|
Books > Academic & Education > Professional & Technical > Security
A crucial reference for the practicing or aspiring design
consultant, "Security Design Consulting" brings you step by step
through the process of becoming a security consultant, describing
how to start the business, market services, write proposals,
determine fees, and write a report. Specific elements of
assessment, design and project management services as well as
acquiring product and industry knowledge are all covered in detail.
Concentrating on client-focused marketing and sales strategies as
well as the crucial elements of preparing, running, and succeeding
at the security consulting business, "Security Design Consulting"
gives the reader a working knowledge of all the steps necessary to
be a successful security design consultant and a smarter business
owner. Security directors, architects and security management
consultants will also find this reference invaluable in
understanding the security design consultant's important and
growing role in an overall security program.
* Focuses on consulting in security design, not security
management
* Provides sample service agreements, specifications, and reports
to use as models
* Emphasizes the highest technical and ethical standards for this
increasingly crucial profession
Kovacich and Halibozek offer you the benefit of more than 55 years
of combined experience in government and corporate security.
Throughout the book, the authors use a fictional global corporation
as a model to provide continual real-world challenges and
solutions. New and experienced managers alike will find a wealth of
information and practical advice to help you develop strategic and
tactical plans and manage your daily operations.
* Contains real case examples to illustrate practical application
of concepts
* Thoroughly covers the integration of physical, computer and
information security goals for complete security awareness
* A handy reference for managers to quickly find and implement the
security solutions they need
Security personnel are being asked to justify their existence in a
corporate environment. They must prove their worth in dollars and
cents by showing the return on investing in loss prevention. This
means security departments are being forced to contribute more to
the business as a whole. This book will show security managers and
personnel how to go about this, and how to achieve quality in their
departments.
Suggests security should be a valued resource within the
corporation that can contribute to bottom line performance.
Teaches security managers to approach their jobs as 'business
managers who specialize in security'.
Written by Security Magazine's 1987 Executive Achievement Award
recipient.
PRIVATE SECURITY AND THE LAW is a textbook analysis of significant
practices in the security industry that relate to law, regulation,
licensure and constitutional dilemmas according to case and
statutory authority. It is a treatise on the state of the law that
governs the security industry and its operatives. The text delivers
up to date information on the legal requirements witnessed by most
security firms. In addition, it dwells heavily on the liability
problems common to security operations, including negligence and
tortious liability, civil actions commonly litigated, and
strategies to avoid troublesome causes of action that effect
business efficiency. From another angle, the work intensely
examines the constitutional and due process dimensions of private
security work and affords the reader a look at how case law applies
certain remedies to wronged parties. Recent cases, and the trends
sure to follow, are highlighted throughout the project. Finally,
the text is filled with checklists, data and other useful
information that aids the security practitioner in applying theory
to practice.
* Up to date case law analysis provides cutting edge legal
treatment of evolving standards
* Complicated material is presented in a down-to-earth, readable
style, perfect for the student of security or security
professional
* Over 200 tables and illustrations allow the reader speedy access
to precise data
Office and Office Building Security, Second Edition, is the first
book of its type to address issues of violence in the workplace to
breaking and entering. As a working guide for administrators,
property managers and security personnel, this book is devoted
exclusively to total office security programs, detailing hundreds
of professional secrets for the safety of employees and the
complex. Office & Office Building Security, Second Edition,
provides the background to create a safe and secure workplace,
regardless of location, size and number of employees.
Provides updated and current information on every office security
issue or concern.
Trains the businessperson to be responsive to 'foreseeability'
issues alluded to in the court system.
Examines issues of violence and crime, as well as the dynamics
'Protective Security Law', Second Edition is a text on the legal
rights available to security officers, corporations, partnerships
and individually owned businesses for the protection of their
property from thievery by employees, customers, and others. It was
prepared primarily for non-lawyers, but it also presents thoroughly
documented coverage of the entire legal spectrum for corporate
counsel and individual lawyers who must advise clients regarding
security operations.
In addition to its practical application, 'Protective Security
Law', Second Edition is a text that is highly suitable for
instructional purposes in junior colleges and other educational
institutions offering courses relating to protective security. It
is valuable in police training schools, because it presents a
uniquely simplified treatment of the law regarding police powers of
arrest, search and seizure, interrogation and other aspects of law
enforcement. This reference is an invaluable source of information
on the legal rights and responsibilities of security personnel and
merchants regarding thievery and other intrusions upon their lawful
interest. An appendix contains statutory provisions from all 50
states and the District of Columbia regarding protective issues of
particular concern to merchants and security personnel.
