Walsh | Asset Protection and Security Management Handbook | E-Book | sack.de
E-Book

E-Book, Englisch, 584 Seiten

Walsh Asset Protection and Security Management Handbook

E-Book, Englisch, 584 Seiten

ISBN: 978-1-4200-3138-6
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



The Asset Protection and Security Management Handbook is a must for all professionals involved in the protection of assets. For those new to the security profession, the text covers the fundamental aspects of security and security management providing a firm foundation for advanced development. For the experienced security practitioner, it provides the tools necessary for developing effective solutions and responses to the growing number of challenges encountered by today's security professionals.

Based on the ASIS asset protection course, the text provides information vital to security planning and operational requirements. It addresses the most comonly recognized issues in the field and explores the future of asset protection management. The authors examine the latest in crime detection, prevention, and interrogation techniques. The Asset Protection and Security Management Handbook will not only help you to explore effective security training and educational programs for your organization, but will also help you discover proven methods of selling your security program to top management.
Walsh Asset Protection and Security Management Handbook jetzt bestellen!

Zielgruppe


Security professionals, representatives of service or equipment organizations, newcomers to security, information security professionals tasked with physical and facilities security, human resource managers with security-related functions


Autoren/Hrsg.


Weitere Infos & Material


INTRODUCTION TO ASSETS PROTECTION
The Management Function
Definition of Assets Protection
Basic Considerations
The Systems Approach
Countermeasures
The System Test
Appendix A: Self-Inspection and Protection of Assets Check Sheet

SECURITY VULNERABILITY
Introduction
Defining the Problem
Loss Event Profile
Loss Event Probability or Frequency
Loss Event Criticality
Alternative Approaches to Criticality
Preparing A Solution
Network Design
Solving the Problem
Economic Justification of Security
Appendix A: Basic Security Survey
Appendix B: Basic Matrix

STRUCTURAL BARRIERS
Introduction
Barrier Categories
Building Surfaces
Evaluation of Building Surfaces
Building Openings
Bomb Protection
Vehicle Barriers

GENERAL LOCKING CONCEPTS
Introduction
Basic Lock Grouping
Master Keying Mechanical Locks
Security Vulnerabilities of Mechanical Locks
Electrified Locking Mechanisms

ALARM SENSORS
Sensor Applications
Security Applications
Categories of Sensors
Sensors for Fire Detection
Appendix A: Federal Specification
Components for Interior Alarm Systems

SYSTEMS CONSIDERATIONS
Introduction
Alarm Termination
Systems Design
Cost Reduction and Protection Improvement
The Automated Security System
Emergency Power
Appendix A: Glossary of Frequently Used Security Terms
Appendix B: Glossary of Frequently Used Fire Terms

ACCESS CONTROL
Basic Access Control Objectives
Granting/Denying Entry
Authorized Access Control
Coded Card Technology
Distributed Intelligence Systems
Special Access Features and Applications
Weapons and Contraband Screening

EMERGENCY PLANNING
The First Step
Advance Planning
Planning Issues and Considerations
After the Plan Is Written
Appendix A: Company Disaster Control Program
Appendix B: Resources and Logistics Equipment and Services

INFORMATION SYSTEMS SECURITY: AN OVERVIEW
Introduction
Encoding Digital Data
Processing Digital Data
A Typical Central Processing Unit
The Impact of Large-Scale Integration
A Typical Information System
Classes of Computers
The Evolution of Information Systems
What is Information Systems Security?
Is Information Systems Security Important?
The Evolution of Information System Risks
Management of Information Systems Security
Functional Definition of Information Systems Security

INFORMATION SYSTEMS SECURITY
Introduction
Roles and Responsibilities
Information Systems Security Policies, Procedures and
Information Systems Security Program Management
Information Systems Security and Planning
Operating and User Controls
Audit Trails and Transaction Logs
The Internet

INVESTIGATIONS: GENERAL COMMENTS
Public- and Private-Sector Investigations
Investigations - In General
Qualities of an Effective Investigation
Legal Guidelines
Investigative Reports
Appendix A: Selected Internet Investigative Resources

SECURITY AND PROTECTIVE LIGHTING
Introduction
Lighting and Lighting Definitions
Lighting Systems
Lighting Economics
Starting and Re-Strike
Security Lighting Applications
Security Lighting and Closed Circuit Video Systems
Standards for Security Lighting Levels

CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN
Introduction
Understanding CPTED: Theory, History, and Practice
Basic Crime Prevention Assumptions
Contemporary Thinking on Crime and Criminals

CONCEPTS OF RISK MANAGEMENT
Reducing Crime through Physical Design
Site Development and Security Zoning
Security Design Criteria for Parking Facilities
Design Considerations for Industrial Buildings
Design Considerations for Office Buildings
Special Considerations Regarding U.S. Federal Buildings
Graphics and Signage for Crime Prevention and Environmental Security
Summary

UNITED STATES CRIMINAL LAW
Introduction
Federal and State Constitutions
Statutory Law
Definition and Classification of Crimes
Case or Decisional Law
Relevance to Asset Protection
Important Procedural Considerations
Deception Detection Instruments
Conclusion

THE CIVIL LAW
Definition
Major Branches
Statutory Law
Civil Common Law
Torts In General
The Area of Civil Rights

SECURITY AS A MANAGEMENT FUNCTION
Introduction
Developing the Organization
Program Implementation
Communications
Staffing the Protection Organization
Program Management

ETHICS IN THE SECURITY PROFESSION
Introduction
What Are Professional Ethics?
The Security Profession
The Professional Society
The Code of Ethics of the American Society for Industrial
Security
The Practical Application of Professional Ethics
Selected Bibliography

DETECTING DECEPTION IN INTERVIEWS AND INTERROGATIONS
Introduction
Different Types of Responses
Some Preliminary Cautions
Verbal Responses
Nonverbal Responses
The Behavior Analysis Interview
The Reid Nine Steps of Interrogation

A PLAN FOR THREAT MANAGEMENT
Overview
The Concept of Threat Management
Liability and Legal Considerations
The Psychological Dynamic of Workplace Violence
Pre-Employment Screening
Physical Security
Policy Statement and Reporting Procedure
The Incident Management Team (IMT) and Supporting
Resources
The Incident Management Process
Assessment Phase
Appendix A: Model Policy for Workplace Threats and Violence
Appendix B: Minimum Qualifications for Outside Consulting Team Members
Appendix C: Normal Incident Assessment/Resolution Process

INDEX


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.