|
Books > Academic & Education > Professional & Technical > Security
Written by two INFOSEC experts, this book provides a systematic and
practical approach for establishing, managing and operating a
comprehensive Information Assurance program. It is designed to
provide ISSO managers, security managers, and INFOSEC professionals
with an understanding of the essential issues required to develop
and apply a targeted information security posture to both public
and private corporations and government run agencies.
There is a growing concern among all corporations and within the
security industry to come up with new approaches to measure an
organization's information security risks and posture. Information
Assurance explains and defines the theories and processes that will
help a company protect its proprietary information including:
* The need to assess the current level of risk.
* The need to determine what can impact the risk.
* The need to determine how risk can be reduced.
The authors lay out a detailed strategy for defining information
security, establishing IA goals, providing training for security
awareness, and conducting airtight incident response to system
compromise. Such topics as defense in depth, configuration
management, IA legal issues, and the importance of establishing an
IT baseline are covered in-depth from an organizational and
managerial decision-making perspective.
* Experience-based theory provided in a logical and comprehensive
manner.
* Management focused coverage includes establishing an IT security
posture, implementing organizational awareness and training, and
understanding the dynamics of new technologies.
* Numerous real-world examples provide a baseline for assessment
and comparison.
Women in Public and Private Law Enforcement is hands-down the most
comprehensive examination of women in law enforcement to date. Most
importantly, it fills the current void that exists for texts on
this important and growing area of law enforcement. Both public and
private sector law enforcement are covered including policing and
private security. For policing this includes not only municipal
policing, but also state and federal law enforcement. For the
security industry, coverage includes not only private security
guards but also various other occupations that may be included
under private security such as protection specialists.
Women in Public and Private Law Enforcement is intended for
academicians and students of sociology, criminal justice,
psychology, business, management and loss prevention as a resource
on women in non-traditional occupations, specifically law
enforcement. It is also intended for professionals in the field
today, to apprize them of contemporary issues for women in law
enforcement and serve as a reference to guide policy and procedure
development.
Authors Pamela Collins and Kathryn Scarborough not only define
distinctions in law enforcement and private security but also
provide an understanding of the importance of specificity, with
regard to this occupational analysis. The authors' diverse
background allows them to offer uniquely complementary approach,
emphasizing both the importance of understanding the professions
from a practical standpoint, while at the same time giving credence
to academic analysis.
The book's primary focus is on gender with limited attention
paid to race and ethnicity. Some comparisons are made when
appropriate, but the ultimate goal is to provide the reader the
most comprehensive analysis with respect to gender. Finally, the
authors provide women in law enforcement today with detailed
analysis and description of how far they have come, the struggles
they have faced, the challenges they have overcome, and the
achievements they have made.
* The only complete review of women in law enforcement and
security
* An ideal text for students in criminal justice and law
enforcement courses
* Reviews the current role of women in local, state, and federal
agencies
Understanding Crime Prevention, Second Edition is a revamping of a
popular classic written by NCPI, the primary training school for
crime prevention officers in the country. It is a basic
introduction to the concepts of crime prevention and security
techniques and equipment which aid the crime prevention effort. The
fundamental material has been updated with current and contemporary
examples.
*Includes glossary of crime prevention terms
*Includes an instructor's manual
*Practical, basic and comprehensive introduction to
security and loss procedures
Applied Crime Analysis covers all aspects of crime analysis for
private sector businesses including examining the frequency of
crimes, the nature of these crimes, the day and time of the
incident, the risk to a property and its inhabitants, and the
objective analysis of preventative security measures in place.
Applied Crime Analysis compares data sources used in conducting
crime analysis and explores ways to organize statistical data,
crime analysis methodologies, crime prevention theories, and
methods of determining patterns and trends. By explaining the
significance of crime statistics relative to crime prevention
theory and techniques, the book provides readers with a clear,
strategic plan to implement crime prevention programs and security
resources.
Discusses crime analysis techniques and theories in detail.
Covers all aspects of crime analysis for private sector
businesses.
Uses fictional case studies found throughout chapters that help
readers apply statistical data to practical, everyday use.
