405 7 Characterizing Modern Terrorism 407 8 Specific Threats and Responses 418 9 Other Specific Response Issues in the United States 422 10 The Future 424 Review Questions 425 References 425 18 Computers, Information, and Information Systems Security 429 1 Introduction 429 2 CSO, CISO, and CIO Interactions 431 3 Types of Computer Systems 432 4 Networks 434 5 The Database Problem 436 6 Computer Systems Protection 442 7 Content Monitoring and Filtering 449 8 Dealing with Identity Theft 452 9 Other Data Resource Vulnerabilities 454 Summary 454 Review Questions 455 References 455 19 Selected Security Threats of the 21st Century 459 1 Introduction 459 2 Economic or White-Collar Crime 459 3 Burglary and Robbery 461 4 Labor Disputes 469 5 Espionage 471 6 Piracy 473 Summary 474 Review Questions 475 References 475 20 Security: The Future 477 1 Introduction 477 2 The Aftermath of September 11, 2001 478 3 Private Security Resources 478 4 Interaction and Cooperation 479 5 Limitations of Security 479 6 Trends 480 7 The Future 482 Summary 485 Review Questions 485 References 486
Suitable for ASIS International members, this illustrated title includes: chapters on computer issues, cargo, homeland security and terrorism. It also includes a chapter on Internal Issues and Controls covering crucial information on internal theft, personnel policies, and drugs and violence in the workplace.