An invaluable source of information on the legal rights and
responsibilities of security personnel.
Presents a uniquely simplified treatment of the law regarding
police powers.
Highly suitable for instructional purposes in junior colleges and
other educational institutions offering courses relating to
protective security.
This book helps the reader to critically evaluate a security
operation using modern research techniques. It focuses on all
retail business security issues, emphasizing vulnerabilities,
losses, and practical countermeasures to combat such crimes as
internal theft and shoplifting.
Coverage includes such key topics as: the impact of the Americans
with Disabilities Act; proper testing procedures under Employee
Polygraph Protection Act; Ernst and Young's Survey of Retail Loss
Prevention Trends; and the National Retail Security Survey
conducted by Security Magazine.
As a practical reference for anyone entrusted with the lives and
property of others, Emergency Planning helps its readers prepare
for a variety of situations--from bomb threats to fires to nuclear
disasters. The authors of this book recognize the need for updated
emergency planning. The "blueprints" in the appendices are useful
plans for dealing with such specific emergencies as labor strikes,
hurricanes, and terrorist actions.
While most large governmental entities are prepared to deal
with nearly all types of contingencies and emergencies, many
communities and companies have few plans detailing how to respond
to and recover from such events. The purpose of this book is to
stimulate thought on the part of the reader, provide some practical
solutions to problems that could be encountered, and offer a number
of considerations for formulating emergency plans. The authors have
combined their years of knowledge and experience to create some
sample plans for the reader to use as models for developing
site-specific plans.
A practical reference written to assist the security professional
in clearly identifying what systems are required to meet security
needs as defined by a threat analysis and vulnerability assessment.
All of the elements necessary to conduct a detailed survey of a
facility and the methods used to document the findings of that
survey are covered. Once the required systems are determined, the
chapters following present how to assemble and evaluate bids for
the acquisition of the required systems in a manner that will meet
the most rigorous standards established for competitive bidding.
The book also provides recommended approaches for system/user
implementation, giving checklists and examples for developing
management controls using the installed systems. This book was
developed after a careful examination of the approved reference
material available from the American Society for Industrial
Security (ASIS International) for the certification of Physical
Security Professionals (PSP). It is intended to fill voids left by
the currently approved reference material to perform implementation
of systems suggested in the existing reference texts. This book is
an excellent "How To" for the aspiring security professional who
wishes to take on the responsibilities of security system
implementation, or the security manager who wants to do a
professional job of system acquisition without hiring a
professional consultant.
* Offers a step-by-step approach to identifying the application,
acquiring the product and implementing the recommended
system.
* Builds upon well-known, widely adopted concepts prevalent among
security professionals.
* Offers seasoned advice on the competitive biddingprocess as well
as on legal issues involved in the selection of applied products.
The effects of digital technology on the security industry require
constant vigilance by security distributors, sales staff, and
installation professionals. Today and for the foreseeable future,
all security professionals must have at least a basic understanding
of digital technology. "Digital CCTV" addresses this new challenge.
Topics convered include compression variables such as Lossless and
Lossy, which are explained by reviewing Huffman and Run Length
Encoding (RLE), and by relating these forms of compression to ZIP
and Stuffit, which are commonly used in personal computers. A
review of JPEG, motion JPEG, MPEG and wavelet compression schemes
among others, with a comparison of the merits of each, is also
provided. As "Digital CCTV" traces the stream of digital video flow
from the computer industry through compression, transmission,
display and storage, and explains how analog video signal is
converted into a digital signal, the reader will learn and
understand the mysteries of digital science.
* Explains industry concepts, acronyms and buzzwords acurately and
clearly
* Covers history, current complexities, and the future effects of
digital science
*Provides practical information about how digital video works, how
digital video is stored and transmitted, what digital systems can
and cannot accomplish, and what to expect from digital video
equipment in modern CCTV systems
Safe Schools: A Security & Loss Prevention Plan is an excellent
reference for school administrators, school safety personnel and
law enforcement for creating a safe and secure academic
environment. Addressing a wide range of security programs and
measures which have been proven to be effective, Safe Schools
serves as a manual for safeguarding students, employees, visitors,
material and the property of school district.