This book begins by laying out a history of espionage that clearly
shows that when a new technology or technique becomes available to
the information gatherers in public and private sectors, they can
quickly be adopted for Netspionage use. It then moves on to
describe how the Internet and associated technologies have already
revolutionized the collection and analysis of competitive
information. The convergence of dependency on networked and
exploitation tools (often propagated by "hackers," "cyberpunks,"
and even intelligence agencies) has already resulted in several
incidents that foreshadow the perilous future. Close study of these
incidents demonstrates how difficult yet how important it is to
confront the challenges of "netspionage" and its less intrusive
cousins. The authors present a set of the known incidents and then
outline protective measures that will reduce the potential and
consequences of netspionage.
Unlike most security books, this one is written for managers and
executives in non-protection roles of the organization, since they
are the ones who must take a leadership role in safeguarding the
information assets of the networked enterprise.
*Practical guide written from front-line experience
*Explains the evolution of information collection and why it has
never been easier
*Highlights the tools of the trade and how they can be put to best
use
Internal loss is one of the most costly forms of loss. Embezzlement
is one of the least detected and prosecuted forms of internal
theft. Preventing Corporate Embezzlement is a professional
reference that offers solutions. Managers, auditors and others
charged with protecting assets must achieve a heightened awareness
of embezzlement. They need to recognize and understand the
opportunities, methods, and varieties of embezzlement, as well as
establish internal controls that will prevent and detect
embezzlement.
Practical tool for detecting and combatting embezzlement:
checklists, forms and evaluations
Offers how-to advice on avoiding lawsuits by practicing preventive
law
Lists further resources, publications and directories on
embezzlement, internal controls and security, risk management,
insurance, auditors, and security services and equipment
Research should be enjoyable - whether it is a college student
completing a project for a degree or a professor meeting
requirements or expectations associated with his or her position.
Learning the basics for conducting research is the first step. This
text is a reader-friendly primer which has as its strength the
facility to positively and gently ease the reader into the task of
conducting research.
Each chapter begins with a vignette, describing a hypothetical
situation in which students might find themselves. By chapter's
end, students should be equipped with the knowledge on how to
address the confusion or problem presented in the appropriate
scenario. Another pedagogical tool is the Methodological Link which
refers to excerpts from actual criminal justice and criminological
research, the full text which is available in a companion text
Readings for Research Methods in Criminology and Criminal Justice.
Each chapter also ends with Methodological Queries, questions and
exercises requiring students to apply what has been learned.
Uses practical examples from criminal justice scenarios to bring
complex and involved issues to life
Hypothetical scenarios at the beginning of each chapter
Shows the relevance of research methodology to the practical
problems of everyday criminal justice operations in a
reader-friendly manner.
This is a no-nonsense, practical book for helping organizations rid
their workplaces of drug abuse and its serious and costly
consequences. The book draws upon the collective experiences of
hundreds of organizations that have said "no more, not here" and
have grown stronger as a result. The path to a drug-free working
environment is straight but narrow. The Drug-Free Workplace:
How to Get There and Stay There delineates the path, always with a
view toward avoiding missteps that can lead to trouble.
Bringing a workplace back to safety and profitability is a
collaborative and multi-disciplinary effort. Participation
necessarily involves professionals from security, safety, human
resources, and health. Central to the effort is an enlightened
management. Every specialist and manager committed to developing
and maintaining a drug-free workplace will find in the pages of
this book a wealth of sensible, meaningful information.
A drug-free workplace program cuts costs, increases productivity,
reduces loss and wastage, avoids accidents, and literally saves
careers, families, and lives. Much is at stake, making the
drug-free program deserving of thoughtful deliberation,
considerable planning, and careful implementation. Preliminary to
the process is understanding the key tasks. All of the tasks are
spelled out in this book.
Offers organizations a clear course to enact drug policiesTeaches
the ramifications of testing and investigating drug use and
abuseAddresses liability issues to keep buisness owners, security
managers, and their companies out of court
Loss Prevention and Security Procedures assists CEOs, security
management and loss prevention specialists in dealing with loss.
Losses in an organization may originate from a variety of threats,
including natural disasters such as earthquakes, tornadoes, and
flooding. However, many of the threats to our assets are posed by
individuals and may include drug activity, violence, theft and
fraud. Loss Prevention and Security Procedures deals specifically
with these and many more problems facing today' s security
conscious professional.
