Introduction to Security (eBook)
570 Seiten
Elsevier Science (Verlag)
978-0-08-047001-6 (ISBN)
Introduction to Security, Seventh Edition, presents the latest in security issues from security equipment and design theory to security management practice. This complete revision of the classic textbook has been reorganized to reflect the industry changes since the 9/11 World Trade Center attacks.
It includes new coverage throughout of terrorism as it relates to cargo and travel security, potential areas of attack and target hardening techniques, and the use of current technologies to combat new threats.
The book begins with a new chapter on the development of Homeland Security in the United States. Traditional physical and guard security is covered in addition to advances in the electronic and computer security areas, including biometric security, access control, CCTV surveillance advances, as well as the growing computer security issues of identity theft and computer fraud.
The Seventh Edition provides the most comprehensive breakdown of security issues for the student while detailing the latest trends, legislation, and technology in the private and government sectors for real-world application in students' future careers. As the definitive resource for anyone entering or currently working in the security industry, this book will also benefit law enforcement personnel, security consultants, security managers, security guards and other security professionals, and individuals responsible for Homeland Security.
* Examines the attacks of September 11th, 2001 and the lasting impact on the security industry* Expanded figures and photographs support new coverage of emerging security issues
* Recommended reading for the American Society for Industrial Security's (ASIS) Certified Protection Professional (CPP) and Physical Security Professional (PSP) exams
Robert Fischer is President of Assets Protection Associates, Inc., a security consulting firm established in 1986. He earned his Ph.D. in education administration from Southern Illinois University in 1981. Dr. Fischer has served as a consultant to many organizations, including publishers, private security firms, retailers, and school districts. Dr. Fischer is a member of the Academy of Criminal Justice Sciences, the American Society for industrial Security, The Academy if Security Educators and Trainers, and the International Police Association. He recently retired from his positions as the Director of Illinois Law Enforcement Executive Institute, a project of the Illinois Law Enforcement and Standards Board, and as a professor of law enforcement and justice administration at Western Illinois University.
Introduction to Security, Seventh Edition, presents the latest in security issues from security equipment and design theory to security management practice. This complete revision of the classic textbook has been reorganized to reflect the industry changes since the 9/11 World Trade Center attacks. It includes new coverage throughout of terrorism as it relates to cargo and travel security, potential areas of attack and target hardening techniques, and the use of current technologies to combat new threats. The book begins with a new chapter on the development of Homeland Security in the United States. Traditional physical and guard security is covered in addition to advances in the electronic and computer security areas, including biometric security, access control, CCTV surveillance advances, as well as the growing computer security issues of identity theft and computer fraud. The Seventh Edition provides the most comprehensive breakdown of security issues for the student while detailing the latest trends, legislation, and technology in the private and government sectors for real-world application in students' future careers. As the definitive resource for anyone entering or currently working in the security industry, this book will also benefit law enforcement personnel, security consultants, security managers, security guards and other security professionals, and individuals responsible for Homeland Security. * Examines the attacks of September 11th, 2001 and the lasting impact on the security industry* Expanded figures and photographs support new coverage of emerging security issues* Recommended reading for the American Society for Industrial Security's (ASIS) Certified Protection Professional (CPP) and Physical Security Professional (PSP) exams
Cover 1
TOC$Table of Contents 6
Preface 14
Acknowledgments 16
PART I Introduction and Security’s Function 18
CH$1. Homeland Security-- Changing the Emphasis on Security in the United States 20
Introduction 20
Private Enterprise Response 21
Federal Response in the United States 28
State/Local Response 32
Public/Private Joint Initiatives 34
Concerns 34
Review Questions 36
References 36
CH$2. Origins and Development of Security 38
Introduction 38
Security in England 38
Security in the United States 42
Summary 51
Review Questions 51
References 51
CH$3. Defining Security's Role 54
Introduction 54
What Is Private Security? 54
Security Services 56
Contract versus Proprietary Services 57
Hybrid Systems 62
Private Security and Public Law Enforcement 65
Relationships after September 11, 2001 68
Summary 68
Review Questions 69
References 69
CH$4. The Proprietary Security Organization 72
Introduction 72
Determining the Need 72
Security’s Place in the Organization 73
Organizing the Security Function 80
Summary 89
Review Questions 90
References 90
CH$5. Career Opportunities in Loss Prevention 92
Introduction 92
Factors Increasing Security Opportunities 92
The Security/Loss-Prevention Occupation 93
Summary 103
Review Questions 103
References 103
CH$6. Security Education, Training, Certification, and Regulation 106
Introduction 106
Adequacy of Private Security Training 107
Proposed Federal Regulation 107
The Role of Higher Education 108
Training 110
Certification and Regulation 111
Magazines and Periodicals 114
Summary 114
Review Questions 116
References 116
PART II Basics of Defense 118
CH$7. Security and the Law 120