This book addresses a wide range of security programs and measures
which have been proven to be effective. Essential topics discussed
in this manual are:
Bomb threats and checklists
Drug and alcohol testing
Random inspection
Metal detector and search guidelines
Emergency and response plans
Security assessment and survey tools
Loss prevention and physical security
Intrusion detection systems
Employee and security education and training
Minimum training standards
Operating procedures
Crime prevention, security awareness and support of security
programs are more effective and less costly than dealing with
criminal incidents and public relations challenges after the fact.
Safe Schools: A Security and Loss Prevention Plan allows school
personnel to become proactive instead of reactive and to gain
control of the school environment.
Provides a model security and loss prevention plan with sample
security surveys, reports, and programs.
Written by an author with more than 28 years training, leadership,
working experience, and knowledge in the field of law enforcement
and security management.
Serves as an excellent reference source for anyone involved in
school security.
Corporate Crime Investigations is a reference tool for internal
auditors, in-house counsel and corporate security professionals who
handle crimes, torts, and breaches of contract.
The crimes involved may include employee fraud, theft,
embezzlement,
forgery, commercial bribery and property destruction. Breaches of
ethical codes, fiduciary duties, and company policies incidental to
these acts are also included. Corporate Crime Investigations also
includes important information on privacy rights of the suspected
individuals.
Provides comprehensive information for internal auditors, in-house
counselors and corporate security professionals.
Contains valuable information on techniques like forensic
accounting, polygraph and arrest.
Presents important discussions on rights to privacy.
'Protecting Business Information: A Manager's guide' is an
introduction to the information resource, its sensitivity, value
and susceptibility to risk. This book provides an outline for a
business information security program and provides clear answers to
the why and how of information protection.
Protecting Business Information' provides detailed processes for
analysis, leading to a complete and adequate information
classification. It includes a thorough description of the methods
for information classification.
A valuable guide based on the author's fifteen year's experience in
building and implementing information security programs for large,
worldwide businesses.
Provides a basis for the reasoning behind information protection
processes.
Suggests practical means for aligning an information security
investment with business needs.
Guard Force Management looks at the contract guard force as a
business and demonstrates how current management techniques can be
used to improve efficiency and increase profitability. The author
takes proven management principles and applies them to the
competitive security industry.
This updated edition includes an entirely new chapter on
preparation and response to crisis in order to maintain business
continuity. The book focuses on administrative and financial
functions that are frequently neglected in guard companies, and
discusses planning and conducting guard operations in detail.
* Addresses the administrative, financial and client service needs
of the security guard function;
* Details the analytical steps needed to establish, equip, train
and employ a guard force;
* Emphasizes practical, proven management techniques
Undercover Investigations 3ed will serve as a training text for
anyone entering the undercover field. Its previous editions have
been used to train police officers, and intelligence agents in
addition to private security personnel. Undercover Investigations
has a dual purpose; it can be used as a blueprint for any security
manager or other handler of undercover agents. Undercover
Investigations, which has been recognized by judges as the
definitive work in this field, is now completely updated and
expanded to include more information on drugs in the workplace, and
entrapment. Its principles serve as the standard against which
undercover operations are measured.
A basic text on general security techniques, this book emphasizes
the philosophical, moral and ethical responsibilities of the
security officer, along with the elements of various specialties
within the field.
This book is designed for not only the beginning student, but for
ambitious security personnel seeking advancement and directors
training staff in the field.
It is important for security personnel, in this age of the
computer, to understand the background and basic elements of
security procedures. It is also important to understand this
philosophy in order to develop programs which may be used in
defending against charges of "inadequate security" in civil
litigation.
This book is an update of a beginning text which has been used
successfully in colleges and universities for twenty years. It
updates the techniques of various specialties along with current
technological approaches towards solving those security-related
issues. It has left unchanged the philosophical, moral, and ethical
approach to the security procedures, the abandonment of which has
led to literally thousands of lawsuits against security departments
and private guard companies, alleging "inadequate security"
procedures, hiring and training.
New technologies, in almost every subcategory of the security
industry, have changed the profession forever. Computers have
assumed much of the performance formerly conducted by both trained
and untrained security officers. Skills have changed to a degree
where knowledge is determined by one's level of computer awareness.