Written from the management perspective, Loss Prevention and
Security Procedures offers discernment and wisdom directed toward
the philosophy of anticipatory security, before losses occur and
resolving them through the most cost effective initiatives
possible.
Serves security professionals in a hands-on, practical manner
Appeals to a mixed audience - it addresses the subject for the
benefit of executive management as well as security
practitioners
Includes practical forms
As security professionals, lawyers, personnel directors, and
corporate executives are confronted by the demands of loss
prevention, asset protection, and ever-expanding employee rights,
there is a growing demand for more up-to-date information about
workplace investigations. This book defines and explores the
process of undercover investigations as well as delving into the
legal aspects of undercover and the role of an effective litigation
avoidance strategy. Undercover Investigations makes a rational and
authoritative plea for legitimacy of undercover in the workplace.
Undercover Investigations is sufficiently detailed as to serve the
reader who is contemplating an undercover investigation for the
first time, or one who uses them regularly. It contains several
modern case studies, statistics checklists and references making it
an authoritative work on the subject of undercover and workplace
investigations.
Authoritative work that will serve as a useful handbook
Provides modern case studies, statistics and checklists
Explores the legal aspects of undercover and the role of an
effective litigation avoidance strategy
Security Investigations is a comprehensive book that covers the
full spectrum of investigative issues. It contains practical
self-evaluation exercises that can be applied in both a formal or
informal training environment. Corporate security supervisors will
find it helpful in establishing policies and procedures for
conducting investigations. It is a guide also for those responsible
for the security function without prior experience. ie. Director of
Human Resources. Forms in the book will assist an organization in
standardizing the means to conduct investigations as well as
reporting the outcome in a way that ensures that nothing was missed
during the investigation. The real worth of an investigator is
their ability to adapt to ever changing circumstances. This text
gives the investigator a quick reference manual that can be used
to: develop the investigation plan, take effective and accurate
field notes, conduct an interview, perform surveillance and finally
write the report, all within the legal guidelines outlined in the
book. As an additional bonus to the reader, the book will include
information on how to select and use the proper surveillance
equipment.
Gives the reader the opportunity to practice their skills in
answering questions based on real-world type investigations.
Offers self-evaluation exercises
Covers the full spectrum of investigative issues
Practical Security Training is designed to help security
departments develop effective security forces from the personnel
screening and selection process to ensuring that proper,
cost-efficient training is conducted. Using the building block and
progressive method approach allows security staff to become
increasingly more effective and more confident. Flexible and
practicle, these tools allow security practitioners to adapt them
as needed in different environments.
Considering hypothetical situations and case studies, performing
drills and continually evaluating performance, the security staff
can be better prepared to deal with both routine and emergency
situations.
Advocates performance related training similar to that in a
military environment
Describes performance-oriented drills
Considers and analyzes hypothetical situations
With half of all new businesses failing in the first two years,
every aspect of good business planning must be considered, but loss
prevention is very often overlooked. Most small business owners
grapple with the day to day challenges of sales and marketing,
never realizing that the shadow of shrinkage is expanding daily,
waiting to reveal itself in the annual inventory results. Ravaged
by theft and paperwork losses, the already tight profit margin can
shrink into oblivion. Loss Prevention and the Small Business opens
the eyes of the reader to the reality of shrinkage in all its
guises including shoplifting, fraud, and embezzlement. Armed with
this awareness, the security specialist or owner/manager can
utilize the many strategies to both inhibit losses and aggressively
pursue those persons and processes that cause losses.
This is a comprehensive guide to developing and maintaining a loss
prevention strategy. It assists the reader in creating a dynamic
proactive plan for protecting their hard-earned profits from the
menace of internal and external loss.
Includes information beyond the typical retail theft by employees
and customers
Cover business losses from administrative errors to white collar
crime
Practical with numerous worksheets, forms, and templates for asset
protection exercises
Practical yet authoritative, Private Security and the Investigative
Process, Second Edition, is an important reference tool for private
investigators and security professionals. Both students and
seasoned security practitioners alike will benefit from the
resources, ideas, and suggestions for tactics and security strategy
contained within this book. Charles P. Nemeth expertly blends
practice with theory to show students how to be professional when
confronted with the rigors of the real world, in both the public
and private sectors. Private Security and the Investigative
Process, is ideally suited for private security organizations,
criminal justice libraries, corporate security personnel, and law
enforcement personnel.
The concepts are effectively presented with numerous forms,
checklists and valuable guides that will help illustrate the
investigative process both in the public and private sector.
Charles Nemeth, JD, Ph.D., LL.M. is currently Director of Graduate
Criminal Justice/Legal Studies, Director of Institute of Law and
Public Policy, and Director of Program Development at
California University of Pennsylvania in Pittsburgh, PA. He is a
widely published author with over 30 titles to his credit and is a
regular consultant to security companies. He holds a JD from the
University of Baltimore and a post doctoral degree in Law,
Psychiatry and Criminology, the LL.M., from the National Law Center
of George Washington University. Dr. Nemeth is a recognized expert
in private sector justice, ethical issues in law and legal analysis
and appellate practice, and also holds a Ph.D. in Philosophy from
Duquesne University. For more than two decades, he has practiced
law in both the civil and criminal arena, specializing in personal
injury and criminal litigation, and has been active in the North
Carolina, New York and Pennsylvania Bars. He regularly consults
with collegiate institutions and private sector justice entities.
A comprehensive, authoritative resource for the industry, its
practitioners, and those seeking a career in the private-security
industry
Provides insight into the fundamental competency skills necessary
to function as an investigator
Contains numerous forms, checklists, for useful and practical
reference
I-Way Robbery is for security, investigative, law enforcement, and
other criminal justice professionals, offering a unique look at the
Internet as the new crime environment for the 21st century. The
book provides an overview of the Internet, its impact on nations,
societies, criminals, security officers, and law enforcement
professionals, and includes recommended basic, protective measures.
I-Way Robbery is written in non-technical terms. It is also an
excellent reference for business and government agency managers who
must understand their responsibilities as they relate to asset
protection - especially those who have on and off ramps connected
to the I-Way.
Boni and Kovacich start with the basics and teach users about the
internet before teaching them about the security risks. This
addresses the subject from the non-information systems perspective
and educates the average user about the overall risks and
appropriate protective measures they should enforce and follow.
This book is a must-have for anyone with an interest in the
pitfalls and precautions of doing business on the internet.
I-Way Robbery: Crime on the Internet, uniquely approaches the
much talked about topic of Internet Crime and security. It is
written for anyone who wants a basic understanding of the Internet
crime environment now and into the 21st Century. It covers related
Internet business, government, global, laws, politics and privacy
issues; techniques being used to commit crimes; what can be done
about it; and what challenges the future may hold including topics
such as information warfare.
Drawing on their decades of experience in high-technology and
Internet crime investigations William Boni and Dr. Gerald L.
Kovacich have written not only an excellent reference book for
business and government agency managers, small business owners, and
teachers, but for anyone who drives along the I-Way.
Addresses the subject of internet security from the non-information
systems perspective
Detailed incident reports to fully illustrate the specific issues
readers must understand to fully appreciate the risks of I-Way
activity
Covers a broad range of issues
Premises Security: A Guide for Attorneys and Security Professionals
guides the security professional through the ins and outs of
premises security liability. Premises security litigation claims
represent a serious financial threat to owners and occupiers of
property. This book provides an overview of risk assessment
techniques, identification of reasonable security measures, legal
issues and litigation strategies.
Premises security litigation is increasing at a dramatic rate and
has a significant negative impact on corporate profits. Realizing
the increasing costs of litigation, business owners and other
interested parties are initiating proactive measures to provide
adequate security. Attorneys can use this book as a security
resource for providing legal advice to their clients and during the
litigation process. Security professionals will be better able to
propose and implement reasonable and appropriate security measures.
The format of providing information in response to specific
questions carries the reader through a logical and sequential
method for understanding the legal concepts of premises liability,
the identification of reasonable and appropriate protection
measures, and how to acquire premises security information.
This is a practical, concise and informative guide. This book can
be used in a proactive prevention mode as well as a reactive
response to litigation claims. It explains what security
professionals should be thinking about and planning for when it
comes to protecting people on their premises. It also provides a
common base of knowledge for attorneys and security professionals
that does not exist in any other publication.
Designed to meet the needs of both attorneys and security
professionals
Covers both liability and security issues
Appendices provide detailed premises security information to
facilitate a proactive approach to providing reasonable and
appropriate security measures and reacting to litigation
A basic text on general security techniques, this book emphasizes
the philosophical, moral and ethical responsibilities of the
security officer, along with the elements of various specialties
within the field.
This book is designed for not only the beginning student, but for
ambitious security personnel seeking advancement and directors
training staff in the field.
It is important for security personnel, in this age of the
computer, to understand the background and basic elements of
security procedures. It is also important to understand this
philosophy in order to develop programs which may be used in
defending against charges of "inadequate security" in civil
litigation.
This book is an update of a beginning text which has been used
successfully in colleges and universities for twenty years. It
updates the techniques of various specialties along with current
technological approaches towards solving those security-related
issues. It has left unchanged the philosophical, moral, and ethical
approach to the security procedures, the abandonment of which has
led to literally thousands of lawsuits against security departments
and private guard companies, alleging "inadequate security"
procedures, hiring and training.
New technologies, in almost every subcategory of the security
industry, have changed the profession forever. Computers have
assumed much of the performance formerly conducted by both trained
and untrained security officers. Skills have changed to a degree
where knowledge is determined by one's level of computer awareness.
This book presents many of those new techniques and
developments.
Updated and current information
Retains philosophical, moral and ethical approach to security
procedures
Three contributed articles from specialists in their individual
fields
This is a truly unique collection of 39 articles written by
authorities or based on authoritative research. It goes beyond
locks, lighting, and alarms to offer provocative viewpoints on a
variety of security topics.
Contributors to this book are knowledgeable and practical
individuals who are aware of the impact of their work on society.
They have extensive and specialized experience in their respective
sectors including corporate, retail, college, hospital, art
gallery, and within the community at large. They are knowledgeable
about technical and legal aspects of CCTV, electronic
counter-intelligence, computers, fire safety, violent employees,
terrorism and the future of policing. In addition, they are
concerned about the right to privacy, the influence of gambling on
employee theft, privatization of correctional services, the place
of women in security work, security audit anxiety, and crime
control/prevention.
The book looks beyond everyday applications and routines to an
understanding of the social significance of careers in security. It
will be of interest to practitioners in all sectors as well as
students at all levels.
Goes beyond the usual nuts and bolts security book
An important, horizon-broadening supplement to the basic
texts
Appeals to everybody in the security field from students to
practitioners
In the very competitive security alarm business, companies are
finding themselves more and more burdened with the responsibility
of preparing corporate mission statements, paradigm analyses, and
corporate reengineering plans. Surviving in the Security Alarm
Business will help explain their importance, how to perform them,
and what the expected result will be.
Teaches alarm professionals how to recreate their business "from
scratch" for greater selling success
Illustrates how to do business in the future in response to market
changes and trends
Suggests techniques for willing recurring revenue rather than
single-sale profit
Outsourcing Security provides a complete management guide for
contracting support services, particularly those associated with
protective organizations. It helps security and facility managers
through the quagmire of conceptual planning, proposal evaluation
and contract negotiation, and helps them to realize cost savings,
improve productivity, and elevate the quality level of the
contracted service.
Outsourcing Security provides a complete management guide for
contracting support services, particularly those associated with
protective organizations. It helps security and facility managers
through the quagmire of conceptual planning, proposal evaluation
and contract negotiation, and helps them to realize cost savings,
improve productivity, and elevate the quality level of the
contracted service. This book:
-Defines successful methods to improve business efficiency and
effectiveness through outsourcing,
-Helps managers achieve cost savings and enhance quality contract
performance
-Emphasizes team concepts when evaluating outsourcing
services
Defines successful methods to improve business efficiency and
effectiveness through outsourcing,
Helps managers achieve cost savings and enhance quality contract
performance
Emphasizes team concepts when evaluating outsourcing services
The idea of espionage has always carried a certain mystique, having
grown its roots in the political and national defense spheres.
