Asset Protection and Security Management Handbook

The Asset Protection and Security Management Handbook is a must for all professionals involved in the protection of assets. For those new to the security profession, the text covers the fundamental aspects of security and security management providing a firm foundation for advanced development. For...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Tác giả chính: Walsh, James
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: CRC Press 2009
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1417
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
id oai:scholar.dlu.edu.vn:DLU123456789-1417
record_format dspace
institution Thư viện Trường Đại học Đà Lạt
collection Thư viện số
language English
description The Asset Protection and Security Management Handbook is a must for all professionals involved in the protection of assets. For those new to the security profession, the text covers the fundamental aspects of security and security management providing a firm foundation for advanced development. For the experienced security practitioner, it provides the tools necessary for developing effective solutions and responses to the growing number of challenges encountered by today's security professionals. Based on the ASIS asset protection course, the text provides information vital to security planning and operational requirements. It addresses the most comonly recognized issues in the field and explores the future of asset protection management. The authors examine the latest in crime detection, prevention, and interrogation techniques. The Asset Protection and Security Management Handbook will not only help you to explore effective security training and educational programs for your organization, but will also help you discover proven methods of selling your security program to top management.
format Book
author Walsh, James
spellingShingle Walsh, James
Asset Protection and Security Management Handbook
author_facet Walsh, James
author_sort Walsh, James
title Asset Protection and Security Management Handbook
title_short Asset Protection and Security Management Handbook
title_full Asset Protection and Security Management Handbook
title_fullStr Asset Protection and Security Management Handbook
title_full_unstemmed Asset Protection and Security Management Handbook
title_sort asset protection and security management handbook
publisher CRC Press
publishDate 2009
url http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1417
_version_ 1757654323630702592
spelling oai:scholar.dlu.edu.vn:DLU123456789-14172009-12-02T07:10:53Z Asset Protection and Security Management Handbook Walsh, James The Asset Protection and Security Management Handbook is a must for all professionals involved in the protection of assets. For those new to the security profession, the text covers the fundamental aspects of security and security management providing a firm foundation for advanced development. For the experienced security practitioner, it provides the tools necessary for developing effective solutions and responses to the growing number of challenges encountered by today's security professionals. Based on the ASIS asset protection course, the text provides information vital to security planning and operational requirements. It addresses the most comonly recognized issues in the field and explores the future of asset protection management. The authors examine the latest in crime detection, prevention, and interrogation techniques. The Asset Protection and Security Management Handbook will not only help you to explore effective security training and educational programs for your organization, but will also help you discover proven methods of selling your security program to top management. INTRODUCTION TO ASSETS PROTECTION The Management Function Definition of Assets Protection Basic Considerations The Systems Approach Countermeasures The System Test Appendix A: Self-Inspection and Protection of Assets Check Sheet SECURITY VULNERABILITY Introduction Defining the Problem Loss Event Profile Loss Event Probability or Frequency Loss Event Criticality Alternative Approaches to Criticality Preparing A Solution Network Design Solving the Problem Economic Justification of Security Appendix A: Basic Security Survey Appendix B: Basic Matrix STRUCTURAL BARRIERS Introduction Barrier Categories Building Surfaces Evaluation of Building Surfaces Building Openings Bomb Protection Vehicle Barriers GENERAL LOCKING CONCEPTS Introduction Basic Lock Grouping Master Keying Mechanical Locks Security Vulnerabilities of Mechanical Locks Electrified Locking Mechanisms ALARM SENSORS Sensor Applications Security Applications Categories of Sensors Sensors for Fire Detection Appendix A: Federal Specification Components for Interior Alarm Systems SYSTEMS CONSIDERATIONS Introduction Alarm Termination Systems Design Cost Reduction and Protection Improvement The Automated Security System Emergency Power Appendix A: Glossary of Frequently Used Security Terms Appendix B: Glossary of Frequently Used Fire Terms ACCESS CONTROL Basic Access Control Objectives Granting/Denying Entry Authorized Access Control Coded Card Technology Distributed Intelligence Systems Special Access Features and Applications Weapons and Contraband Screening EMERGENCY PLANNING The First Step Advance Planning Planning Issues and Considerations After the Plan Is Written Appendix A: Company Disaster Control Program Appendix B: Resources and Logistics Equipment and Services INFORMATION SYSTEMS SECURITY: AN OVERVIEW Introduction Encoding Digital Data Processing Digital Data A Typical Central Processing Unit The Impact of Large-Scale Integration A Typical Information System Classes of Computers The Evolution of Information Systems What is Information Systems Security? Is Information Systems Security Important? The Evolution of Information System Risks Management of Information Systems Security Functional Definition of Information Systems Security INFORMATION SYSTEMS SECURITY Introduction Roles and Responsibilities Information Systems Security Policies, Procedures and Information Systems Security Program Management Information Systems Security and Planning Operating and User Controls Audit Trails and Transaction Logs The Internet INVESTIGATIONS: GENERAL COMMENTS Public- and Private-Sector Investigations Investigations - In General Qualities of an Effective Investigation Legal Guidelines Investigative Reports Appendix A: Selected Internet Investigative Resources SECURITY AND PROTECTIVE LIGHTING Introduction Lighting and Lighting Definitions Lighting Systems Lighting Economics Starting and Re-Strike Security Lighting Applications Security Lighting and Closed Circuit Video Systems Standards for Security Lighting Levels CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN Introduction Understanding CPTED: Theory, History, and Practice Basic Crime Prevention Assumptions Contemporary Thinking on Crime and Criminals CONCEPTS OF RISK MANAGEMENT Reducing Crime through Physical Design Site Development and Security Zoning Security Design Criteria for Parking Facilities Design Considerations for Industrial Buildings Design Considerations for Office Buildings Special Considerations Regarding U.S. Federal Buildings Graphics and Signage for Crime Prevention and Environmental Security Summary UNITED STATES CRIMINAL LAW Introduction Federal and State Constitutions Statutory Law Definition and Classification of Crimes Case or Decisional Law Relevance to Asset Protection Important Procedural Considerations Deception Detection Instruments Conclusion THE CIVIL LAW Definition Major Branches Statutory Law Civil Common Law Torts In General The Area of Civil Rights SECURITY AS A MANAGEMENT FUNCTION Introduction Developing the Organization Program Implementation Communications Staffing the Protection Organization Program Management ETHICS IN THE SECURITY PROFESSION Introduction What Are Professional Ethics? The Security Profession The Professional Society The Code of Ethics of the American Society for Industrial Security The Practical Application of Professional Ethics Selected Bibliography DETECTING DECEPTION IN INTERVIEWS AND INTERROGATIONS Introduction Different Types of Responses Some Preliminary Cautions Verbal Responses Nonverbal Responses The Behavior Analysis Interview The Reid Nine Steps of Interrogation A PLAN FOR THREAT MANAGEMENT Overview The Concept of Threat Management Liability and Legal Considerations The Psychological Dynamic of Workplace Violence Pre-Employment Screening Physical Security Policy Statement and Reporting Procedure The Incident Management Team (IMT) and Supporting Resources The Incident Management Process Assessment Phase Appendix A: Model Policy for Workplace Threats and Violence Appendix B: Minimum Qualifications for Outside Consulting Team Members Appendix C: Normal Incident Assessment/Resolution Process INDEX 2009-12-02T07:10:53Z 2009-12-02T07:10:53Z 2002 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1417 en application/rar CRC Press