This book presents many of those new techniques and
developments.
Updated and current information
Retains philosophical, moral and ethical approach to security
procedures
Three contributed articles from specialists in their individual
fields
Private Security Law: Case Studies is uniquely designed for the
special needs of private security practitioners, students, and
instructors. Part One of the book encompasses negligence,
intentional torts, agency contracts, alarms, and damages. Part Two
covers authority of the private citizen, deprivation of rights, and
entrapment.
The factual cases presented in this book touch on the everyday
duties of persons associated with the private security industry.
Private Security Law: Case Studies provides a basic orientation to
problems capable of inciting litigation. The information presented
through case laws comes from cases chosen for their factual,
realistic, and practical connection to the private security
industry. This focused approach addresses specific problem areas of
the industry and provides information necessary to a security
manager to avert future loss.
Specially designed for private security practitioners, instructors,
and students.
Examines cases that are practical, realistic and relevant to
specific areas of private security.
Provides the information security managers need to avoid future
problems.
Loss Prevention and Security Procedures assists CEOs, security
management and loss prevention specialists in dealing with loss.
Losses in an organization may originate from a variety of threats,
including natural disasters such as earthquakes, tornadoes, and
flooding. However, many of the threats to our assets are posed by
individuals and may include drug activity, violence, theft and
fraud. Loss Prevention and Security Procedures deals specifically
with these and many more problems facing today' s security
conscious professional.
Written from the management perspective, Loss Prevention and
Security Procedures offers discernment and wisdom directed toward
the philosophy of anticipatory security, before losses occur and
resolving them through the most cost effective initiatives
possible.
Serves security professionals in a hands-on, practical manner
Appeals to a mixed audience - it addresses the subject for the
benefit of executive management as well as security
practitioners
Includes practical forms
Securing Home and Business provides the most practical information
available on safekeeping buildings such as homes, malls, office
parks, retail manufacturers and restaurants.
Taken from interviews with professional burglars, this book
describes where intrusions most often occur, how burglars are most
likely to enter the premises and the burglar's most common actions
taken once on the premises. Additionally, Securing Home and
Business contains essential marketing and management strategies
needed by security professionals, including how to market security
services, how to approach potential customers, the nature of
customer relations, device selection and placement.
Essential marketing and management strategies needed by security
professionals.
How to market security services.
How to approach potential customers.
Outsourcing Security provides a complete management guide for
contracting support services, particularly those associated with
protective organizations. It helps security and facility managers
through the quagmire of conceptual planning, proposal evaluation
and contract negotiation, and helps them to realize cost savings,
improve productivity, and elevate the quality level of the
contracted service.
Outsourcing Security provides a complete management guide for
contracting support services, particularly those associated with
protective organizations. It helps security and facility managers
through the quagmire of conceptual planning, proposal evaluation
and contract negotiation, and helps them to realize cost savings,
improve productivity, and elevate the quality level of the
contracted service. This book:
-Defines successful methods to improve business efficiency and
effectiveness through outsourcing,
-Helps managers achieve cost savings and enhance quality contract
performance
-Emphasizes team concepts when evaluating outsourcing
services
Defines successful methods to improve business efficiency and
effectiveness through outsourcing,
Helps managers achieve cost savings and enhance quality contract
performance
Emphasizes team concepts when evaluating outsourcing services
Intrusion Detection Systems has long been considered the most
important reference for intrusion detection system equipment and
implementation. In this revised and expanded edition, it goes even
further in providing the reader with a better understanding of how
to design an integrated system. The book describes the basic
operating principles and applications of the equipment in an easy
to understand manner.
This book was written for those security directors, consultants,
and companies that select the equipment or make critical decisions
about security systems design. Mr. Barnard provides sufficient
detail to satisfy the needs of those interested in the technical
principles, yet has included enough description on the operation
and application of these systems to make Intrusion Detection
Systems, Second Edition a useful reference for any security
professional.
This edition includes the effects of massive computerization on the
collection, storage, and reporting of personal data. For
investigations and back-ground checks of any type, this outstanding
volume tells how to hire reliable employees, sell to solvent
customers, and purchase from reliable vendors. Carroll also
examines troubling issues of ethics, accuracy, and privacy in our
age of electronic information transfer.
Discusses the way the nation collects, stores, and uses personal
information.