Introduction 120
Security, Public Police, and the U.S. Constitution 121
Sources of Law 121
Classes of Crimes 123
Private Security Powers 125
Civil Law: The Controller for Private Security 131
Security and Liability 135
Duty to Protect from Third-Party Crime 136
Recent Trends in Liability 140
Recent Trends in Privacy 141
New Laws 141
The Courts 141
Development of Case Law 142
Summary 144
Review Questions 144
References 144
CH$8. Risk Analysis and the Security Survey 146
Introduction 146
Risk Management 147
The Security Survey 148
Alternatives for Optimizing Risk Management 158
Summary 163
Review Questions 163
Reference 163
CH$9. The Outer Defenses: Building and Perimeter Protection 164
Introduction 164
Barriers, Fences, and Walls 165
Gates and Other Barrier Breaches 169
Barrier Protection 170
Inside the Perimeter 173
Lighting 174
Planning Security 181
Summary 181
Review Questions 182
References 182
CH$10. Interior and Exterior Security Concerns 184
Introduction 184
Buildings on or as the Perimeter 184
Windows and Doors 184
Locks and Keys 187
Roofs and Common Walls 201
Surveillance Devices 201
Old Construction 205
New Construction 206
Security at the Building Design Stage 206
Security Principles in Design 207
Summary 207
Review Questions 208
References 208
CH$11. The Inner Defenses: Intrusion and Access Control 210
Introduction 210
Doors to Sensitive Areas 211
Office Area Doors 211
Traffic Patterns 211
Traffic Control 212
Employee Identification 213
Package Control 215
Files, Safes, and Vaults 215
Inspections 220
Alarms 220
Summary 229
Review Questions 230
References 231
CH$12. Fire Protection, Safety, and Emergency Planning 232
Introduction 232
Fire Prevention and Protection 233
Safety and Loss Control 245
Emergency Planning 253
Summary 256
Review Questions 257
References 257
CH$13. Insurance 258
Introduction 258
The Value of Insurance in a Total Loss-Prevention Program 258
Types of Insurance 259
Insuring against Crime 264
Insuring Property 265
Summary 267
Review Questions 268
References 268
CH$14. Internal Theft Controls 270
Introduction 270
What Is Honesty? 270
The Dishonest Employee 271
Management Responsibility in Loss Prevention 274
Program for Internal Security 276
Procedural Controls 278
When Controls Fail 286
Summary 289
Review Questions 289
References 289
CH$15. Personnel Policies for Internal Security 290
Introduction 290
Human Resources Screening 290
Employment History and Reference Checking 291
Backgrounding 298
Integrity and Lie Detection Tests 299
Americans with Disabilities Act 302
Drug Screening 305
Other Screening Options 305
Hiring Ex-convicts and Parolees 306
Morale 306
Summary 308
Review Questions 309
References 309
PART III Specific Threats and Solutions 312
CH$16. Transportation/Cargo Security 314
Introduction 314
The Role of Private Security 315
Accountability Procedures 315
Theft and Pilferage 317
Planning for Security 321
Cargo in Transit 324
Suggested Sealing Systems and Procedures 326
Special Issues in Airline Security 331
Other Transportation Industry Responses to Terrorism 333
Summary 333
Review Questions 334
References 334
CH$17. Workplace Violence: Prevention and Intervention 336
Introduction 336
Threat 337
Harassment 337
Attack 337
Sabotage 337
The Phenomenon of Workplace Violence 337
The Work Environment and Violence 339
Profiling Violent Behavior 340
Basic Levels of Violence 342
Preventing Workplace Violence 343
The Violence Intervention and Contingency Team 344
Perpetrators’ Rights 345
Intervention Strategy 346
Summary 349
Review Questions 349
References 349
CH$18. Drugs in the Workplace 350
Introduction 350
Impact of Drug Use 351
Drug Testing 353
Spotting Drug Use 355
The Components of a Comprehensive Substance Abuse Program 356
Summary 359
Review Questions 359
References 359
CH$19. Retail Security 362
Introduction 362
Shoplifting 363
Checks and Credit/Debit Cards 373
Internal Theft 379
Summary 383
Review Questions 383
References 384
CH$20. Terrorism and Other Tools of Destruction 386
Introduction 386
Current Issues 388
Historical Background 389
Implications of a Changing World 392
In Search of a Definition for International Terrorism 393
Terrorism as a Tactic, Instrument, or Method 395
Characterizing Modern Terrorism 397
Specific Threats and Responses 406
Other Specific Response Issues in the United States 409
The Future/Summary 412
Review Questions 412
References 412
CH$21. Computer and Information Security 416
Introduction 416
Types of Computer Systems 419
Networks 421
The Database Problems 423
The Need for Computer Security 423
Computer Systems Protection 428
Content Monitoring and Filtering 435
Dealing with Identity Theft 437
Other Data Resources Vulnerabilities 439
Summary 440
Review Questions 440
References 440
CH$22. Specific Security Threats 444
Introduction 444
Economic/White-Collar Crime 444
Burglary and Robbery 446
Labor Disputes 453
Espionage 455
Piracy 456
Summary 457
Review Questions 457
References 458
CH$23. Security: Its Problems, Its Future 460
Introduction 460
The Aftermath of September 11, 2001 460
Private Security Resources 461
Interaction and Cooperation 461
Limitations of Security 462
Trends 463
The Future 464
Summary 467
Review Questions 467
References 467
Appendix A: Security Journals, Magazines, and Newsletters 470
Appendix B: World Wide Web Sites 472
Appendix C: Security Surveys 474
IDX$Index 482
Erscheint lt. Verlag | 24.1.2004 |
---|---|
Sprache | englisch |
Themenwelt | Schulbuch / Wörterbuch |
Recht / Steuern ► EU / Internationales Recht | |
Recht / Steuern ► Strafrecht ► Kriminologie | |
Recht / Steuern ► Strafrecht ► Strafverfahrensrecht | |
Sozialwissenschaften ► Politik / Verwaltung | |
Sozialwissenschaften ► Soziologie | |
Technik ► Bauwesen | |
Wirtschaft ► Betriebswirtschaft / Management ► Finanzierung | |
Wirtschaft ► Betriebswirtschaft / Management ► Logistik / Produktion | |
Wirtschaft ► Betriebswirtschaft / Management ► Unternehmensführung / Management | |
ISBN-10 | 0-08-047001-7 / 0080470017 |
ISBN-13 | 978-0-08-047001-6 / 9780080470016 |
Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich