Skip to content

Introduction to Security

Spend $50 to get a free DVD!

ISBN-10: 0750698608

ISBN-13: 9780750698603

Edition: 6th 1998 (Revised)

Authors: Robert J. Fischer, Gion Green

List price: $59.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Introduction to Security presents readers with the latest in contemporary security issues from security equipment and procedures to management and loss prevention theory.
Customers also bought

Book details

List price: $59.95
Edition: 6th
Copyright year: 1998
Publisher: Elsevier Science & Technology Books
Publication date: 2/5/1998
Binding: Hardcover
Pages: 560
Size: 6.50" wide x 9.50" long x 1.25" tall
Weight: 2.134
Language: English

Prefacep. xiii
Acknowledgmentsp. xv
Introduction and Security's Functionp. 1
Homeland Security--Changing the Emphasis on Security in the United Statesp. 3
Introductionp. 3
Private Enterprise Responsep. 4
Federal Response in the United Statesp. 11
State/Local Responsep. 15
Public/Private Joint Initiativesp. 17
Concernsp. 17
Origins and Development of Securityp. 21
Introductionp. 21
Security in Englandp. 21
Security in the United Statesp. 25
Defining Security's Rolep. 37
Introductionp. 37
What Is Private Security?p. 37
Security Servicesp. 39
Contract versus Proprietary Servicesp. 40
Hybrid Systemsp. 45
Private Security and Public Law Enforcementp. 48
Relationships after September 11, 2001p. 51
The Proprietary Security Organizationp. 55
Introductionp. 55
Determining the Needp. 55
Security's Place in the Organizationp. 56
Organizing the Security Functionp. 63
Career Opportunities in Loss Preventionp. 75
Introductionp. 75
Factors Increasing Security Opportunitiesp. 75
The Security/Loss-Prevention Occupationp. 76
Security Education, Training, Certification, and Regulationp. 89
Introductionp. 89
Adequacy of Private Security Trainingp. 90
Proposed Federal Regulationp. 90
The Role of Higher Educationp. 91
Trainingp. 93
Certification and Regulationp. 94
Magazines and Periodicalsp. 97
Basics of Defensep. 101
Security and the Lawp. 103
Introductionp. 103
Security, Public Police, and the U.S. Constitutionp. 104
Sources of Lawp. 104
Classes of Crimesp. 106
Private Security Powersp. 108
Civil Law: The Controller for Private Securityp. 114
Security and Liabilityp. 118
Duty to Protect from Third-Party Crimep. 119
Recent Trends in Liabilityp. 123
Recent Trends in Privacyp. 124
New Lawsp. 124
The Courtsp. 124
Development of Case Lawp. 125
Risk Analysis and the Security Surveyp. 129
Introductionp. 129
Risk Managementp. 130
The Security Surveyp. 131
Alternatives for Optimizing Risk Managementp. 141
The Outer Defenses: Building and Perimeter Protectionp. 147
Introductionp. 147
Barriers, Fences, and Wallsp. 148
Gates and Other Barrier Breachesp. 152
Barrier Protectionp. 153
Inside the Perimeterp. 156
Lightingp. 157
Planning Securityp. 164
Interior and Exterior Security Concernsp. 167
Introductionp. 167
Buildings on or as the Perimeterp. 167
Windows and Doorsp. 167
Locks and Keysp. 170
Roofs and Common Wallsp. 184
Surveillance Devicesp. 184
Old Constructionp. 188
New Constructionp. 189
Security at the Building Design Stagep. 189
Security Principles in Designp. 190
The Inner Defenses: Intrusion and Access Controlp. 193
Introductionp. 193
Doors to Sensitive Areasp. 194
Office Area Doorsp. 194
Traffic Patternsp. 194
Traffic Controlp. 195
Employee Identificationp. 196
Package Controlp. 198
Files, Safes, and Vaultsp. 198
Inspectionsp. 203
Alarmsp. 203
Fire Protection, Safety, and Emergency Planningp. 215
Introductionp. 215
Fire Prevention and Protectionp. 216
Safety and Loss Controlp. 228
Emergency Planningp. 236
Insurancep. 241
Introductionp. 241
The Value of Insurance in a Total Loss-Prevention Programp. 241
Types of Insurancep. 242
Insuring against Crimep. 247
Insuring Propertyp. 248
Internal Theft Controlsp. 253
Introductionp. 253
What Is Honesty?p. 253
The Dishonest Employeep. 254
Management Responsibility in Loss Preventionp. 257
Program for Internal Securityp. 259
Procedural Controlsp. 261
When Controls Failp. 269
Personnel Policies for Internal Securityp. 273
Introductionp. 273
Human Resources Screeningp. 273
Employment History and Reference Checkingp. 274
Backgroundingp. 281
Integrity and Lie Detection Testsp. 282
Americans with Disabilities Actp. 285
Drug Screeningp. 288
Other Screening Optionsp. 288
Hiring Ex-convicts and Paroleesp. 289
Moralep. 289
Specific Threats and Solutionsp. 295
Transportation/Cargo Securityp. 297
Introductionp. 297
The Role of Private Securityp. 298
Accountability Proceduresp. 298
Theft and Pilferagep. 300
Planning for Securityp. 304
Cargo in Transitp. 307
Suggested Sealing Systems and Proceduresp. 309
Special Issues in Airline Securityp. 314
Other Transportation Industry Responses to Terrorismp. 316
Workplace Violence: Prevention and Interventionp. 319
Introductionp. 319
Threatp. 320
Harassmentp. 320
Attackp. 320
Sabotagep. 320
The Phenomenon of Workplace Violencep. 320
The Work Environment and Violencep. 322
Profiling Violent Behaviorp. 323
Basic Levels of Violencep. 325
Preventing Workplace Violencep. 326
The Violence Intervention and Contingency Teamp. 327
Perpetrators' Rightsp. 328
Intervention Strategyp. 329
Drugs in the Workplacep. 333
Introductionp. 333
Impact of Drug Usep. 334
Drug Testingp. 336
Spotting Drug Usep. 338
The Components of a Comprehensive Substance Abuse Programp. 339
Retail Securityp. 345
Introductionp. 345
Shopliftingp. 346
Checks and Credit/Debit Cardsp. 356
Internal Theftp. 362
Terrorism and Other Tools of Destructionp. 369
Introductionp. 369
Current Issuesp. 371
Historical Backgroundp. 372
Implications of a Changing Worldp. 375
In Search of a Definition for International Terrorismp. 376
Terrorism as a Tactic, Instrument, or Methodp. 378
Characterizing Modern Terrorismp. 380
Specific Threats and Responsesp. 389
Other Specific Response Issues in the United Statesp. 392
The Future/Summaryp. 395
Computer and Information Securityp. 399
Introductionp. 399
Types of Computer Systemsp. 402
Networksp. 404
The Database Problemsp. 406
The Need for Computer Securityp. 406
Computer Systems Protectionp. 411
Content Monitoring and Filteringp. 418
Dealing with Identity Theftp. 420
Other Data Resources Vulnerabilitiesp. 422
Specific Security Threatsp. 427
Introductionp. 427
Economic/White-Collar Crimep. 427
Burglary and Robberyp. 429
Labor Disputesp. 436
Espionagep. 438
Piracyp. 439
Security: Its Problems, Its Futurep. 443
Introductionp. 443
The Aftermath of September 11, 2001p. 443
Private Security Resourcesp. 444
Interaction and Cooperationp. 444
Limitations of Securityp. 445
Trendsp. 446
The Futurep. 447
Security Journals, Magazines, and Newslettersp. 453
World Wide Web Sitesp. 455
Security Surveysp. 457
Indexp. 465
Table of Contents provided by Rittenhouse. All Rights Reserved.