Addresses the ethical questions about how personal data should be
used.
Highlights the changes in information collection brought about by
computers.
This book describes the risk management methodology as a specific
process, a theory, or a procedure for determining your assets,
vulnerabilities, and threats and how security professionals can
protect them.
Risk Management for Security Professionals is a practical handbook
for security managers who need to learn risk management skills. It
goes beyond the physical security realm to encompass all risks to
which a company may be exposed. Risk Management as presented in
this book has several goals:
Provides standardized common approach to risk management through a
framework that effectively links security strategies and related
costs to realistic threat assessment and risk levels
Offers flexible yet structured framework that can be applied to the
risk assessment and decision support process in support of your
business or organization
Increases awareness in terms of potential loss impacts, threats and
vulnerabilities to organizational assets
Ensures that various security recommendations are based on an
integrated assessment of loss impacts, threats, vulnerabilities and
resource constraints
Risk management is essentially a process methodology that will
provide a cost-benefit payback factor to senior management.
Provides a stand-alone guide to the risk management process
Helps security professionals learn the risk countermeasures and
their pros and cons
Addresses a systematic approach to logical decision-making about
the allocation of scarce security resources
Physical Security and The Inspection Process illustrates the basic
concepts and procedures for development, implementation, and
management of a physical security inspection program. It provides
personnel with a model inspection procedure that can be
specifically tailored to meet any company's reasonable minimum
standards. With detailed checklists broken down by security subject
area, the reader will be able to develop site-specific checklists
to meet organizational needs. Physical Security and the Inspection
Process is an important reference for security managers, physical
security inspection team chiefs, team members, and others
responsible for physical security.
C. A. Roper is a security specialist and lead instructor with the
Department of Defense Security Institute, where he provides general
and specialized security training throughout the US, in Germany,
and in Panama. Previously, Mr. Roper worked for the assistant chief
of staff for intelligence, Department of the Army, and the Defense
Communications Agency. He is a counter-intelligence technician with
the US Army Reserve, was activated for Desert Shield/Desert Storm,
and has provided training and other support to various operations
with the Army, Navy, and foreign national forces.
The most comprehensive physical security inspection checklist
available.
A model inspection procedure that can be specifically tailored to
any organization.
Provides practical guidelines for ensuring compliance with
standards of effectiveness.
Rising crime rates of all types indicate the need for crime
prevention not only in government but also in business and
neighborhoods. Security and Crime Prevention, Second Edition,
contains the practical information necessary for creating safe and
secure communities, businesses, and individuals.
This highly readable and useful reference contains the most
up-to-date material and has been adopted by many colleges and
universities as the standard textbook in the field. In addition it
provides the professional with the most effective information for
personal, business and community-based loss prevention and private
security.
Robert L. O'Block taught at the college level for 17 years and was
a full professor and department head of an Administration of
Justice baccalaureate program before leaving academia to become
Executive Director of the American Board of Forensic Examiners. Dr.
O'Block earned his Ph.D. form Kansas State University where his
work centered on criminology, sociology, psychology,
administration, and education. His articles have appeared in the
journals The Police Chief and The Journal of Police Science and
Administration. Dr. O'Block is a winner of Oregon State
University's Distinguished Educational Research Award, and his
personal biography was published in American Men and Women Of
Science.
Joseph F. Donnermeyer is Director of the National Rural Crime
Prevention Center and an associate professor in the Department of
Agricultural Economics and Rural Sociology at the Ohio State
University. He previously served as a crime prevention specialist
for the Indiana Cooperative Extension Service at Purdue University.
Mr. Donnermeyer is a member of the Ohio Crime Prevention
Association, the Rural Sociological Society, and the American
Sociological Sociological Society.
Stephen E. Doeren is an assistant professor and the graduate
program coordinator in the Department of Administration of Justice
at the Wichita State University. He is a member of the graduate
faculty and formerly served as the undergraduate coordinator in the
Department from 1977 to 1982. In addition to his academic
background in criminal justice, Dr. Doeren has supervisory-level
criminal justice agency experience. He has served as a correctional
treatment administrator and penologist with the Louisiana
Department of Corrections. Dr.Doeren is active in such professional
organizations as the Academy of Criminal Justice Sciences, the
Midwestern Criminal Justice Association, and the National
Corrections Recreation Association.
|
|