Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Introduction to Security -  Robert Fischer,  Edward Halibozek

Introduction to Security (eBook)

eBook Download: PDF
2008 | 8. Auflage
528 Seiten
Elsevier Science (Verlag)
978-0-08-056952-9 (ISBN)
Systemvoraussetzungen
58,63 inkl. MwSt
(CHF 57,25)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Introduction to Security, 8th Edition, has been the leading introduction to private security for over thirty years, celebrated for its balanced and professional approach to this increasingly important area. Now the eighth edition expands the key topics and adds material on important issues in the 21st c environment.

The author team brings together top-level professional experience in industry with years of teaching experience. As a recommended title for security certifications, it is a crucial resource for the 30,000+ ASIS International members, and is also used as a core security textbook in universities throughout the country. This is Butterworth-Heinemann's best-selling security text of all time, an essential reference for all security professionals.

* Significantly expanded chapters on computer issues, cargo, homeland security and terrorism
* New chapter on Internal Issues and Controls covering crucial information on internal theft, personnel policies, and drugs and violence in the workplace
* More illustrations and photos to make learning easier
Introduction to Security has been the leading introduction to private security for over 30 years, celebrated for its balanced and professional approach to this increasingly important area. Now the 8th edition expands the key topics and adds material important in the 21st century environment. The author team brings together top-level professional experience in industry with years of teaching experience. As a recommended title for security certifications, it is a crucial resource for the 30,000+ ASIS International members, and is also used as a core security textbook in universities throughout the country. This is Butterworth-Heinemann's best-selling security text of all time, an essential reference for all security professionals. - Significantly expanded chapters on computer issues, cargo, homeland security and terrorism- New chapter on Internal Issues and Controls covering crucial information on internal theft, personnel policies, and drugs and violence in the workplace- More illustrations and photos to make learning easier

Front Cover 1
Introduction to Security 2
Copyright Page 3
Table of Contents 4
Preface 10
Acknowledgments 12
Part I: Introduction 14
Chapter 1 Homeland Security: What Has Happened to Security Since 9/11? 16
1 Introduction 16
2 Private Enterprise Response 18
3 Federal Response in the United States 28
4 State and Local Response 35
5 Public/Private Joint Initiatives 37
6 Concerns 38
Review Questions 40
References 41
Chapter 2 Origins and Development of Security 44
1 Introduction 44
2 Security in England 45
3 Security in the United States 48
Summary 58
Review Questions 58
References 58
Chapter 3 Defining Security's Role 60
1 Introduction 60
2 What is Private Security? 60
3 Security Services 63
4 Contract Versus Proprietary Services 64
5 Hybrid Systems 71
6 Private Security and Public Law Enforcement 72
7 Relationships After September 11, 2001 76
Summary 77
Review Questions 77
References 77
Chapter 4 The Proprietary Security Organization 80
1 Introduction 80
2 Determining the Need 80
3 Organizing the Security Function 88
Summary 98
Review Questions 99
References 99
Chapter 5 Career Opportunities in Loss Prevention 100
1 Introduction 100
2 The Security and Loss Prevention Occupation 101
Summary 112
Review Questions 113
References 113
Chapter 6 Security Education, Training, Certification, and Regulation 114
1 Introduction 114
2 Adequacy of Private Security Training 115
3 Proposed Federal Regulation 115
4 Magazines and Periodicals 123
Summary 123
Review Questions 125
References 125
Part II: Basics of Defense 128
Chapter 7 Security and the Law 130
1 Introduction 130
2 Security, Public Police, and the U.S. Constitution 131
3 Sources of Law 132
4 Private Security Powers 135
5 Civil Law: The Controller for Private Security 142
6 Recent Trends in Liability 152
7 Recent Trends in Privacy 153
8 New Laws 153
9 The Courts 153
10 Development of Case Law 154
Summary 156
Review Questions 157
References 157
Chapter 8 Risk Analysis, Security Surveys, and Insurance 160
1 Introduction 160
2 Risk Management 161
3 Operational Audits and Programmed Supervision 169
4 Insurance 176
Summary 184
Review Questions 184
References 185
Chapter 9 The Outer Defenses: Building and Perimeter Protection 186
1 Introduction 186
2 Barriers, Fences, and Walls 187
3 Inside the Perimeter 195
4 Lighting 196
5 Planning Security 203
Summary 203
Review Questions 205
References 205
Chapter 10 Interior and Exterior Security Concerns 206
1 Introduction 206
2 Buildings On or As the Perimeter 206
3 Surveillance Devices 224
4 Old Construction 228
5 New Construction 228
6 Security at the Building Design Stage 229
7 Security Principles in Design 230
Summary 230
Review Questions 232
References 232
Chapter 11 The Inner Defenses: Intrusion and Access Control 234
1 Introduction 234
2 Doors to Sensitive Areas 235
3 Office Area Doors 235
4 Traffic Patterns 236
5 Traffic Control 236
6 Files, Safes, and Vaults 240
7 Inspections 245
8 Alarms 245
Summary 256
Review Questions 256
References 256
Chapter 12 Contingency Planning, Fire Protection, Emergency Response, and Safety 258
1 Introduction 258
2 Contingency Planning 259
3 Emergency Response 265
4 Crisis Management 268
5 Business Continuity 270
6 Business Recovery 272
7 Business Resumption 273
8 Pandemics 274
9 Fire Prevention and Protection 274
10 Safety and Loss Control 288
Summary 295
Review Questions 297
References 297
Chapter 13 Internal Theft Controls and Personnel Issues 300
1 Introduction 300
2 What Is Honesty? 301
3 The Dishonest Employee 302
4 Program for Internal Security 306
5 Procedural Controls 324
6 When Controls Fail 328
Review Questions 331
References 331
Part III: Specific Threats and Solutions 334
Chapter 14 Transportation and Cargo Security 336
1 Introduction 336
2 The Role of Private Security 337
3 Accountability Procedures 338
4 Planning for Security 344
5 Cargo in Transit 347
6 Special Issues in Airline Security 349
7 Other Transportation Industry Responses to Terrorism 351
Summary 353
Review Questions 353
References 354
Chapter 15 Violence and Drug Use in the Workplace 356
1 Introduction 356
2 Violence and the Workplace 358
3 Drugs in the Workplace 370
Summary 379
Review Questions 379
References 379
Chapter 16 Retail Security 382
1 Introduction 382
2 Shoplifting 384
3 Checks and Credit/Debit Cards 394
4 Internal Theft 399
Summary 404
Review Questions 404
References 404
Chapter 17 Terrorism and Other Tools of Destruction 406
1 Introduction 406
2 Current Issues 409
3 Historical Background 410
4 Implications of a Changing World 414
5 In Search of a Definition for International Terrorism 415
6 Terrorism as a Tactic, Instrument, or Method 418
7 Characterizing Modern Terrorism 420
8 Specific Threats and Responses 431
9 Other Specific Response Issues in the United States 435
10 The Future 437
Review Questions 438
References 438
Chapter 18 Computers, Information, and Information Systems Security 442
1 Introduction 442
2 CSO, CISO, and CIO Interactions 444
3 Types of Computer Systems 445
4 Networks 447
5 The Database Problem 449
6 Computer Systems Protection 455
7 Content Monitoring and Filtering 462
8 Dealing with Identity Theft 465
9 Other Data Resource Vulnerabilities 467
Summary 467
Review Questions 468
References 468
Chapter 19 Selected Security Threats of the 21st Century 472
1 Introduction 472
2 Economic or White-Collar Crime 472
3 Burglary and Robbery 474
4 Labor Disputes 482
5 Espionage 484
6 Piracy 486
Summary 487
Review Questions 488
References 488
Chapter 20 Security: The Future 490
1 Introduction 490
2 The Aftermath of September 11, 2001 491
3 Private Security Resources 491
4 Interaction and Cooperation 492
5 Limitations of Security 492
6 Trends 493
7 The Future 495
Summary 498
Review Questions 498
References 499
Appendix A: Security Journals, Magazines, and Newsletters 500
Appendix B: World Wide Web Resources for Security Response 502
Appendix C: Security Licensing and Regulation Resources by State 504
Appendix D: Security Surveys 506
Index 514
A 514
B 514
C 515
D 517
E 518
F 518
G 519
H 519
I 519
J 521
K 521
L 521
M 521
N 522
O 522
P 522
Q 524
R 524
S 525
T 526
U 527
V 527
W 528

Erscheint lt. Verlag 18.3.2008
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Recht / Steuern Strafrecht Kriminologie
Sozialwissenschaften Soziologie
Wirtschaft Betriebswirtschaft / Management Unternehmensführung / Management
ISBN-10 0-08-056952-8 / 0080569528
ISBN-13 978-0-08-056952-9 / 9780080569529
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 34,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95