Today, espionage must be taken seriously in the business arena as
well. Having company secrets stolen by competitors is costly and
can be lethal. Counterespionage for American Business is a how-to
manual for security professionals that teaches secret methods
counterespionage experts have been using for years to protect
business information
Secret techniques you will learn include:
. screening employee applicants; how to use standard screening
methods to defend against industrial espionage and violent
persons
. how to design security education programs by teaching protection
of critical business information
. how to avoid liability
Counterespionage for American Business also names the foreign
countries that are conducting espionage against American
business.
Learn how to protect your proprietary business information and
reduce liability riskGuidlines on how small businesses can save
thousands of dollars"
Criminology and Criminal Justice describes and discusses
criminology and criminal justice as social foci and as academic
disciplines. Its comparative and contrasting nature allows readers
to gain a better understanding of both topics as separate entities,
but also how they are more intertwined than most might recognize.
The book covers the most important aspects of these disciplines,
beginning with laying the groundwork of nature and content and
ending with a look into the future. At the book's conclusion, the
reader should better understand the similarities and differences of
the two, as well as recognize their singularly distinctive traits.
Discussion questions are included at the end of each chapter to
facilitate critical thinking.
M.L. Dantzker is an associate professor of Political Science at
Georgia Southern University teaching in the Justice Studies
Program. He received his Ph.D. in Administration from the
University of Texas-Arlington. Prior to entering academia
full-time, Dr. Dantzker was a police officer in Indiana and in
Texas. He has researched, consulted, and published in the areas of
police stress, police job satisfaction, educational issues,
criminal justice statistics, and police chief requirements.
Unique approach to understanding how the disciplines of criminology
and criminal justice are related
Discussion questions facilitate critical thinking
Violence in Intimate Relationships is an edited volume that
provides a thorough overview of abuse in a wide range of
situations, including children, elders, husbands, wives, homosexual
couples, and dates. Each chapter covers an historical accounting of
the problem, legal and operational definitions, prevalence and
incidence, empirical correlates of abuse, theoretical explanations
of abuse, profiles of abusers and victims, prevention and treatment
strategies, and future trends. The editors have skillfully
formatted the text so that students can easily compare and contrast
the varieties of intimate violence described in each chapter.
Contributions from 10 experts in the field
Astute editorial summaries for each chapter
Instructor's manual included
The late 1990s mark a turning point for correctional systems in the
United States. For some time, there has been an intensive effort by
corrections to gain the confidence of the public. With increased
urbanization, more timely electronic news media reports, and
renewed emphasis on human rights, corrections has more and more
become the target of a wide variety of attacks. To combat this
backlash, correctional agencies have devised a plan that has worked
very well for law enforcement, a plan best summed up by a single
word: professionalization. This movement has been led by an
articulate and tactful group of correctional officials who have
stressed a new ideology of the correctional officer occupation.
The Changing Career of the Correctional Officer is a comprehensive,
timely, and issue-oriented perspective on this ever-developing
field. It articulates the principles upon which correctional
practices have evolved with time. Students will find this book of
value to discussion and thought regarding the nature of the
corrections profession. Administrators, management personnel, and
line/staff supervisors seeking information about career development
options will find this text useful in focusing and placing their
careers in perspective and in providing guidance for professional
development.
Focus on 'a career in flux'
Substantial discussion for students
Valuable information for practitioners
The Best of Kinks & Hints is a compilation of over 100 articles
from SDM Magazine about trouble shooting alarm system problems.
This completely revised edition retains the excellent composition
of the original Kinks & Hints for the Alarm Installer, while
increasing coverage on important topics such as access control,
burglar alarms, and CCTV.
Here, in a straight forward, easy-to-read manner, are practical
pointers on:
- Diagnosing intermittent problems and power failures
- Eliminating false alarms
- Selecting and testing components
- Locating malfunctions
- Many other problems which have been know to stump seasoned
experts
Whether used as a reference or read from cover to cover, The Best
of Kinks & Hints will become the indispensable ally of every
alarm specialist who takes pride in doing professional quality work
with a minimum of wasted time and energy.
How to diagnose and solve alarm-related problems.
Over 100 proven tricks of the trade.
An indispensable tool for every alarm specialist.
|
You may like...
Intruder Alarms
Gerard Honey
Paperback
R1,102
R1,044
Discovery Miles 10 440
FINDsomeone.com
R.Scott Grasser
Paperback
R1,221
R1,147
Discovery Miles 11 470
|